SlideShare a Scribd company logo
IMPROVED PRIVACY-PRESERVING P2P
MULTIMEDIA DISTRIBUTION
BASED ON RECOMBINED
FINGERPRINTS
Domain : Secure computing
Guide: Varija Madam
Vaishali Misra
Laxmi Praythusha
Y. Praythusha
Sai Chandra
OBJECTIVE
 Legal distribution of multimedia contents .
 Preserve the privacy of both the sender and
receiver.
 Usage of Recombined fingerprints which are more
secured.
 Trace the illegal re-distribution of contents.
INTRODUCTION
 Computer security is information security as
applied to computers and networks.
 Anonymous fingerprint has been suggested as a
convenient solution for the legal distribution of
multimedia contents with copyright protection.
 Recombined fingerprint approach results in an
efficient privacy-preserving and P2P-based
fingerprinting system.
EXISTING SYSTEM
 Symmetric scheme: Merchant will have
fingerprinted copy, the buyer wont be accused of ill-
legal distribution.
 Asymmetric scheme: merchant does not have
access to the fingerprinted copy, but he can recover
in case of illegal redistribution.
 Anonymous scheme: The buyer preserves her
anonymity and cannot be linked to the purchase of
a specific content, except if she participates in an
illegal redistribution.
DISADVANTAGES
 Developing a practical system using this idea
appears difficult.
 Homo-morphic encryption.
 Implementation is not simple and requires complex
protocol.
PROPOSED SYSTEM
 The content is divided into several ordered
fragments called segment.
 The merchant distributes different copies to a
reduced set of M seed buyers.
 The buyers other than the seed ones engage on
P2P transfers of the content.
 The fingerprint of each new buyer is built as a
recombination of the segments of its parents.
 A transaction record is created by a transaction
monitor to keep track of each transfer between peer
buyers.
 The fingerprint’s hashes are encrypted in such a
way that the private key of at least one parent is
required for obtaining their clear text.
 The real identities of buyers are known only by the
merchant.
ADVANTAGES
 A more efficient and practical system, especially as
traitor tracing protocol.
 Buyers frameproofness is guaranteed.
 Encryption is only for short bit strings, such as the
binary fingerprints and hashes, not to the content.
SYSTEM DESIGN
 The system design should focus on the amount of
input required, controlling the errors, avoiding delay.
 A quality output is one, which meets the
requirements of the end user and presents the
information clearly.
SYSTEM CONFIGURATION:
 Operating system : Windows XP.
 Coding Language: JAVA
 Data Base : MYSQL
SYSTEM ARCHITECTURE
DATAFLOW DIAGARAM
USE CASE DIAGRAM
CLASS DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
MODULES
 Merchant: He distributes copies of the content legally to
the seed buyers.
 Buyer’s privacy:The identity of a buyer who has
purchased a specific content could be revealed by a
coalition of two parties.
 Transaction monitor: It keeps a transaction register for
each purchase carried out for each buyer.
 Database authentication attacks : An attacker may try to
obtain the fingerprint of a buyer that is stored in the
transaction monitor’s database.
SYSTEM TESTING
 Unit testing
 Integration testing
 Function testing
 System test
 White box testing
 Black box testing
Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints
Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints
Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints
Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints
CONCLUSION
 Recombined fingerprint strategy provides more
security.
 Buyers need not to compromise their privacy.
 Recombined fingerprint strategy for data transfer
relates with the real time scenarios as the DNA
fingerprints.
REFERENCE
 David Megıas, “Improved Privacy-Preserving P2P
Multimedia Distribution Based on Recombined
Fingerprints”, IEEE TRANSACTIONS ON
DEPENDABLE AND SECURE COMPUTING,
VOL. 12, NO. 2, MARCH/APRIL, 2015.
Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints

More Related Content

PPT
The single image dehazing based on efficient transmission estimation
PDF
Invisible technology
PPTX
Microcontroller Based Anesthesia Injector.pptx
PPT
Holographic versatile disc
DOCX
Project Report - Lighting Control via Bluetooth using Android
PPTX
Level sensor
PPTX
Wearable tech ppt
PPTX
Finger print based EVM by saurabh
The single image dehazing based on efficient transmission estimation
Invisible technology
Microcontroller Based Anesthesia Injector.pptx
Holographic versatile disc
Project Report - Lighting Control via Bluetooth using Android
Level sensor
Wearable tech ppt
Finger print based EVM by saurabh

What's hot (20)

PDF
Radar 2009 a 14 airborne pulse doppler radar
PDF
fingerprint based electronic voting machine
PPTX
Touchless Technology
PPT
sensor assisted smart white cane for blind man using Arduino UNO
PPTX
DLNA- DIGITAL LIVING NETWORK ALLIANCE
PDF
DIABETES PREDICTOR USING ENSEMBLE TECHNIQUE
PPTX
Mechanism of PIR sensor
PPTX
Microsoft Palladium
PDF
19. шина pci express. основни характеристики.
PPT
Smartphone sensor and gesture
PPTX
Biometric Voting System
PPTX
Automated Plant Watering System
PDF
Non-invasive glucose monitoring devices: A review
PPTX
Smart Lock
PPT
Finger print based door access system
PDF
Real time pedestrian detection, tracking, and distance estimation
PPT
How fingerprint technology work
PPT
Satrack
PPTX
Multitouch Interaction
PPTX
Touch screen technology
Radar 2009 a 14 airborne pulse doppler radar
fingerprint based electronic voting machine
Touchless Technology
sensor assisted smart white cane for blind man using Arduino UNO
DLNA- DIGITAL LIVING NETWORK ALLIANCE
DIABETES PREDICTOR USING ENSEMBLE TECHNIQUE
Mechanism of PIR sensor
Microsoft Palladium
19. шина pci express. основни характеристики.
Smartphone sensor and gesture
Biometric Voting System
Automated Plant Watering System
Non-invasive glucose monitoring devices: A review
Smart Lock
Finger print based door access system
Real time pedestrian detection, tracking, and distance estimation
How fingerprint technology work
Satrack
Multitouch Interaction
Touch screen technology
Ad

Similar to Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints (15)

DOCX
Improved privacy preserving p2 p multimedia
DOCX
Improved privacy preserving p2 p multimedia distribution based on recombined ...
PDF
Peer-to-Peer content distribution using automatically recombined fingerprints
PDF
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
PDF
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
PDF
Secure system based on recombined fingerprints for sharing multimedia files i...
DOCX
ATM Fingerprint.docx
DOCX
Fingerprint based transaction system
PDF
Secure Web Transaction
PPTX
Global e payment system ppt
DOC
documentation for identity based secure distrbuted data storage schemes
PPTX
Electronic transactions 123
DOCX
Smart security system for sensitive area by using image processing
PPTX
Online paymentusingsteganographt&Visualcryptography
PPT
Remote Network Monitoring System
Improved privacy preserving p2 p multimedia
Improved privacy preserving p2 p multimedia distribution based on recombined ...
Peer-to-Peer content distribution using automatically recombined fingerprints
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...
Secure system based on recombined fingerprints for sharing multimedia files i...
ATM Fingerprint.docx
Fingerprint based transaction system
Secure Web Transaction
Global e payment system ppt
documentation for identity based secure distrbuted data storage schemes
Electronic transactions 123
Smart security system for sensitive area by using image processing
Online paymentusingsteganographt&Visualcryptography
Remote Network Monitoring System
Ad

Recently uploaded (20)

PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
Cyber Hygine IN organizations in MSME or
PDF
Understand the Gitlab_presentation_task.pdf
PDF
The Evolution of Traditional to New Media .pdf
PDF
simpleintnettestmetiaerl for the simple testint
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PDF
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
Containerization lab dddddddddddddddmanual.pdf
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
newyork.pptxirantrafgshenepalchinachinane
Uptota Investor Deck - Where Africa Meets Blockchain
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
Introduction to cybersecurity and digital nettiquette
t_and_OpenAI_Combined_two_pressentations
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Cyber Hygine IN organizations in MSME or
Understand the Gitlab_presentation_task.pdf
The Evolution of Traditional to New Media .pdf
simpleintnettestmetiaerl for the simple testint
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Alethe Consulting Corporate Profile and Solution Aproach
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Slides PDF: The World Game (s) Eco Economic Epochs.pdf
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
Mathew Digital SEO Checklist Guidlines 2025
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Containerization lab dddddddddddddddmanual.pdf
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx

Improved privacy preserving peer to peer multimedia distribution using recombined fingerprints

  • 1. IMPROVED PRIVACY-PRESERVING P2P MULTIMEDIA DISTRIBUTION BASED ON RECOMBINED FINGERPRINTS Domain : Secure computing Guide: Varija Madam Vaishali Misra Laxmi Praythusha Y. Praythusha Sai Chandra
  • 2. OBJECTIVE  Legal distribution of multimedia contents .  Preserve the privacy of both the sender and receiver.  Usage of Recombined fingerprints which are more secured.  Trace the illegal re-distribution of contents.
  • 3. INTRODUCTION  Computer security is information security as applied to computers and networks.  Anonymous fingerprint has been suggested as a convenient solution for the legal distribution of multimedia contents with copyright protection.  Recombined fingerprint approach results in an efficient privacy-preserving and P2P-based fingerprinting system.
  • 4. EXISTING SYSTEM  Symmetric scheme: Merchant will have fingerprinted copy, the buyer wont be accused of ill- legal distribution.  Asymmetric scheme: merchant does not have access to the fingerprinted copy, but he can recover in case of illegal redistribution.  Anonymous scheme: The buyer preserves her anonymity and cannot be linked to the purchase of a specific content, except if she participates in an illegal redistribution.
  • 5. DISADVANTAGES  Developing a practical system using this idea appears difficult.  Homo-morphic encryption.  Implementation is not simple and requires complex protocol.
  • 6. PROPOSED SYSTEM  The content is divided into several ordered fragments called segment.  The merchant distributes different copies to a reduced set of M seed buyers.  The buyers other than the seed ones engage on P2P transfers of the content.  The fingerprint of each new buyer is built as a recombination of the segments of its parents.
  • 7.  A transaction record is created by a transaction monitor to keep track of each transfer between peer buyers.  The fingerprint’s hashes are encrypted in such a way that the private key of at least one parent is required for obtaining their clear text.  The real identities of buyers are known only by the merchant.
  • 8. ADVANTAGES  A more efficient and practical system, especially as traitor tracing protocol.  Buyers frameproofness is guaranteed.  Encryption is only for short bit strings, such as the binary fingerprints and hashes, not to the content.
  • 9. SYSTEM DESIGN  The system design should focus on the amount of input required, controlling the errors, avoiding delay.  A quality output is one, which meets the requirements of the end user and presents the information clearly. SYSTEM CONFIGURATION:  Operating system : Windows XP.  Coding Language: JAVA  Data Base : MYSQL
  • 16. MODULES  Merchant: He distributes copies of the content legally to the seed buyers.  Buyer’s privacy:The identity of a buyer who has purchased a specific content could be revealed by a coalition of two parties.  Transaction monitor: It keeps a transaction register for each purchase carried out for each buyer.  Database authentication attacks : An attacker may try to obtain the fingerprint of a buyer that is stored in the transaction monitor’s database.
  • 17. SYSTEM TESTING  Unit testing  Integration testing  Function testing  System test  White box testing  Black box testing
  • 22. CONCLUSION  Recombined fingerprint strategy provides more security.  Buyers need not to compromise their privacy.  Recombined fingerprint strategy for data transfer relates with the real time scenarios as the DNA fingerprints.
  • 23. REFERENCE  David Megıas, “Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined Fingerprints”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 2, MARCH/APRIL, 2015.