Published Fast: - If it's accepted, We aim to get your article published online in 48 hours.

Home / Articles

No Article found
TRAITOR TRACING AND SECURE TRANSMISSION OF FILES IN NETWORKS
Author Name

S.Vasanth Kumar , N.Murugan

Abstract

Today in the competitive world transferring of files from on source to another destination without attacks is a challenging one. we can achieve easily by traitor tracing method. It is a copy right detection system which works by tracing the source of leaked files rather than by direct protection. When a copy of it is leaked to the public, the distributor adds a unique value to each copy given out. Watermarking is the key technology adopted by contemporary methods has many limitations and does not realistic for real time applications like video conference systems-learning systems, remote diagnosis systems and so on. But in proposed system, it can watch all the process from source to destination. Keywords—Digital Rights Management (DRM), traitor tracing, watermarking, digital fingerprinting.



Published On :
2020-08-13

Article Download :
Publish your academic thesis as a book with ISBN Contact – connectirj@gmail.com
Visiters Count :