0% found this document useful (0 votes)
63 views

Cloud-Based Multimedia Content Protection System: - R.ABINAYA (2015614002)

The document proposes a new cloud-based system for protecting multimedia content. It has two key components - a method for creating signatures of 3D videos that captures depth signals, and a distributed matching engine for comparing objects at scale. The system aims to accurately detect copies, be computationally efficient, scale to different workloads, and minimize costs through cloud infrastructure.

Uploaded by

Abi Abinaya
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

Cloud-Based Multimedia Content Protection System: - R.ABINAYA (2015614002)

The document proposes a new cloud-based system for protecting multimedia content. It has two key components - a method for creating signatures of 3D videos that captures depth signals, and a distributed matching engine for comparing objects at scale. The system aims to accurately detect copies, be computationally efficient, scale to different workloads, and minimize costs through cloud infrastructure.

Uploaded by

Abi Abinaya
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

CLOUD-BASED MULTIMEDIA

CONTENT PROTECTION SYSTEM


-R.ABINAYA (2015614002)
INTRODUCTION
The proposed system has a new design for large-scale multimedia content protection
systems. The design leverages cloud infrastructures to provide cost efciency, rapid deployment,
scalability and elasticity to accommodate varying workloads. The system can be used to protect
different multimedia content types including 2-D videos, 3-D videos, images, audio clips, songs,
and music clips. The system can be deployed on private or public clouds. They have
implemented the proposed system and deployed it on two clouds, Amazon cloud and private
cloud. They have compared the system to the protection system used by YouTube and our results
show that the YouTube protection system fails to detect most copies of 3-D videos, while this
system detects more than 98% of them. This comparison shows the need for the proposed 3-D
signature method, since the state-of-the-art commercial system was not able to handle 3-D
videos.
TWO METHODS
It has two novel components one is the method to create signatures of 3-D videos, and the
other is distributed matching engine for multimedia objects.

The signature method creates robust and representative signatures of 3-D videos that
capture the depth signals in these videos and it is computationally efcient to compute
and compare as well as it requires small storage.
The distributed matching engine achieves high scalability and it is designed to support
different multimedia objects.

DESIGN GOALS
The following four goals as the most important in multimedia content protection systems.

Accuracy: The system should have high accuracy in terms of nding all copies while not
reporting false copies. Achieving high accuracy is challenging, because copied
multimedia objects typically undergo various modications.
Computational Efciency: The system should have short response time to report copies,
especially for timely multimedia objects such as sports videos. The content protection
system should be able to process many objects over a short period of time.

Scalability and Reliability: The system should scale (up and down) to different number
of multimedia objects. Scaling up means adding more objects because of monitoring
more online hosting sites, having more content owners using the system and the
occurrence of special events.
Cost Efciency: The system should minimize the cost of the needed computing
infrastructure. The approach to achieve this goal is to design our system to effectively
utilize cloud computing infrastructures.

ARCHITECTURE AND OPERATIONS


A content protection system has three main parties
1. Content owners
2. Hosting sites
3. Service providers.
The rst party is interested in protecting the copy right of some of its multimedia objects.
The second party is used for nding whether these objects or parts of them are posted on hosting
sites. The third party is the entity that offers the copy nding service to content owners by
checking hosting sites.

The proposed system has following main components,

Distributed Index: Maintains signatures of objects that need to be protected


Reference Registration: Creates signatures from objects that content owners are interested
in protecting and inserts them in the distributed index.

Query Preparation: Creates signatures from objects downloaded from online sites, which
are called query signatures. It then uploads these signatures to a common storage.
Object Matching: Compares query signatures versus reference signatures in the
distributed index to nd potential copies. It also sends notications to content owners if
copies are found.
Parallel Crawling: Downloads multimedia objects from various online hosting sites.

OVERVIEW OF SYSTEM

The goal of the proposed system for multimedia content protection is to nd illegally
made copies of multimedia objects over the Internet.
In general, systems for multimedia content protection are large-scale and complex with
multiple involved parties.
In this system, we start by identifying the design goals for such systems and our
approaches to achieve them.
Then, we present the high-level architecture and operation of our proposed system. Two
key components of the proposed system are presented.
The rst one is a new method for creating signatures of 3-D videos. Our method
constructs coarse-grained disparity maps using stereo correspondence for a sparse set of
points in the image.
The second key component in our system is the distributed index, which is used to match
multimedia objects characterized by high dimensions.
The distributed index is implemented using the MapReduce framework and our
experiments showed that it can elastically utilize varying amount of computing resources
and it produces high accuracy.

MERITS

The design achieves rapid deployment of content protection systems, because it is based
on cloud infrastructures that can quickly provide computing hardware and software
resources.
The design is cost effective because it uses the computing resources on demand. The
design can be scaled up and down to support varying amounts of multimedia content
being protected.
This deployment model was used to show the exibility of our system, which enables it
to efciently utilize varying computing resources and minimize the cost, since cloud
providers offer different pricing models for computing and network resources.

CONCLUSION
Distributing copyrighted multimedia objects by uploading them to online hosting sites
such as YouTube can result in signicant loss of revenues for content creators. Systems needed to

nd illegal copies of multimedia objects are complex and large scale. In this paper, we presented
a new design for multimedia content protection systems using multi-cloud infrastructures. The
experiments showed that the proposed 3-D signature produces high accuracy in terms of both
precision and recall and it is robust to many video transformations including new ones that are
specic to 3-D videos such as synthesizing new views. The proposed system supports different
multimedia content types and it can be deployed on private or public clouds. Thus, it captures the
depth signal of the 3-D video, without explicitly computing the exact depth map, which is
computationally expensive.

You might also like