Bisapongu Spandana, T. Shesagiri


Because the methods for fingerprinting were available for nearly a long time, the initial few proposals in this area are definitely not these days’ needs for instance scalability for a lot of buyers additionally to conservation of buyer privacy.  We have got we've got the technology of recombined fingerprint needs a difficult graph search for traitor tracing, which requires participation of other buyers, additionally to honest proxies within its peer to determine distribution situation.  Our recommended system develops from earlier works of recombined fingerprints which overcome these drawbacks and focuses on creating a ingenious, efficient privacy-preserving additionally to see to determine basis fingerprinting system. It develops from fingerprinting system introduced thought of instantly recombined fingerprints within peer to determine systems.  As recommended system utilizes public key  encryption in distribution additionally to traitor tracing protocols, it's remember that this file encryption is simply functional to short bit strings, like binary fingerprints additionally to hashes. The fragments of content are encrypted by means of symmetric cryptography, that's greatly efficient.


Fingerprinting; Privacy-Preserving; Recombined Fingerprints; Peer To Peer; Public Key Encryption; Buyer Privacy;


D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 24, pp. 84–90, Feb. 1981.

I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. Burlington, MA, USA: Morgan Kaufmann, 2008.

J. Domingo-Ferrer and D. Megıas, “Distributed multicast of fingerprinted content based on a rational peer-to-peer community,” Comput. Commun., vol. 36, pp. 542–550, Mar. 2013.

B. Pfitzmann and M. Waidner, “Anonymous fingerprinting,” in Proc. 16th Ann. Int. Conf. Theory Appl. Cryptographic Techn., 1997, pp. 88–102.

B. Pfitzmann and A.-R. Sadeghi, “Coin-based anonymous fingerprinting,” in Proc. 17th Ann. Int. Conf. Theory Appl. Cryptographic Techn., 1999, pp. 150–164.

R. O. Preda and D. N. Vizireanu, “Robust wavelet-based video watermarking scheme for copyright protection using the human visual system,” J. Electron. Imaging, vol. 20, pp. 013022–013022-8, Jan.–Mar. 2011.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at