Downloads: 124 | Views: 290 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 7.1 / 10
Content Leakage Detection by Using Traffic Pattern for Trusted Content Delivery Networks by Comparing Videos of Different Lengths
Motade Vaishali S, Deepak Gupta
Abstract: Multimedia streaming applications and services are becoming popular in recent a year, thats why issue of trusted video delivery to prevent the undesirable content leakage become critical. The conventional Systems addressed this issue by proposing methods based on observation of streamed traffic throughout the network. The job of maintaining high detection accuracy while coping with traffic variation in the network is done by conventional system. But detection performance of conventional system degrades to the significant variation of length of the video. To overcoming this issue we are proposing a novel leakage detection of content scheme that is robust to the variation of the length of the video. In this, we focus on overcoming this issue by proposing a novel content-leakage detection scheme that is robust to the variation of length of the video. By comparing the length of different videos, we determine a relation between video length to be compared and the similarity between the videos which are compared. Thus, we enhance the detection performance of the proposed scheme even in an environment subjected to variation in length of video. Through a experiment, the effectiveness of our proposed scheme is evaluated in terms of variation of video length, variation in delays, packet and data loss.
Keywords: DRM technology, Straming content, pattern matching, content leakage detection, traffic pattern
Edition: Volume 5 Issue 1, January 2016
Pages: 695 - 698
DOI: https://www.doi.org/10.21275/NOV152820
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 111
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2247 - 2250Efficient Query Handling On Big Data in Network Using Pattern Matching Algorithm: A Review
Prasadkumar Kale, Arti Mohanpurkar
Downloads: 112
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1217 - 1219Removing Dedepulication Using Pattern Serach Suffix Arrays
Pratiksha Dhande, Supriya Kumari, Sushmita Tupe, Laukik Shah
Downloads: 114
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2395 - 2398Distributed Pattern Matching: Cycle-Based Query Optimization
Rajshri G. Deshmukh, Praful B. Sambhare
Downloads: 116
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 471 - 474A Neural Network Approach to Character Recognition
Pritesh A. Pali, Anjusha Pimpalshende
Downloads: 122
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 60 - 62A Survey on Detection and Prevention of SQL Injection Attack
S. M. Chaware, Sujata S. Wakchaure