Downloads: 124 | Views: 286 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 7.1 / 10
Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks by Comparing Videos of Different Lengths
Motade Vaishali S, Deepak Gupta
Abstract: Multimedia streaming applications and services are becoming popular in recent a year, thats why issue of trusted video delivery to prevent the undesirable content leakage become critical. The conventional Systems addressed this issue by proposing methods based on observation of streamed traffic throughout the network. The job of maintaining high detection accuracy while coping with traffic variation in the network is done by conventional system. But detection performance of conventional system degrades to the significant variation of length of the video. To overcoming this issue we are proposing a novel leakage detection of content scheme that is robust to the variation of the length of the video. In this, we focus on overcoming this issue by proposing a novel content-leakage detection scheme that is robust to the variation of length of the video. By comparing the length of different videos, we determine a relation between video length to be compared and the similarity between the videos which are compared. Thus, we enhance the detection performance of the proposed scheme even in an environment subjected to variation in length of video. Through a experiment, the effectiveness of our proposed scheme is evaluated in terms of variation of video length, variation in delays, packet and data loss.
Keywords: DRM technology, Straming content, pattern matching, content leakage detection, traffic pattern
Edition: Volume 5 Issue 1, January 2016
Pages: 695 - 698
DOI: https://www.doi.org/10.21275/NOV152820
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 105
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 2681 - 2687Power Efficient QoS and Failover Routing in Tethernet
Kavita Sharma, Puneet Rani
Downloads: 107
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 979 - 982Delay-Tolerant Bulk Information Transfers on the Web
A. Amarnath
Downloads: 111
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2247 - 2250Efficient Query Handling On Big Data in Network Using Pattern Matching Algorithm: A Review
Prasadkumar Kale, Arti Mohanpurkar
Downloads: 112
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1217 - 1219Removing Dedepulication Using Pattern Serach Suffix Arrays
Pratiksha Dhande, Supriya Kumari, Sushmita Tupe, Laukik Shah
Downloads: 113 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 996 - 998Induced Physical and Chemical Mutagensis on Seed Germination of Chickpea (Cicer arietinum L.)
Manisha G. Nagargoje, Navnath G. Kashid