Sunteți pe pagina 1din 25

PRIVACY PROTECTION FOR MP3 DATA

CHAPTER 1
INTRODUCTION

Moving Pictures Experts Group audio layer 3 (MP3) compression format has gained
popularity for distributing digital music over the internet. The MP3 format allows raw digital
music to be compressed down to one-tenth or more in size, while still keeping reasonably
high fidelity. Further with peer to peer applications digital contents could be distributed over
the internet without control. This promotes unauthorized acts like unauthorized copying and
distributing of digital contents.

It is estimated that the music industry suffered an annual business loss of five billon
dollars. This makes major music companies hesitated to sell music in digital formats over the
internet. In order to reinforce protection and access control to digital contents, piracy
protection software was designed. This software supports a security infrastructure for the
tailor-made protected digital contents with digital rights to individual customer.

As the significant portion of trades is expected to deal with multimedia contents, digital
rights protection becomes an eminent issue in e-commerce. Digital watermarking has been
proposed as the promising technology to achieve rights management. It supports rights
information such as owner’s identity, transaction dates and serial number, to be embedded as
unperceivable signals into digital contents. For example, watermarking techniques for audios
are based on the imperfection of the human auditory system. Since human ears are insensitive
to small changes and low-amplitude echoes, watermark signals embedding rights information
can be encoded at the frequency domain by making small spectral magnitude changes. These
watermark signals recover the rights information originally embedded in a piece of digital
contents. Origins of pirate copies can thus be traced, therefore deterring unauthorized
distribution or copying of digital contents.

The roles of the customer and the content providers in the modeling of watermarking
infrastructures for digital rights are distinguished. Based on this model a novel watermarking
software is proposed to address a common problem in internet trading where customers and
content providers may not have mutual trusts.
BASICS OF PIRACY PROTECTION SOFTWARE FOR MP3
Digital rights protection is a major issue in the e-commerce of the multimedia contents.
Watermarking technology has been proposed has an enabling technology for the rights
protection of the multimedia digital contents. In order to reinforce protection and access
control this application has been developed. A unique watermark is embedded in each piece
of the multimedia content before it is distributed to the customer. So the user who buys the
multimedia contents from the content provider will have the watermarked multimedia
content. When someone tries to make an unauthorized copy of the multimedia content the
duplicate copy will also have a unique watermark embedded in each piece of the multimedia
contents. So when unauthorized copies of a piece of contents are found, the customer who
owns the content will readily identified by the embedded watermark and also the content
provider who sells the content will have the details of the customer like customer’s name,
transaction dates and serial number. However, the unauthorized copies may also come from
the content provider itself. It is therefore a challenging problem to determine whether the
unauthorized copy is distributed by an unethical party or by the unethical content provider.
The piracy protection software that has been developed has addressed this problem using
cryptographic technologies. This software employs a commutative encryption algorithm to
protect the privacy of watermarks. Information is doubly locked by two encryption keys kept
separately by the customer and the content provider. In this application the customer will get
only the watermarked content and the content provider will have no idea how the watermark
is formed.

Digital audio watermarking is often discussed as a promising technology for


protecting digital goods sold via Internet, especially music downloads. Copyright information
or customer identification can be embedded directly into audio files, which are usually
distributed using lossy compression. This leads to a number of specific requirements with
respect to watermarking robustness, transparency and complexity. There exist different
application areas for digital audio watermarking. Both the music download and the CD-on-
Demand (CoD) scenario are discussed. The requirements and challenges between online
delivery and CoD services with respect to audio watermarking are compared. And a strategy
is introduced, which is most suited for adjusting the watermarking technology for CoD and
online delivery.
A watermarking protocol is proposed to address the problem using cryptographic
technologies. This protocol employs a commutative encryption algorithm to protect the
privacy of watermarks. Two encryption keys kept separately by a customer and a content
provider doubly lock information. In the protocol, a customer only gets a piece of
watermarked multimedia contents in a transaction and the content provider has no idea how
the watermark is formed. This facilitates the authority to determine the unethical party in case
of unauthorized distribution of digital contents. Origins of pirate copies can thus be traced,
therefore deterring unauthorized distribution or copying of digital contents. Many
watermarking techniques are known for digital images, video and audio. For other data
formats like text, VRML and MIDI algorithms have also been proposed. Digital
watermarking is a highly multidisciplinary field that combines signal processing with
cryptography, communication theory, coding theory, signal compression, and the psychology
of perception.

Fig 2.1

Figure Description: This figure describes that a computer can retrieve the embedded code,
when a watermarked copy is not distinguishable from another copy.
In general, the following application domains are recognized in digital watermarking:
Copyright protection, customer identification, copy control, media annotation and integrity
protection. Beyond an application-specific distinction, watermarking algorithms differ also
with respect to a number of commonly addressed parameters: Robustness, security,
inevitability, transparency, complexity, capacity and verification method.

In this system mainly concentrate on copyright protection and customer identification.


While robustness, transparency, security and capacity are very important parameters in these
applications, we mainly discuss the challenges of audio watermarking complexity when used
in CoD and download environments.

Watermarking complexity describes the effort and time needed to embed and retrieve
a watermark. This parameter is essential for real time applications and other time-critical
scenarios. Another aspect of complexity addresses whether the original data is required for
comparison in the retrieval process or not. It is called the latter blind watermarking schemes.
Blind approaches are commonly seen as more useful and cause less complexity of the overall
watermarking process.

 Protect the privacy of the watermark in the e-commerce of digital contents over
the Internet.
 It allows the customer to obtain a watermarked copy of digital contents without
revealing the watermarked copy to the content provider.
 The privacy of customers’ watermarks is maintained because these watermarks
identify customers.
 Commutative Encryption Algorithms.
 Relative Merits:
1. The Content Provider can never know the form of the watermark.

2. The customer can get only one piece of watermarked digital contents
in the implementation of the protocol once.

3. It is easy to determine whether the unauthorized copy is produced from


unethical party or unethical content provider.
1.2 Project Overview

The project entitled “Piracy Protection Software for MP3” is developed and designed using
the Microsoft’s language C# .Net. This application is very user friendly and it is very
innovative, it specially designed for the music industry. The main intention of this software is
to determine the unethical party who distribute the unauthorized copies of the multimedia
contents. This software can be used with very basic requirements which we usually have in
our systems. This software is designed with dialog boxes which will assist the user in using
the application. The users need not be a computer professional with the basic knowledge of
computers the user will be able to work with this application.

Digital rights protection is a major issue in the e-commerce of the multimedia


contents. Watermarking technology has been proposed has an enabling technology for the
rights protection of the multimedia digital contents. In order to reinforce protection and
access control this application has been developed. A unique watermark is embedded in each
piece of the multimedia content before it is distributed to the customer. So the user who buys
the multimedia contents from the content provider will have the watermarked multimedia
content. When he tries to make an unauthorized copy of the multimedia content the duplicate
copy will also have a unique watermark embedded in each piece of the multimedia contents.
So when unauthorized copies of a piece of contents are found, the customer who owns the
content will readily identified by the embedded watermark and also the content provider who
sells the content will have the details of the customer like customer’s name, transaction dates
and serial number. However, the unauthorized copies may also come from the content
provider itself. It is therefore a challenging problem to determine whether the unauthorized
copy is distributed by an unethical party or by the unethical content provider. The piracy
protection software that has been developed has addressed this problem using cryptographic
technologies. This software employs a commutative encryption algorithm to protect the
privacy of watermarks. Information is doubly locked by two encryption keys kept separately
by the customer and the content provider. In this application the customer will get only the
watermarked content and the content provider will have no idea how the watermark is
formed.

CHAPTER 2

SYSTEM ANALYSIS

The proposed system has to be analysed well for its merits and demerits. Our main
aim is to make use of all its merits and to remove the demerits of it. First the proposed system
is analyzed then the merits of the system are discussed.
The requirement specification of the proposed system should also be analysed so that
the hardware and software requirement of the proposed system is known in order to execute
our application. This helps the user in developing his application.
The survey of the proposed system should be made in order to find whether any
software is needed to develop our application also it has been found whether there is any
benefit to the system when using that particular software. And also it is analysed whether this
software will be useful to user.
The documentation of the proposed system is made, which helps us to collect the
details that are describing the system. And the graphical representation of the system and its
activities are presented in order to make the user understand the system. Then the records and
description of the system elements are analyzed and maintained.

Problem Definition

Due to significant loss of sales in the recent years the music industry is looking for
new distribution approaches to sell music content. One of these approaches is music on
demand. Here the customer can choose individual audio tracks, which enables him to buy
music more selectively and individually than buying complete albums with a fixed selection
of musical pieces. Digital watermarking is a technology capable of solving important
practical security problems like authentication for copyright protection or manipulation
recognition for integrity verification. This technology helps to reinforce protection and access
control. When copies do not differ, source of illegal copies cannot be identified it is shown in
fig 3.1.1

Fig 3.1.1

Figure Description: This figure describes that the illegal copies cannot be identified when
copies do not differ.

Music on demand can be realized in various ways.

Two popular methods are:

Audio File Download

Here a customer can select and download individual audio tracks from an online shop.
Usually he downloads the music in a lossy compression file format, like mp3 or wma.
The complete process is carried out online and requires reliable authentication for
payment and high download rates for a comfortable access to the music.

CD-on-Demand

This is a hybrid approach where the selection of the musical pieces is done online via a web
interface by the customer. Here the customer can select the musical contents according to his
desire. After the selection of the tracks is done, a CD-R is burned and sent to the customer by
mail. Here the customer receives the music in full CD quality and on a physical storage
object. After the customer receives the CD he may save it in his system. Naturally a delay for
mail delivery occurs.

Tracking out the Loopholes

With respect to pirates who want to create illegal copies of the music, both methods share one
big advantage compared to music distribution via mail order or music stores: The audio files
can be watermarked before the customer receives it. This enables the personalization of the
copies. When a customer buys a CD in a store, there is no way to trace him back if an illegal
copy of this CD appears g. in a peer to peer network. If he buys via music on demand service,
e.g. his customer ID could be embedded into the songs by digital audio watermarking.
Information is doubly locked by two encryption keys kept separately by the customer and the
content provider. In this application the customer will get only the watermarked content and
the content provider will have no idea how the watermark is formed.

But embedding a customer ID is not promising in all music on demand scenarios.


When the music on demand service is only an alternative to shop sales of the music,
untraceable illegal copies will appear from ripped audio CDs. A good chance of stopping
illegal copies is only achieved if the music on demand service is the only source of the music.
With this given, no copies without an embedded customer ID should appear e.g. in peer to
peer networks.
The piracy protection software that has been developed has addressed this problem
using cryptographic technologies. This software employs a commutative encryption
algorithm to protect the privacy of watermarks and to reinforce the protection and access
control of the digital contents. Information is doubly locked by two encryption keys kept
separately by the customer and the content provider. In this application the customer will get
only the watermarked content and the content provider will have no idea how the watermark
is formed. So it is easy to determine whether the unauthorized copies of the musical contents
are produced from the unethical customer or the unethical content provider.

Fig 3.1.2

Figure Description: This figure describes that the individual copies can be traced back to the
pirate by download monitoring.

System Analysis of the project

The existing system has to be analyzed well for its merits and demerits. Our main aim is to
make use of all its merits and to remove the demerits of it. First we must analyze the existing
system and we have to find the drawbacks and difficulties we face by using this system. And
proposed the new system then analyze the system and find out whether it satisfies the
requirements. And see the advantages of the proposed system and the fields where this
particular system can be used, then discuss about the merits of proposed system over the
existing system. The process of analyzing a software item to detect the differences between
existing and required conditions, and to evaluate the features of the software item

To define an issue or problem, you need to investigate, discuss, analyze and review
with input from users. If you look for solutions before you fully understand the issue, you
could have trouble clarifying what you want, and are able, to achieve.
A clear understanding of the issue is essential to the good design of a community
education project. You can identify and clarify issues in response to a recent event. Find out
what's causing concern, and break the issue down into its components. This can done by
collecting information from a variety of sources and discussing the problem with others. Find
out what others have done about this problem: what worked, what didn't, and why? Decide on
a broad goal for the focus and direction of the project.
2.1 Feasibility Study

Feasibility study refers to the over all idea of the package which we are designing. Software
feasibility has four solid dimensions. Technical- is a project technically feasible? Is it within
the state of the art? Can defects be reduced to a level matching the application’s needs?
Economical- is it financially feasible? Can development be completed at a cost the Software
organization, its client, or the market can afford? Operational- Will the project’s time-to-
market beat the competition?

This study tells about how this package is useful to the users and its advantages and
disadvantages, and also it tells whether this package is cost effective are not. There are three
types of feasibility study, they are

 Economic Feasibility.
 Technical Feasibility.
 Operational Feasibility.

Economical Feasibility

In this project the Microsoft c# language is used for developing the piracy protection
software, c# is the product from sun Microsystems and it is provided for free of cost. So, it is
bought without spending money. Can be downloaded from the c# directory directly from the
Internet itself. So, it is not needed to look from any third party or in the market. It is freely
download it from the Internet. This software Piracy Protection Software for MP3 will be cost
effective. So there is no problem of getting licensed and to pay money and get the package
that is needed as c# is concerned can be bought for free of cost. So it will be financially
feasible to the user whoever wants to use this Piracy Protection Software.

Technical Feasibility

Technical feasibility is important, but business need is even more important. It does no good
to build a high tech system or product that no one really wants. The software for Piracy
Protection Software is developed using MP3 files is readily available with everyone so no
need to search for any requirements and this software will work only in windows XP
environment in order to pick up speed and also it is the advanced version of windows which
available with everyone. The technical requirements like hardware and software requirements
are available so it easily worked by other users. So, the software Piracy Protection for MP3 is
technically sounded.

Operational Feasibility

The Software that is developed is very user friendly. The user needs not to be a computer
programmer. Even a computer literate who knows very basic things about the computer can
work with this piracy protection software. Because this software itself will assist us in
working with multimedia contents. This software is developed in fast growing language with
updated features.

2.2 Existing System

 In the previous versions of Digital rights protection, the images were mostly
embedded with watermarks.
 Still there are a lot of techniques for embedding watermark in the multimedia
content.
 Watermarking the audio digital signals has not been developed with complete
authorization and security.
 Existing system used Spatial Spread Spectrum Algorithm, where watermark
contents are easily detected and removed.

Drawbacks of the Existing System

The drawbacks and difficulties that is faced in the existing system are analyzed and
are presented below

 More time to be spent.


 It is not feasible.
 Less security and unauthorized.
 Easily detected and removed.

2.3 Proposed System

 Watermarking the audio data is to protect its piracy of unauthorized persons –is a
great solution to the multimedia content provider who owns the particular content.
 In Watermarking algorithms certain parameters addressed are: Robustness,
security, inevitability, transparency, complexity, capacity and verification
method.
 Use of Advanced Encryption Standard – Rijndael Algorithm for encryption of
secret file.

Objectives of the Proposed System

 The system proposed a real time solution for protecting the piracy of digital
content.
 More than one digital content can be watermarked in a single process.
 The form of the watermark inserted can be determined by the content provider
only therefore the customer do have no idea or knowledge of the watermark and
could never figure out the watermark.
 The system had implemented a symmetric key encryption by Rijndael Algorithm.

Justification

The Piracy Protection Software for MP3 is a reliable product and it is very user friendly. And
also have certain features in it to design the page as per user’s wish. It is the best to
application. This is justified due to the following reasons.

 Piracy Protection Software is cost effective. So, it is economically feasible.


 This software is easy to use as it assists the user while working. So, it is
operationally feasible.
 The software and hardware requirements are available. So, it is technically
feasible.
CHAPTER 3

SYSTEM CONFIGURATION

Requirement Specification
The hardware and software requirement specifications, which are going to be used in
order to execute our application, are first analyzed, and listed.

3.1 Hardware Requirement (Minimum Requirement)

Processor Intel Pentium IV

RAM 1 GB

Hard Disk 80 GB

Keyboard Standard Keyboard with 104 Keys

Mouse Serial Mouse

3.2 Software Requirement

Tools .NET Framework

Platform Windows 2000


Pentium III PC with 256 MB RAM

Network facility

SYSTEM DESIGN

4.2 Input Design

INPUT FORMAT

Language String

Password Alphanumeric

Embedded data String

Extracted data String

MP3 data Streams of bites

Input and Output Design

Data enter the system as input and this is the data on which the processing is performed. It is
necessary to ensure that the input design is suitable. While designing inputs, an important
aspect is the input design form. During input design it was made sure that the data to be
processed by the system was collected and entered into the system efficiently, according to
the specified requirements and with minimum number of errors and with minimum
redundancy. Validation procedure using java script was used in all entry screens to ensure the
correctness of data. The layout of the web pages was designed in a way that is cost effective
and that which is acceptable to the end user.
Once the required output is decided, we can determine what the inputs should be. The
quality of the system input determines the quality of system output.
Well-designed input forms should meet the objectives of effectiveness. All of these
are attainable through the use of basic design principles, knowledge of what is needed as
input for the system and an understanding of how user respond to different elements of forms
and screens. The data should be validated before entering it.
The input for using the software application is taken from the user i.e., the user will
give the Mp3 CD. So, the user gives the input.
A quality output is one, which meets the requirements of the end user and presents the
information clearly. In any system results of processing are communicated to the users and to
other systems through outputs. In the output design it is determined how the information is to
be displayed for immediate need and also the hard copy output. It is the most important and
direct source information to the user. Efficient and intelligent output design improves the
system’s relationship the user and helps in decision-making.
Output is the information defined to the user through the information system. Users
are reliant on output in order to accomplish the tasks and the merit of the system is often
judged solely by its output.
The output for the given input is the Mp3 CD will be watermarked and given to the
user so that it is prevented from piracy. The watermarked CD given by the Piracy Protection
Software for Mp3 will be the output.

Detailed Design

Detailed Design is the second of a two-stage design process. The purpose of Detailed
Design is to:

 Make as many design decisions as possible before investing in coding effort


 Provide for developer design review
 Provide programmer documentation
For ease of developer’s understanding for implementation, DD is prepared, which
contains detailed data structure of the software and that, which conforms to the relevant HLD
in order to match the customer’s requirements. Understand the overall functional behavior of
the module. Identify the internal and external interfaces. Determine the inputs and outputs
including the intermediate outputs. Identify the possible error conditions (such as divide by
zero, file overflow, limit exceeds, invalid characters), i.e. System errors, computational errors
and Operation conditions. Dividing into modules develops the Piracy Protection Software for
Mp3. The modules divided are Design, File Compression, Watermark Insertion and
Encoding, Decoding and Watermark Detection and Testing and Implementation.

Design

The designing module includes the data collection and the system design. The work done
in the design module includes the architectural skeleton of overall functionalities of the
system including the input to be given and the output to be produced including form design.

File Compression

The compression of the file to be inserted in to the parent file is done, and the parent file
which is maintaining the static property of the file size before and after insertion of the
watermark is found. File compression is made in order to make the process to be confidential
so that the user of the MP3 content or the distributor can be unknowledgeable about the
watermarking.

Watermark insertion and encoding

This module includes the insertion of the watermark in to the MP3 file using the
communicative encryption protocol algorithm. After embedding the watermark, the file is
converted to encrypted form mentioned in the encoding phase.

Decryption and Detection of watermark

The decryption of the data encrypted in the earlier phase is made with any damage or loss
to both parent and watermark files.After decoding both the files the watermark is detected
using the communication decryption protocol algorithm.
After the successful completion of process, in the fifth module the system is subjected to
the frequency of tests in alternating the parent (MP3) file and the watermark file. The results
of the above tests conducted on the system make it to be ready for its distribution to vendors.
Now the watermarked digital contents can be sold to the customer and the details like
customer details, transaction dates and serial number are stored.

4.3 Table Design

1.1 SFD/DFD

WORKING PRINCIPLE

ARCHITECTURAL FRAMEWORK DIAGRAM

Musician Customer

Requesting for buying music album

Rijndael algorithm
Giving the copyright protected album

Download the Mp3 files

Bargain for lost amount

Flow chart
Secret /Confidential File to be
embedded

Overall functionalities
of the system

Embedding
watermark with the
MP3 data

Secured MP3 Data

Secret /Confidential File to be


embedded

Embedding watermark Over all Audio is digitally


with the MP3 data functionalities of compressed and
the system encoded to create MP3
audio files
Secured MP3
Data
Dataflow Diagram

Level 0

Secret /Confidential
File to be embedded

Audio is digitally
Embedding Over all
watermark with compressed and
functionalities of
the MP3 data encoded to create
the system
MP3 audio files

Secured MP3
Data

Level 1:

SHAPING &
M -SEQUENCE
EQULZATION

m(n)

EQUALIZATION y(n) c(m)


CORRELATION BLOCK POWER
INTEGR-ATION
CALCULATION NORMA-
FILTER
LIZATION

SYNCHRONIZATI PAYLOAD PEAK


ON ADJUSTMENT EXTRACTION INFORMATION
Homepage

This is a page where language blocks are indicates.

Embed and Extract data


This page shows embed and extract data fields.

Embed data
Choose file from embed data.
Add Mp3 Files

This page shows adding MP3 files.

S-ar putea să vă placă și