Documente Academic
Documente Profesional
Documente Cultură
CHAPTER 1
INTRODUCTION
Moving Pictures Experts Group audio layer 3 (MP3) compression format has gained
popularity for distributing digital music over the internet. The MP3 format allows raw digital
music to be compressed down to one-tenth or more in size, while still keeping reasonably
high fidelity. Further with peer to peer applications digital contents could be distributed over
the internet without control. This promotes unauthorized acts like unauthorized copying and
distributing of digital contents.
It is estimated that the music industry suffered an annual business loss of five billon
dollars. This makes major music companies hesitated to sell music in digital formats over the
internet. In order to reinforce protection and access control to digital contents, piracy
protection software was designed. This software supports a security infrastructure for the
tailor-made protected digital contents with digital rights to individual customer.
As the significant portion of trades is expected to deal with multimedia contents, digital
rights protection becomes an eminent issue in e-commerce. Digital watermarking has been
proposed as the promising technology to achieve rights management. It supports rights
information such as owner’s identity, transaction dates and serial number, to be embedded as
unperceivable signals into digital contents. For example, watermarking techniques for audios
are based on the imperfection of the human auditory system. Since human ears are insensitive
to small changes and low-amplitude echoes, watermark signals embedding rights information
can be encoded at the frequency domain by making small spectral magnitude changes. These
watermark signals recover the rights information originally embedded in a piece of digital
contents. Origins of pirate copies can thus be traced, therefore deterring unauthorized
distribution or copying of digital contents.
The roles of the customer and the content providers in the modeling of watermarking
infrastructures for digital rights are distinguished. Based on this model a novel watermarking
software is proposed to address a common problem in internet trading where customers and
content providers may not have mutual trusts.
BASICS OF PIRACY PROTECTION SOFTWARE FOR MP3
Digital rights protection is a major issue in the e-commerce of the multimedia contents.
Watermarking technology has been proposed has an enabling technology for the rights
protection of the multimedia digital contents. In order to reinforce protection and access
control this application has been developed. A unique watermark is embedded in each piece
of the multimedia content before it is distributed to the customer. So the user who buys the
multimedia contents from the content provider will have the watermarked multimedia
content. When someone tries to make an unauthorized copy of the multimedia content the
duplicate copy will also have a unique watermark embedded in each piece of the multimedia
contents. So when unauthorized copies of a piece of contents are found, the customer who
owns the content will readily identified by the embedded watermark and also the content
provider who sells the content will have the details of the customer like customer’s name,
transaction dates and serial number. However, the unauthorized copies may also come from
the content provider itself. It is therefore a challenging problem to determine whether the
unauthorized copy is distributed by an unethical party or by the unethical content provider.
The piracy protection software that has been developed has addressed this problem using
cryptographic technologies. This software employs a commutative encryption algorithm to
protect the privacy of watermarks. Information is doubly locked by two encryption keys kept
separately by the customer and the content provider. In this application the customer will get
only the watermarked content and the content provider will have no idea how the watermark
is formed.
Fig 2.1
Figure Description: This figure describes that a computer can retrieve the embedded code,
when a watermarked copy is not distinguishable from another copy.
In general, the following application domains are recognized in digital watermarking:
Copyright protection, customer identification, copy control, media annotation and integrity
protection. Beyond an application-specific distinction, watermarking algorithms differ also
with respect to a number of commonly addressed parameters: Robustness, security,
inevitability, transparency, complexity, capacity and verification method.
Watermarking complexity describes the effort and time needed to embed and retrieve
a watermark. This parameter is essential for real time applications and other time-critical
scenarios. Another aspect of complexity addresses whether the original data is required for
comparison in the retrieval process or not. It is called the latter blind watermarking schemes.
Blind approaches are commonly seen as more useful and cause less complexity of the overall
watermarking process.
Protect the privacy of the watermark in the e-commerce of digital contents over
the Internet.
It allows the customer to obtain a watermarked copy of digital contents without
revealing the watermarked copy to the content provider.
The privacy of customers’ watermarks is maintained because these watermarks
identify customers.
Commutative Encryption Algorithms.
Relative Merits:
1. The Content Provider can never know the form of the watermark.
2. The customer can get only one piece of watermarked digital contents
in the implementation of the protocol once.
The project entitled “Piracy Protection Software for MP3” is developed and designed using
the Microsoft’s language C# .Net. This application is very user friendly and it is very
innovative, it specially designed for the music industry. The main intention of this software is
to determine the unethical party who distribute the unauthorized copies of the multimedia
contents. This software can be used with very basic requirements which we usually have in
our systems. This software is designed with dialog boxes which will assist the user in using
the application. The users need not be a computer professional with the basic knowledge of
computers the user will be able to work with this application.
CHAPTER 2
SYSTEM ANALYSIS
The proposed system has to be analysed well for its merits and demerits. Our main
aim is to make use of all its merits and to remove the demerits of it. First the proposed system
is analyzed then the merits of the system are discussed.
The requirement specification of the proposed system should also be analysed so that
the hardware and software requirement of the proposed system is known in order to execute
our application. This helps the user in developing his application.
The survey of the proposed system should be made in order to find whether any
software is needed to develop our application also it has been found whether there is any
benefit to the system when using that particular software. And also it is analysed whether this
software will be useful to user.
The documentation of the proposed system is made, which helps us to collect the
details that are describing the system. And the graphical representation of the system and its
activities are presented in order to make the user understand the system. Then the records and
description of the system elements are analyzed and maintained.
Problem Definition
Due to significant loss of sales in the recent years the music industry is looking for
new distribution approaches to sell music content. One of these approaches is music on
demand. Here the customer can choose individual audio tracks, which enables him to buy
music more selectively and individually than buying complete albums with a fixed selection
of musical pieces. Digital watermarking is a technology capable of solving important
practical security problems like authentication for copyright protection or manipulation
recognition for integrity verification. This technology helps to reinforce protection and access
control. When copies do not differ, source of illegal copies cannot be identified it is shown in
fig 3.1.1
Fig 3.1.1
Figure Description: This figure describes that the illegal copies cannot be identified when
copies do not differ.
Here a customer can select and download individual audio tracks from an online shop.
Usually he downloads the music in a lossy compression file format, like mp3 or wma.
The complete process is carried out online and requires reliable authentication for
payment and high download rates for a comfortable access to the music.
CD-on-Demand
This is a hybrid approach where the selection of the musical pieces is done online via a web
interface by the customer. Here the customer can select the musical contents according to his
desire. After the selection of the tracks is done, a CD-R is burned and sent to the customer by
mail. Here the customer receives the music in full CD quality and on a physical storage
object. After the customer receives the CD he may save it in his system. Naturally a delay for
mail delivery occurs.
With respect to pirates who want to create illegal copies of the music, both methods share one
big advantage compared to music distribution via mail order or music stores: The audio files
can be watermarked before the customer receives it. This enables the personalization of the
copies. When a customer buys a CD in a store, there is no way to trace him back if an illegal
copy of this CD appears g. in a peer to peer network. If he buys via music on demand service,
e.g. his customer ID could be embedded into the songs by digital audio watermarking.
Information is doubly locked by two encryption keys kept separately by the customer and the
content provider. In this application the customer will get only the watermarked content and
the content provider will have no idea how the watermark is formed.
Fig 3.1.2
Figure Description: This figure describes that the individual copies can be traced back to the
pirate by download monitoring.
The existing system has to be analyzed well for its merits and demerits. Our main aim is to
make use of all its merits and to remove the demerits of it. First we must analyze the existing
system and we have to find the drawbacks and difficulties we face by using this system. And
proposed the new system then analyze the system and find out whether it satisfies the
requirements. And see the advantages of the proposed system and the fields where this
particular system can be used, then discuss about the merits of proposed system over the
existing system. The process of analyzing a software item to detect the differences between
existing and required conditions, and to evaluate the features of the software item
To define an issue or problem, you need to investigate, discuss, analyze and review
with input from users. If you look for solutions before you fully understand the issue, you
could have trouble clarifying what you want, and are able, to achieve.
A clear understanding of the issue is essential to the good design of a community
education project. You can identify and clarify issues in response to a recent event. Find out
what's causing concern, and break the issue down into its components. This can done by
collecting information from a variety of sources and discussing the problem with others. Find
out what others have done about this problem: what worked, what didn't, and why? Decide on
a broad goal for the focus and direction of the project.
2.1 Feasibility Study
Feasibility study refers to the over all idea of the package which we are designing. Software
feasibility has four solid dimensions. Technical- is a project technically feasible? Is it within
the state of the art? Can defects be reduced to a level matching the application’s needs?
Economical- is it financially feasible? Can development be completed at a cost the Software
organization, its client, or the market can afford? Operational- Will the project’s time-to-
market beat the competition?
This study tells about how this package is useful to the users and its advantages and
disadvantages, and also it tells whether this package is cost effective are not. There are three
types of feasibility study, they are
Economic Feasibility.
Technical Feasibility.
Operational Feasibility.
Economical Feasibility
In this project the Microsoft c# language is used for developing the piracy protection
software, c# is the product from sun Microsystems and it is provided for free of cost. So, it is
bought without spending money. Can be downloaded from the c# directory directly from the
Internet itself. So, it is not needed to look from any third party or in the market. It is freely
download it from the Internet. This software Piracy Protection Software for MP3 will be cost
effective. So there is no problem of getting licensed and to pay money and get the package
that is needed as c# is concerned can be bought for free of cost. So it will be financially
feasible to the user whoever wants to use this Piracy Protection Software.
Technical Feasibility
Technical feasibility is important, but business need is even more important. It does no good
to build a high tech system or product that no one really wants. The software for Piracy
Protection Software is developed using MP3 files is readily available with everyone so no
need to search for any requirements and this software will work only in windows XP
environment in order to pick up speed and also it is the advanced version of windows which
available with everyone. The technical requirements like hardware and software requirements
are available so it easily worked by other users. So, the software Piracy Protection for MP3 is
technically sounded.
Operational Feasibility
The Software that is developed is very user friendly. The user needs not to be a computer
programmer. Even a computer literate who knows very basic things about the computer can
work with this piracy protection software. Because this software itself will assist us in
working with multimedia contents. This software is developed in fast growing language with
updated features.
In the previous versions of Digital rights protection, the images were mostly
embedded with watermarks.
Still there are a lot of techniques for embedding watermark in the multimedia
content.
Watermarking the audio digital signals has not been developed with complete
authorization and security.
Existing system used Spatial Spread Spectrum Algorithm, where watermark
contents are easily detected and removed.
The drawbacks and difficulties that is faced in the existing system are analyzed and
are presented below
Watermarking the audio data is to protect its piracy of unauthorized persons –is a
great solution to the multimedia content provider who owns the particular content.
In Watermarking algorithms certain parameters addressed are: Robustness,
security, inevitability, transparency, complexity, capacity and verification
method.
Use of Advanced Encryption Standard – Rijndael Algorithm for encryption of
secret file.
The system proposed a real time solution for protecting the piracy of digital
content.
More than one digital content can be watermarked in a single process.
The form of the watermark inserted can be determined by the content provider
only therefore the customer do have no idea or knowledge of the watermark and
could never figure out the watermark.
The system had implemented a symmetric key encryption by Rijndael Algorithm.
Justification
The Piracy Protection Software for MP3 is a reliable product and it is very user friendly. And
also have certain features in it to design the page as per user’s wish. It is the best to
application. This is justified due to the following reasons.
SYSTEM CONFIGURATION
Requirement Specification
The hardware and software requirement specifications, which are going to be used in
order to execute our application, are first analyzed, and listed.
RAM 1 GB
Hard Disk 80 GB
Network facility
SYSTEM DESIGN
INPUT FORMAT
Language String
Password Alphanumeric
Data enter the system as input and this is the data on which the processing is performed. It is
necessary to ensure that the input design is suitable. While designing inputs, an important
aspect is the input design form. During input design it was made sure that the data to be
processed by the system was collected and entered into the system efficiently, according to
the specified requirements and with minimum number of errors and with minimum
redundancy. Validation procedure using java script was used in all entry screens to ensure the
correctness of data. The layout of the web pages was designed in a way that is cost effective
and that which is acceptable to the end user.
Once the required output is decided, we can determine what the inputs should be. The
quality of the system input determines the quality of system output.
Well-designed input forms should meet the objectives of effectiveness. All of these
are attainable through the use of basic design principles, knowledge of what is needed as
input for the system and an understanding of how user respond to different elements of forms
and screens. The data should be validated before entering it.
The input for using the software application is taken from the user i.e., the user will
give the Mp3 CD. So, the user gives the input.
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and to
other systems through outputs. In the output design it is determined how the information is to
be displayed for immediate need and also the hard copy output. It is the most important and
direct source information to the user. Efficient and intelligent output design improves the
system’s relationship the user and helps in decision-making.
Output is the information defined to the user through the information system. Users
are reliant on output in order to accomplish the tasks and the merit of the system is often
judged solely by its output.
The output for the given input is the Mp3 CD will be watermarked and given to the
user so that it is prevented from piracy. The watermarked CD given by the Piracy Protection
Software for Mp3 will be the output.
Detailed Design
Detailed Design is the second of a two-stage design process. The purpose of Detailed
Design is to:
Design
The designing module includes the data collection and the system design. The work done
in the design module includes the architectural skeleton of overall functionalities of the
system including the input to be given and the output to be produced including form design.
File Compression
The compression of the file to be inserted in to the parent file is done, and the parent file
which is maintaining the static property of the file size before and after insertion of the
watermark is found. File compression is made in order to make the process to be confidential
so that the user of the MP3 content or the distributor can be unknowledgeable about the
watermarking.
This module includes the insertion of the watermark in to the MP3 file using the
communicative encryption protocol algorithm. After embedding the watermark, the file is
converted to encrypted form mentioned in the encoding phase.
The decryption of the data encrypted in the earlier phase is made with any damage or loss
to both parent and watermark files.After decoding both the files the watermark is detected
using the communication decryption protocol algorithm.
After the successful completion of process, in the fifth module the system is subjected to
the frequency of tests in alternating the parent (MP3) file and the watermark file. The results
of the above tests conducted on the system make it to be ready for its distribution to vendors.
Now the watermarked digital contents can be sold to the customer and the details like
customer details, transaction dates and serial number are stored.
1.1 SFD/DFD
WORKING PRINCIPLE
Musician Customer
Rijndael algorithm
Giving the copyright protected album
Flow chart
Secret /Confidential File to be
embedded
Overall functionalities
of the system
Embedding
watermark with the
MP3 data
Level 0
Secret /Confidential
File to be embedded
Audio is digitally
Embedding Over all
watermark with compressed and
functionalities of
the MP3 data encoded to create
the system
MP3 audio files
Secured MP3
Data
Level 1:
SHAPING &
M -SEQUENCE
EQULZATION
m(n)
Embed data
Choose file from embed data.
Add Mp3 Files