Digital Fingerprinting In Encrypted Domain
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 12, Issue 1
Abstract
Digital fingerprinting is a method for protecting multimedia content from illegal redistribution and identified the colluders.In copy protection, a content seller embeds a unique identity as a watermark into the content before it is sold to a buyer. When an illegal copy is found, the seller can identify illegal users by extracting the fingerprint. In this proposing an anonymous fingerprinting  based on a homomorphic additive encryption scheme, it present a construction of anti-collision codes created using BIBD(Balanced incomplete block design) codes technique and dither technique which makes use of LFSR (linear feedback shift register) are used for improving the high robustness and Security.
Authors and Affiliations
Kranthi Kumar Murala, Dr. M. Kamaraju, Dr. K. Ramanjaneyulu
A Statistical Analysis of Bhairav-The first morning Raga
A raga, in Indian classical music, is a melodic structure with fixed notes and a set of rules characterizing a particular mood conveyed by performance. Bhairav is the first raga of the morning. The present paper gives a...
Mapping between XML and RDF via DTD
XML has gained massive popularity for representation of data in last decades. Both HTML and XML are used as primary data formats since the existence of World Wide Web. As the amount of data is growing, need has emerged t...
ANALYSIS AND COMPARISION OF SRG AND DFIG FOR WIND GENERATION APPLICATION
Renewable energy is very important topic to be study to find new sources of energy to produce electricity. The main advantages of the renewable energy are available, clean, low cost, and continuous energy.The main object...
A NOVEL APPROACH OF JOB ALLOCATION USING MULTIPLE PARAMETERS IN IN CLOUD ENVIRONMENT
Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service ove...
Performance Analysis of Malicious nodes on Multi hop Cellular Networks
The existence of malicious nodes in multi hop cellular networks, which operate without a central administration infrastructure, can result in performance degradation or even disruption of the network operation. In this p...