SECURE SYSTEM BASED ON RECOMBINED FINGERPRINTS FOR SHARING MULTIMEDIA FILES IN PEER TO PEER NETWORKS

D.Amu .
2015 International Journal of Research in Engineering and Technology  
In this paper the execution time is less when compared to previous algorithm. And also it provide security between the merchant and buyer The traitor tracing protocol is used to detect the illegal transaction. Here we used fingerprinting solution to avoid illegal redistribution of multimedia contents. Here we convert the multimedia video file into image then encrypting the image after the encrypted image will be transferred from merchant to buyer. The buyer receives the copyright protection
more » ... merchant, he decrypts the image then converts it into video. After that, the copyright protection of file is transferred to child buyer. Then tracing traitor protocol is used to checks the fingerprints for merchant to buyer and buyer to child buyer. Traitor tracing protocol is used to detect the illegal transaction of the content. The Blowfish algorithm is used to encrypt and decrypt the multimedia files. Finally we detect the performance of our work based on efficiency, accuracy and we achieve security.
doi:10.15623/ijret.2015.0406011 fatcat:tcxw3zoe35b75fog7eann6s5pu