Transaction monitor on Merchant & Buyers Privacy Data from UN authentication attacks

G. SRAVANI, M. DHARANI KUMAR

Abstract


Innominate dactylogram has been suggested as a convenient solution for the licit distribution of multimedia contents with copyright aegis whilst preserving the privacy of buyers, whose identities are only revealed in case of illicit re-distribution. However, most of the subsisting incognito fingerprinting protocols are impractical for two main reasons the utilization of intricate time-consuming protocols and/or homomorphism encryption of the content, and a unicast approach for distribution that does not scale for a sizably voluminous number of buyers. This paper stems from an antecedent proposal of recombined dactylograms which surmounts some of these drawbacks. However, the recombined dactylogram approach requires an involute graph search for apostate tracing, which needs the participation of other buyers, and veracious proxies in its P2P distribution scenario. This paper fixates on abstracting these disadvantages resulting in an efficient, scalable, privacy-preserving and P2P-predicated fingerprinting system.


Full Text:

PDF




Copyright (c) 2017 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org