Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Prevention of Copyright Issues of Media in Social Network {tag} {/tag} IJCA Special Issue on Advanced Computing and Communication Technologies for HPC Applications © 2012 by IJCA Journal ACCTHPCA - Number 2 Year of Publication: 2012 Gayathri. K. S Authors: Tony Thomas Jayasudha. J. S {bibtex}accthpca1016.bib{/bibtex} Abstract A social network is a social communication network which allows users to interrelate with anyone in the connected network all over the world. Users are allowed to share anything across the network like photos, videos, audios, text messages etc. , which are accessible to other users connected to the network. Now-a-days social networks have become a daily activity in everyone's life. People share everything happening in their life through social 1/3 Prevention of Copyright Issues of Media in Social Network networks with their dear ones. Owing to its heavy usage, the number of contents being shared through social networks is also increasing. As a consequence, the security and rights of shared content are getting compromised. This paper aims to protect media shared through social networks against copyright infringement and a solution to overcome the copyright violation issue using watermarking method along with a comparison to the existing watermarking techniques. ences Refer - Sachan, A. , Emmanuel, S. , Das, A. , Kankanhalli, M. S. 2009. Privacy Preserving Multiparty Multilevel DRM Architecture. IEEE Consumer Communications and Networking Conference. 1-5. - Vashistha, A. , Nallusamy, R. and Pau, S. 2010. NoMark: A Novel Method for Copyright Protection of Digital Videos without Embedding Data. IEEE International Symposium on Multimedia. 167-174. - Rosenblatt, B. 2008. Content Identification Technology. Sun Microsystems Inc - Gao, H. , Hu, J. , Huang, T. , Wang, J. and Chen, Y. 2011. Security Issues in Online Social Networks. IEEE Internet Computing. 56-62. - Zhang, C. , Sun, J. , Zhu, X. , Fang, Y. 2010. Privacy and Security for Online Social Networks: Challenges and Opportunities. IEEE Network. 13-18. - Boyd, D. M. , Ellison, N. B, "Social Network Sites: Definition, History and Scholarship", Journal of Computer Mediated Communication, 2007. - Mistry, D, "Comparison of Digital Water Marking methods", International Journal on Computer Science and Engineering, 2010, Vol. 02, 2905-2909. - Hartung, F. and Ericsson, F. R, "Digital Rights Management and Watermarking of Multimedia Content M-Commerce Applications", Research IEEE Communications Magazine, 2003. - Hartung, F. , and Girod, B, "Watermarking of uncompressed and compressed video", Elsevier, 1998, Vol 66, 283-301. - Lefèbvre, F. , Chupeau, B. , Massoudi, A. and Diehl, E. 2009. Image and Video Fingerprinting: Forensic Applications. SPIE Conference on Media Forensics and Security. - Hartung, F. and Kutter, M. 1999. Multimedia Watermarking Techniques. Proceedings of IEEE. Vol. 87. 1079-1107. - Borthakur, D, "Apache Hadoop FileSystem and its usage in Facebook, 2004. - Cox, I. J. , Kilian, J. , Leighton, F. T. and Shamoon, T. 1997. Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing. Vol. 6. 1673-1687 - Zhuhua, L. , Jing, Y. , Chuan, F. , Guoqing, Z. 2010. A Tracking Model for Enhancing Social Video Integration and Sharing. 10th IEEE International Conference on Computer and Information Technology. 1571-1576. - Jiansheng, M. , Sukang, L. and Xiaomei, T. 2009. A Digital Watermarking Algorithm Based On DCT and DWT. Proceedings of the 2009 International Symposium on Web Information Systems and Applications. 104-107. - Ramzan, N. , Patrikakis, C. , Zhang, Q. , Izquierdo, E. 2010. Analysing Multimedia Content in Social Networking Environments. SAPMIA'10 ACM. 73-76. - Kelkar, Y. , and Shaikh, H, "Analysis of Robustness of Digital Watermarking Under 2/3 Prevention of Copyright Issues of Media in Social Network Various Attacks", Multimedia Communications A Special Issue from IJCA, 2011, 47-51. - Zaidoon, Kh. Al. A. , Zaidan, A. A. , Zaidan, B. B. and Alanazi, H. O, "Overview: Main Fundamentals for Steganography", Journal of Computing, 2010, 158-165. - Cheddad, A. , Condell, J. , Curran, K. and Mc Kevitt, P. 2010. Digital Image Steganography: Survey and Analyses of Current Methods. Signal Processing. Vol. 90. 727-752 - Walia, E. , Jain, P. , Navdeep, "An Analysis of LSB & DCT based Steganography", Global Journal of Computer Science and Technology, 2010, Vol. 10, 4-8. Computer Science Index Terms Hpc Applications Keywords Spread Spectrum Dct Dwt Fingerprinting Copyright Infringement Content Sharing. 3/3