Digital Fingerprinting In Encrypted Domain
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 12, Issue 1
Abstract
Digital fingerprinting is a method for protecting multimedia content from illegal redistribution and identified the colluders.In copy protection, a content seller embeds a unique identity as a watermark into the content before it is sold to a buyer. When an illegal copy is found, the seller can identify illegal users by extracting the fingerprint. In this proposing an anonymous fingerprinting  based on a homomorphic additive encryption scheme, it present a construction of anti-collision codes created using BIBD(Balanced incomplete block design) codes technique and dither technique which makes use of LFSR (linear feedback shift register) are used for improving the high robustness and Security.
Authors and Affiliations
Kranthi Kumar Murala, Dr. M. Kamaraju, Dr. K. Ramanjaneyulu
A Survey on Intelligent Water Drop Algorithm
In the optimization areas, there are different algorithms that have been applied such as swarm intelligence algorithms. The researchers have found different algorithms by simulating the behaviors of various swarms of ins...
Evaluating a Model for Implementing Knowledge Management in Banking Informatics Corporations in Iran
The purpose of this paper is to measure the perceived importance and practical establishment of five factors affecting successful establishment of knowledge management (KM) in banking informatics corporations in Iran bas...
A Proposed Electronic Health Record Content Structure Based on Clinical Organizations Survey
Computer systems and communication technologies made a strong and influential presence in the different fields of medicine. The cornerstone of a functional medical information system is the Electronic Health Records (EHR...
Ontological Engineering Approach Towards Botnet Detection in Network Forensics
The abundance in the usage of Internet, in every arena of life from social to personal, commercial to domestic and other aspects of life as well, leads the rise in cybercrime at an upsetting speed. More illegal activitie...
PUBLIC KEY ENCRYPTION WITH CONJUNCTIVE FIELD FREE KEYWORD SEARCH SCHEME
Searchable encryption allows a remote server to search over encrypted documents without knowing the sensitive data contents. Prior searchable symmetric encryption schemes focus on single keyword search. Conjunctive Keywo...