Content Security System On Cloud Based Multimedia

Ms Jasmine, Gudipudi. Balaiah

Abstract


Multimedia computing has developed as an imperative innovation to produce, alter, and seek media substance, for example, pictures, design, video, sound, et cetera. For mixed media applications and administrations over the Internet and versatile remote systems, there are solid requests for distributed computing due to the noteworthy measure of calculation required for serving a large number of Internet or portable clients in the meantime. This paper surveys brief writing on mixed media distributed computing angles and portray a portion of the security issues in distributed computing, including information honesty, information classification, get to control, information control in the encoded information domain. The proposed framework can be utilized to secure diverse interactive media content sorts, including 2-D recordings, 3-D recordings, pictures, sound clasps, melodies, and music cuts. The framework can be conveyed on private as well as open mists. we contrasted our framework with the assurance framework utilized by YouTube and our outcomes demonstrate that the YouTube insurance framework neglects to distinguish most duplicates of 3-D recordings, while our framework recognizes more than 98% of them. This correlation demonstrates the requirement for the proposed 3-D signature strategy, since the condition of-theart business framework was not ready to handle 3-D recordings.


References


A. Abdelsadek, “Distributed index for matching multimedia objects,” M.S. thesis, School of Comput. Sci., Simon Fraser Univ., Burnaby, BC, Canada, 2014.

A. Abdelsadek and M. Hefeeda, “Dimo: Distributed index for matching multimedia objects using MapReduce,” in Proc. ACMMultimedia Syst. Conf. (MMSys’14), Singapore, Mar. 2014, pp. 115–125.

M. Aly, M. Munich, and P. Perona, “Distributed Kd-Trees for retrieval from very large image collections,” in Proc. Brit. Mach. Vis. Conf. (BMVC), Dundee, U.K., Aug. 2011.

J. Bentley, “Multidimensional binary search trees used for associative searching,” in Commun. ACM, Sep. 1975, vol. 18, no. 9, pp. 509–517.

P. Cano, E. Batle, T. Kalker, and J. Haitsma, “A review of algorithms for audio fingerprinting,” in Proc. IEEE Workshop Multimedia Signal Process., Dec. 2002, pp. 169–173.

J. Dean and S. Ghemawat, “MapReduce: Simplified data processing on large clusters,” in Proc. Symp. Oper. Syst. Design Implementation (OSDI’04), San Francisco, CA, USA, Dec. 2004, pp. 137–150.

J. Deng, W. Dong, R. Socher, L. Li, K. Li, and L. Fei-Fei, “Imagenet: A large-scale hierarchical image database,” in Proc. IEEE Conf. Comput. Vis. Pattern Recog. (CVPR’09), Miami, FL, USA, Jun. 2009, pp. 248–255.

A. Hampapur, K. Hyun, and R. Bolle, “Comparison of sequence matching techniques for video copy detection,” in Proc. SPIE Conf. Storage Retrieval Media Databases (SPIE’02), San Jose, CA, USA, Jan. 2002, pp. 194–201.

S. Ioffe, “Full-length video fingerprinting. Google Inc.,” U.S. Patent 8229219, Jul. 24, 2012.

A. Kahng, J. Lach, W. Mangione-Smith, S. Mantik, I. Markov, M. Potkonjak, P. Tucker, H. Wang, and G. Wolfe, “Watermarking techniques for intellectual property protection,” in Proc. 35th Annu. Design Autom. Conf. (DAC’98), San Francisco, CA, USA, Jun. 1998, pp. 776–781.

K.S.Suresh “ Security Issues and Security Algorithms in Cloud Computing,” International Journal of Advanced Research in Computer Science and Software Engineering.

Dr.A.Padmapriya M.C.A., M.Phil., Ph.DP.Subhasri, (M.Phil, Research Scholar) “Cloud Computing: Security Challenges & Encryption Practices,” Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.

Leena Khanna “ Cloud Computing: Security Issues And Description Of Encryption Based Algorithms To Overcome Them,” Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering.

F.A.Alvi, B.S.Choudary, and N.Jaferry, “Review on cloud computing security issues & challenges,” iaesjournal.com, vol .2 (2012).


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.