首页> 外文会议>International Conference of Soft Computing and Pattern Recognition >Prevention of Illegal Content Sharing in Peer to Peer Systems
【24h】

Prevention of Illegal Content Sharing in Peer to Peer Systems

机译:预防对等系统的非法内容共享

获取原文

摘要

Now a days we are sharing large number of multimedia contents along with copyright protection. Assurance of proprietorship is needed because large increment in duplicates and to reduce illegal redistribution. Fingerprint mechanism is categorized in to three symmetric, asymmetric and anonymous. They have used traitor tracing protocol to identify illegal re-distributor. It uses complex graph to search for traitor tracing, and also it requires the participation of several honest buyers and anonymous communication through proxies. Drawbacks considered are justified by maintaining the transaction monitor and Symmetric Keys. Transaction monitor stores an encrypted version of the fingerprint for each buyer to trace an illegal re-distributor in the tracing protocol. Symmetric keys are maintained in the Data base and these Keys are not transmitted through proxies. For this all the user ought to be online. It is efficient and scalable fingerprint mechanism for p2p based fingerprinting system.
机译:现在我们有一天我们分享大量多媒体内容以及版权保护。需要保证所有权,因为重复较大并减少非法再分配。指纹机制分为三个对称,不对称和匿名。他们使用叛逆追踪协议来识别非法重新分配器。它使用复杂的图来搜索叛逆者跟踪,并且还需要参与几个诚实的买家和通过代理的匿名沟通。通过维护事务监视器和对称密钥,所考虑的缺点是合理的。事务监视器存储每个买家的指纹的加密版本,以跟踪跟踪追踪协议中的非法重新分配器。对称密钥保持在数据库中,并且这些密钥不通过代理传输。对于这一切,所有用户应该在线。基于P2P的指纹系统是高效且可扩展的指纹机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号