As the rapid development of broadband technologies and the advancement of high-speed networks,the video streaming applications and service’s popularity over the Internet has increased. The protection of the bit stream from unauthorized use, duplication and distribution is the key concern in video streaming services. Digital Rights Management (DRM) is one of the most popular approaches to prevent undesirable contents distribution to unauthorized users but it have no significant effect on redistribution of contents, decrypted or at the user-side by authorized yet malicious users and content leakage. Also preserving user privacy, conventional systems have addressed this issue by proposed methods based on the observation of streamed traffic throughout the network. These conventional systems maintain high detection accuracy while coping with some of the traffic variation in the network. However, the detection performance considerably degrades due to the significant variation of video lengths. This work proposes a contentleakage detection scheme that is robust to the variation of the video length. By comparing videos of different lengths, a relation between the length of videos to be compared and the similarity between the compared videos is determined. Therefore, the detection performance of the proposed scheme even in an environment subjected to variation in length of video will enhance. The effectiveness of proposed scheme is evaluated in terms of variation of video length, delay variation, and packet loss. Also, increased in bandwidth, which enhance the performance of transmission, include a module to enhance the performance of overall system.
Keywords |
content-leakage, Traffic pattern |
INTRODUCTION |
In recent years, with the rapid advance in broadband technology, digital contents delivery applications have been used
widely. The streaming technology has made the contents delivery more popular. Due to the increasing popularity of
multimedia streaming applications and services, the issue of trusted video delivery to prevent undesirable contentleakage
has, indeed, become critical .The popularity of real-time video streaming applications and services over the
Internet has increased by leaps and bounds. A huge population of users from all around the world with diverse contents,
ranging from daily news feeds to entertainment feeds including music, videos, sports, and so forth is served, by using
streaming transmission technologies. Also, with virtual private networks (VPNs), real-time video streaming
communications such as web conference in intra company networks or via Internet are being widely deployed in a large
number of corporations as a powerful means of efficiently promoting business activities without additional costs.Rather
than packet filtering by firewall-equipped way out nodes is an easy solution to avoid leakage of streaming contents to
external networks. In this solution, the packet header information that is destination and source Internet protocol
addresses, protocol type, and port number of outgoing traffic, of every streamed packet is inspected. In case the
inspected packets do not verify the predefined filtering policy, they are blocked and dropped .It is difficult to entirely
prevent streaming content leakage by means of packet filtering alone because the packet header information of
malicious users is unspecified beforehand and can be easily spoofed. The existing proposals monitor information
obtained at different nodes in the middle of the streaming path. The retrieved information are used to generate traffic
patterns which appear as unique waveform per content just like a fingerprint. The generation of traffic pattern does not
require any information on the packet header, and therefore preserves the user’s privacy. Leakage detection is then performed by comparing the generated traffic patterns. In this paper, the focus is on the illegal redistribution of
streaming content by an authorized user to external networks. |
LITERATURE SURVEY |
In 2014, Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah and NeiKato,Fellow proposed a paper on “Traffic
Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks”. There is no requirement of any
information on the packet header in the generation of traffic pattern, and therefore preserves the user’s privacy. The
detection of leakage is then performed by comparing the generated traffic patterns. However,in the leakage detection
performance, the existence of videos of different length in the network environment causes a considerable degradation.
Hence,by comparing different length videos, developing an innovative leakage detection method robust to the variation
of video lengths is indeed required. |
In 2011 ,K. Ramya, D. RamyaDorai, Dr. M. Rajaram proposed paper on “Tracing Illegal Redistributors of
Streaming Contents using Traffic Patterns” .The packet size-based traffic pattern generatoradaptation, instead of the
time slot based one used in T-TRAT, enables P-TRAT to accomplish robustness to packet delay jitter. The DP
matching employment as a pattern matching technique permits DP-TRAT to remove the effect of packet losses. In
addition, with significant results on the relations between such algorithms, and the robustness to packet reordering and
encryption provides us by their work. However, the important concern in adopting both time slots based and packet
size-based traffic generators consisted in the issue of packet reordering, which may have a substantial impact upon the
performances of all the conventional methods.[2] |
In 2006 ,S. Amarasing and M. Lertwatechakul proposed a paper on “The Study of Streaming Traffic
Behavior,” KKU Eng. J., vol. 33, no. 5, pp. 541-553. The understanding of streaming traffic behavior is still
advantageous for network system development to capably support streaming traffic in the future. To observe the
different traffic behaviors of on-demand traffic (stored-media traffic) and real-time live trafficis the main objective.
Moreover, also the study of the relation between encoding bit rates and streaming traffic behavior is carried out.[3] |
In 2006 M. Dobashi, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, proposed paper “Traitor Tracing
Technology of Streaming Contents Delivery Using Traffic Pattern in Wired/Wireless Environments,” propose a system
to detect illegal contents streaming by using only traffic patterns which are assembled from the amount of traffic
traversing routers. They also investigate a way to cope with random errors and burst errors which occur regularly in
wireless environment and show the agreeable result which they have obtained in a practical testing environment.[4] |
In 1995, D. Geiger, A. Gupta, L.A. Costa, and J. Vlontzosproposed a paper on “Dynamic Programming for
Detecting, Tracking, and Matching Deformable Contours” Particular this approach as applied to medical images, the
main field of applications considered, was first considered in. The formulation of the cost functions has been subjective
by their work. Minimizing an energy function is a typical way to identify deformable shapes. A constraint of this
approach has been that the algorithms are slow, iterative, and not guaranteed to discover the global minimum.
Moreover, they argue that some of the user input data has not been utilized by previous methods.[5] |
PROBLEM STATEMENT AND DISCUSSION |
In existing system,the illegal redistribution of streaming content by an authorized user to external networks is focused.
The existing proposals display information obtained at different nodes in the middle of the streaming path. The
retrieved information are used to create traffic patterns which appear as unique waveform per content , just like a
fingerprint. Any information on the packet header is not required for the generation of traffic pattern, and therefore
preserves the user’s privacy. Leakage detection is then achieved by comparing the generated traffic patterns. However,
the presence of videos of different length in the network environment causes a substantial degradation in the leakage
detection performance. Thus, developing an innovative leakage detection method stout to the variation of video lengths
is, indeed required. |
DESCRIPTION OF THE PROPOSED WORK |
Streaming contents are sent from the delivery server to the user, and the traffic is witnessed at the server side and the
user side. Traffic patterns are then created at the packet observation points and sent to the server, where the matching
procedure is performed. To handle variation in network environment such as delay, jitter, and packet loss, we placed
the bridge in the middle of the server and the user. P-TRAT- and DP-TRAT based detection performances are used as
comparison to our proposed method. These indexes are widely used in recognition techniques and performance
calculation of web information retrieval systems. It is worth noting that the larger the accuracy and the recall ratio, the
better the leakage detection performance. However, a tradeoff relation exists between the exactness and the recall ratio.
We consider both and define their harmonic mean F-measure .The organization of the system is as follows: A typical
video leakage scenario, detection system and procedures are described. Then, first we illustrate the drawback of the
existing scheme due to the variation of video length in realistic environment, then we termed the proposed leakage
detection scheme, and we evaluate its calculation cost in judgment to that of the existing scheme. Furthermore, we
evaluate the usefulness and the accuracy of the proposed scheme with respect to different length videos, and its
robustness to network environment changes. |
Proposed Work can be divided into following modules: |
• Collection of Video Data set. |
• Development of traffic pattern extraction based on the data contained in video. |
• Development of server to handle multiple sized video and video fingerprints based on user. |
• Development of client for user login and fetching of video from server. |
• Modification in server and client to support multi socket based communication for improved bandwidth. |
• Request of video by client to server, and recognition of traffic pattern at server, and prevention of content
leakage through the fingerprint saved in module3. |
• Result evaluation and optimization of system to find delay, throughput, size in video distribution. |
MODULES DESCRIPTION |
Collection of Video Data set : |
In this module, I collected a set of Videos which will be streamed by the client. This set of videos will be
stored on the Server side. Whenever any request for any of the available videos will come, the Server will serve the
video after authorization of the Client. |
Development of traffic pattern extraction based on the data contained in video: |
Any video has its attributes such as its Size in Kilobytes, its Length in Seconds etc. So proposed to create a
traffic pattern which will be based on the information regarding specific video. |
Development of server to handle multiple sized video and video fingerprint based on user : |
In this module, practically a Server will be created which will serve to the Client’s requests. By means of
Traffic pattern, each of the video in the Video Data Set will be uniquely identified by the characteristic components of
the video. |
Development of client for user login and fetching of video list from server : |
After creation of the Server, any number of Clients can be created. The clients will have to login to the Server.
After that, each of the Clients will be able to fetch the available video list contained in Video Data Set. |
Modification in server and client to support multi socket based communication for improved bandwidth : |
In further modification in Server and Client, it will use the multiple sockets. This will result in improvement of
the bandwidth. In typical Client-Server communication, the Server has a socket which is bound to a specific port
number. But here it will use multiple sockets to improve the bandwidth. |
Request of video by client to server, and recognition of traffic pattern at server, and prevention of content leakage through the fingerprint saved in module 3. : |
In this module, Client will request for any of the video from Video Data Set. Server will recognize the traffic
pattern of the requested video. We have the fingerprint of each of the video, so matching the requested fingerprint, the
Server will feed the video to the Client. |
Result evaluation and optimization of system to find delay, throughput, and size of video distribution : |
In this last module, the result of the streaming is evaluated. Also the Output and throughput of the distribution
of video is calculated. |
EXPERIMENTAL RESULT AND ANALYSIS |
This section show the performance analysis of the system and the result gatherd from the the system works with the
single socket streaming and also with the multi socket streaming. But in proposed system, as it is happening through
multi socket, it takes less time as compared to the existing one. Also its accuracy depends on the throughput, its giving. |
|
|
Graph 1 represent the Graph of the proposed system For time required w.r.t.different lenghts of videos. Here we can see
that the time required for the multi socket system is less than time required in multi socket system. That means if
comminication happens through the multi socket system then it will be fast commincation than the single socket
system. |
|
The table 2 represent the value obtained for the throughput in single streaming and in multi streaming system.The
Throughput can be given as the Length of video by time required to be transmit. |
|
The figure 2 represents the throughput w.r.t different lengths if videos. As time required for transmission in multi
socket system is less ,the throughput will be more As compared to the single socket streaming. |
COMPARATIVE ANALYSIS OF PROPOSED SYSTEM WITH EXISTING SYSTEM |
|
From the graph 6.3 and 6.4 we can say that the accuracy required for the proposed system is more than the accuracy in
existing system with respect to the lengths of different videos. The lengths are in sec. Hence from above comparison we
can say that the proposed system is better than the existing one. |
|
From the above graph 5 we can see the comparison of existing system and proposed system and we found that the
accuracy w.r.t. packet loss in proposed system is more than the existing system. As the streaming is happening through
the multi socket the packet are sent from the multi sockets, hence possibility of packet loss is very less. So the accuracy
is more in proposed system and again the proposed system is said to be better in accuracy as compared to existing. |
CONCLUSIONS |
The content leakage detection system based on the fact that each streaming content has a inimitable traffic pattern is an
innovative solution to prevent illegal redistribution of contents by a regular, yet malevolent user. Though three typical
conventional methods, show robustness to delay, jitter or packet loss, the detection performance drops with
considerable variation of video lengths. This system tries to solve these issues by introducing a dynamic leakage
detection scheme. Moreover, we investigate the performance of the proposed method under a network environment
with videos of different lengths. The proposed method allows malleable and accurate streaming content leakage detection independent of the length of the streaming content, which enhances secured and trusted content delivery. And
also use the conception of bandwidth enhancement for the better performance.And we found that the proposed system
is better than the existing system. |
References |
- Hiroki Nishiyama, Desmond Fomo, Zubair Md. Fadlullah,, and NeiKato,Fellow,” Traffic Pattern-Based Content Leakage Detection for Trusted Content Delivery Networks” IEEE Transaction on Parallel and Distributed System , Volume 25, No 2 Feb 2014
- K. Ramya, D. RamyaDorai, Dr. M. Rajaram “Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns” IJCA 2011
- S. Amarasing and M. Lertwatechakul, “The Study of Streaming Traffic Behavior,” KKU Eng. J., vol. 33, no. 5, pp. 541-553, Sept./Oct. 2006.
- M. Dobashi, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, “Traitor Tracing Technology of Streaming Contents Delivery Using Traffic Pattern in Wired/Wireless Environments,” Proc. IEEE Global Telecomm. Conf., pp. 1-5, Nov./Dec. 2006.
- Y. Chu, S.G. Rao, S. Seshan, and H. Zhang, “Enabling Conferencing Applications on the Internet Using an Overlay Multicast Architecture,” Proc. ACM SIGCOMM, pp. 55-67,Aug.
- D. Geiger, A. Gupta, L.A. Costa, and J. Vlontzos, “Dynamic Programming for Detecting, Tracking, and Matching Deformable Contours,” Proc. IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 17, no. 3, pp. 294-302, Mar. 1995.
- R.S. Naini and Y. Wang, “Sequential Traitor Tracing,” IEEE Trans. Information Theory, vol. 49, no. 5, pp. 1319-1326, May 2003
- O. Adeyinka, “Analysis of IPSec VPNs Performance in a Multimedia Environment,” Proc. Fourth Int’l Conf. Intelligent Environments, pp. 25-30, 2008
- A. Asano, H. Nishiyama, and N. Kato, “The Effect of Packet Reordering and Encrypted Traffic on Streaming Content Leakage Detection (Invited Paper),” Proc. Int’l Conf. Computer Comm. Networks (ICCCN ’10), pp. 1-6, Aug. 2010.
|