A robust Method for Encrypted Data Hiding Technique Based on Neighborhood Pixels Information(2011)



Download 17.59 Kb.
Date23.04.2018
Size17.59 Kb.
A Robust Method for Encrypted Data Hiding Technique Based on Neighborhood Pixels Information(2011)

SYNOPSIS


The project entitled “Piracy Protection Software for MP3” is developed and designed using the Microsoft’s language C# .Net. This application is very user friendly and it is very innovative, it specially designed for the music industry. The main intention of this software is to determine the unethical party who distribute the unauthorized copies of the multimedia contents. This software can be used with very basic requirements which we usually have in our systems. This software is designed with dialog boxes which will assist the user in using the application. The users need not be a computer professional with the basic knowledge of computers the user will be able to work with this application.

Digital rights protection is a major issue in the e-commerce of the multimedia contents. Watermarking technology has been proposed has an enabling technology for the rights protection of the multimedia digital contents. In order to reinforce protection and access control this application has been developed. A unique watermark is embedded in each piece of the multimedia content before it is distributed to the customer. So the user who buys the multimedia contents from the content provider will have the watermarked multimedia content. When he tries to make an unauthorized copy of the multimedia content the duplicate copy will also have a unique watermark embedded in each piece of the multimedia contents. So when unauthorized copies of a piece of contents are found, the customer who owns the content will readily identified by the embedded watermark and also the content provider who sells the content will have the details of the customer like customer’s name, transaction dates and serial number. However, the unauthorized copies may also come from the content provider itself. It is therefore a challenging problem to determine whether the unauthorized copy is distributed by an unethical party or by the unethical content provider. The piracy protection software that has been

developed has addressed this problem using cryptographic technologies. This software employs a commutative encryption algorithm to protect the privacy of watermarks. Information is doubly locked by two encryption keys kept separately by the customer and the content provider. In this application the customer will get only the watermarked content and the content provider will have no idea how the watermark is formed.

Moving Pictures Experts Group audio layer 3 (MP3) compression format has gained popularity for distributing digital music over the internet. The MP3 format allows raw digital music to be compressed down to one-tenth or more in size, while still keeping reasonably high fidelity. Further with peer to peer applications digital contents could be distributed over the internet without control. This promotes unauthorized acts like unauthorized copying and distributing of digital contents.

It is estimated that the music industry suffered an annual business loss of five billon dollars. This makes major music companies hesitated to sell music in digital formats over the internet. In order to reinforce protection and access control to digital contents, piracy protection software was designed. This software supports a security infrastructure for the tailor-made protected digital contents with digital rights to individual customer.

As the significant portion of trades is expected to deal with multimedia contents, digital rights protection becomes an eminent issue in e-commerce. Digital watermarking has been proposed as the promising technology to achieve rights management. It supports rights information such as owner’s identity, transaction dates and serial number, to be embedded as unperceivable signals into digital contents. For example, watermarking techniques for audios are based on the imperfection of the human auditory system. Since human ears are insensitive to small changes and low-amplitude echoes, watermark signals embedding rights information can be encoded at the frequency domain by making small spectral magnitude changes. These watermark signals recover the rights information originally embedded in a piece of digital contents. Origins of pirate copies can thus be traced, therefore deterring unauthorized distribution or copying of digital contents.

The roles of the customer and the content providers in the modeling of watermarking infrastructures for digital rights are distinguished. Based on this model a novel watermarking software is proposed to address a common problem in internet trading where customers and content providers may not have mutual trusts.

BASICS OF PIRACY PROTECTION SOFTWARE FOR MP3

Digital rights protection is a major issue in the e-commerce of the multimedia contents. Watermarking technology has been proposed has an enabling technology for the rights protection of the multimedia digital contents. In order to reinforce protection and access control this application has been developed. A unique watermark is embedded in each piece of the multimedia content before it is distributed to the customer. So the user who buys the multimedia contents from the content provider will have the watermarked multimedia content. When someone tries to make an unauthorized copy of the multimedia content the duplicate copy will also have a unique watermark embedded in each piece of the multimedia contents. So when unauthorized copies of a piece of contents are found, the customer who owns the content will readily identified by the embedded watermark and also the content provider who sells the content will have the details of the customer like customer’s name, transaction dates and serial number. However, the unauthorized copies may also come from the content provider itself. It is therefore a challenging problem to determine whether the unauthorized copy is distributed by an unethical party or by the unethical content provider. The piracy protection software that has been developed has addressed this problem using cryptographic technologies. This software employs a commutative encryption algorithm to protect the privacy of watermarks. Information is doubly locked by two encryption keys kept separately by the customer and the content provider. In this application the customer will get only the watermarked content and the content provider will have no idea how the watermark is formed.

Digital audio watermarking is often discussed as a promising technology for protecting digital goods sold via Internet, especially music downloads. Copyright information or customer identification can be embedded directly into audio files, which are usually distributed using lossy compression. This leads to a number of specific requirements with respect to watermarking robustness, transparency and complexity. There exist different application areas for digital audio watermarking. Both the music download and the CD-on-Demand (CoD) scenario are discussed. The requirements and challenges between online delivery and CoD services with respect to audio watermarking are compared. And a strategy is introduced, which is most suited for adjusting the watermarking technology for CoD and online delivery.

A watermarking protocol is proposed to address the problem using cryptographic technologies. This protocol employs a commutative encryption algorithm to protect the privacy of watermarks. Two encryption keys kept separately by a customer and a content provider doubly lock information. In the protocol, a customer only gets a piece of watermarked multimedia contents in a transaction and the content provider has no idea how the watermark is formed. This facilitates the authority to determine the unethical party in case of unauthorized distribution of digital contents. Origins of pirate copies can thus be traced, therefore deterring unauthorized distribution or copying of digital contents. Many watermarking techniques are known for digital images, video and audio. For other data formats like text, VRML and MIDI algorithms have also been proposed. Digital watermarking is a highly multidisciplinary field that combines signal processing with cryptography, communication theory, coding theory, signal compression, and the psychology of perception.

Problem Definition

Due to significant loss of sales in the recent years the music industry is looking for new distribution approaches to sell music content. One of these approaches is music on demand. Here the customer can choose individual audio tracks, which enables him to buy music more selectively and individually than buying complete albums with a fixed selection of musical pieces. Digital watermarking is a technology capable of solving important practical security problems like authentication for copyright protection or manipulation recognition for integrity verification. This technology helps to reinforce protection and access control. When copies do not differ, source of illegal copies cannot be identified

Existing System

• In the previous versions of Digital rights protection, the images were mostly embedded with watermarks.

• Still there are a lot of techniques for embedding watermark in the multimedia content.

• Watermarking the audio digital signals has not been developed with complete authorization and security.

• Existing system used Spatial Spread Spectrum Algorithm, where watermark contents are easily detected and removed.

Drawbacks of the Existing System

The drawbacks and difficulties that is faced in the existing system are analyzed and are presented below

• More time to be spent.

• It is not feasible.

• Less security and unauthorized.

• Easily detected and removed.

Proposed System

• Watermarking the audio data is to protect its piracy of unauthorized persons –is a great solution to the multimedia content provider who owns the particular content.

• In Watermarking algorithms certain parameters addressed are: Robustness, security, inevitability, transparency, complexity, capacity and verification method.

• Use of Advanced Encryption Standard – Rijndael Algorithm for encryption of secret file.

Objectives of the Proposed System

• The system proposed a real time solution for protecting the piracy of digital content.

• More than one digital content can be watermarked in a single process.

• The form of the watermark inserted can be determined by the content provider only therefore the customer do have no idea or knowledge of the watermark and could never figure out the watermark.

• The system had implemented a symmetric key encryption by Rijndael Algorithm.

Modular Design

Software is divided into separately named and addressable components, called modules that are integrated to satisfy problem requirements. The modular design is just another name for one of the most important design principles, which states that we should strive to minimize the inventory of different elements and materials used in any single composition. This principle is immensely powerful and universally applicable. By enforcing consistency and integrity, modular design makes our work not only easier but, more importantly, better and understandable. The modules are presented below,

• Design.

• File Compression.

• Watermark Insertion and Encoding.

• Decoding And Detection of watermark.

• Testing and Implementation.

The modular design reduces complexity, facilities change and results in easier implementation by dividing the project into modules. The modules are divided in the manner so it will perform only one task in a module. So there won’t be any error while compiling. And also an effective application is achieved. Using this design an error free project is developed.

Interface Design

It describes how the software communicates within itself with the systems that interoperate with it and with humans who use it. An interface implies a flow of information and a specific type of behavior. Therefore, data and control flow diagrams provide much of the information required for interface design.

The interface designs focuses on three areas of concern

• The design of interfaces between software components.

• The design of interfaces between the software and nonhuman producers and consumers of information.

• The design of the interface between a human and the computer.

The Piracy Protection Software for Mp3 is a framed window, it has screens to communicate with the user and also if the user does a mistake it can also be represented in the message boxes. It has a menu to select the options and by using these options the software is protected from piracy. And this software designed is a graphical user interface.

Hardware Requirement (Minimum Requirement)

Processor Intel Pentium III

CPU 500 MHz

RAM 256 MB

Monitor 17” Samsung color monitor

Hard Disk 40 GB

Keyboard Standard Keyboard with 104 Keys

Mouse Serial Mouse

Software Requirement

Tools .NET Framework

Platform Windows 2000

Pentium III PC with 256 MB RAM



Network facility

Download 17.59 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2020
send message

    Main page