Ownership Identification and Signaling of Multimedia Content Components
DOI:
https://doi.org/10.61841/wyr0s174Keywords:
Multimedia content, 3D videos, Images, Signature method, Amazon cloudAbstract
We are proposing a new concept for large-scale, interactive content protection systems in this paper. Our architecture leverages cloud infrastructures to deliver cost-effectiveness and fast deployment with some additional attributes to improve the security of content. The framework proposed could be used to secure various forms of multimedia content, including 2-D videos, 3-D videos, photographs, audio clips, songs, and music clips. The content of the multimedia can be used in different approaches to implement security with various components such as videos, audio files, etc. These types of contents are deployed on private or public clouds. The signature method has the unique nature of 3D video representation with a signature-based approach. At the same time, efficient computational methods are used for depth signaling. With the high scalability and efficient methods to protect multimedia objects, in this paper we propose a signature-based approach using a cloud framework.
Downloads
References
[1] E. Lin, A. Eskicioglu, R. Lagendijk, and E. Delp, “Advances in digital video content protection,” Proceedings of the IEEE, vol. 93, no. l, pp. 171-183, 200.
[2] I. Cox, M. Miller, J. Bloom, “Digital Watermarking,” Morgan Kaufmann Publishers, 2001.
[3] D. Zheng, Y. Liu, J. Zhao, and A. E. Saddik, “A survey of RST invariant image watermarking algorithm,” ACM Comput. Surv., vol. 39, no. 2, pp. 1-91, 2007.
[4] T. Huang, Y. Tian, W. Gao, and J. Lu, “Mediaprinting: Identifying multimedia content for digital rights management,” Computer, vol. 43, no. 12, pp. 28-35, 2010.
[5] Saravanan.M.S., A.R.Apoorva, ”Malicious attacks on private and public cloud networks and related issues," published in the International Journal of Applied Engineering Research by Research India Publications, India, Vol. 10, Issue. 33, May’ 2015, pp. 24584-24587, ISSN: 0973-4562.
[6] ISO/IEC 23009-1:2014, “Information technology -- Dynamic adaptive streaming over HTTP (DASH) --Part 1: Media presentation description and segment formats.”.
[7] L. Mou, T. Huang, L. Huo, W. Li, W. Gao, X. Chen. “A secure media streaming mechanism combining encryption, authentication, and transcoding.” Signal Processing: Image Communication, 24(10):825-833, 2009.
[8] Saravanan, M.S., ”Adaptive Prefetching of Multimedia Applications in Distributed Systems," Under Review to Publish in the Far East Journal of Mathematical Sciences by Pushpa Publishing House, India, ISSN: 0972-0871.
[9] Y. Bengio, A. Courville, and P. Vincent, “Representation learning: a review and new perspectives,” IEEE Trans. Pattern Anal. Machine Intell. 35, 1798-1828, 2013.
Downloads
Published
Issue
Section
License
Copyright (c) 2020 AUTHOR

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.