Piracy Protection Software for Audio files: [Essay Example], 628 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Piracy Protection Software for Audio files

Print Download now

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

The project “Piracy Protection Software for Audio files” is developed and designed using the Microsoft’s language C# .Net. This application is very user friendly and it is very innovative, it specially designed for the music industry. The main intention of this software is to determine the unethical party who distribute the unauthorized copies of the multimedia contents. The users need not be a computer professional with the basic knowledge of computers the user will be able to work with this application.

Digital rights protection is a major issue in the e-commerce of the multimedia contents. Watermarking technology has been proposed has an enabling technology for the rights protection of the multimedia digital contents. In order to reinforce protection and access control this application has been developed. A unique watermark is embedded in each piece of the multimedia content before it is distributed to the customer. So the user who buys the multimedia contents from the content provider will have the watermarked multimedia content. When he tries to make an unauthorized copy of the multimedia content the duplicate copy will also have a unique watermark embedded in each piece of the multimedia contents. So when unauthorized copies of a piece of contents are found, the customer who owns the content will readily identified by the embedded watermark and also the content provider who sells the content will have the details of the customer like customer’s name, transaction dates and serial number. This software employs a commutative encryption algorithm to protect the privacy of watermarks.

Existing System

  • Images were mostly embedded with watermarks.
  • More time to be spent.
  • It is not feasible.
  • Less security and unauthorized.
  • Easily detected and removed.

Proposed System

  • Watermarking the audio data is to protect its piracy of unauthorized persons –is a great solution to the multimedia content provider who owns the particular content.
  • The form of the watermark inserted can be determined by the content provider only therefore the customer do have no idea or knowledge of the watermark and could never figure out the watermark.
  • The system had implemented a symmetric key encryption.

Modular Design

Software is divided into separately named and addressable components, called modules that are integrated to satisfy problem requirements. The modular design is just another name for one of the most important design principles, which states that we should strive to minimize the inventory of different elements and materials used in any single composition. This principle is immensely powerful and universally applicable. By enforcing consistency and integrity, modular design makes our work not only easier but, more importantly, better and understandable. The modules are presented below.

  • Encoding
  • Protocol employs a commutative encryption algorithm to protect the privacy of watermarks. Two encryption keys kept separately by a customer and a content provider doubly lock information. In the protocol, a customer only gets a piece of watermarked multimedia contents in a transaction and the customer has no idea how the watermark is formed.

  • Watermarking
  • Watermarking technology has been proposed has an enabling technology for the rights protection of the multimedia digital contents. In order to reinforce protection and access control this application has been developed. A unique watermark is embedded in each piece of the multimedia content before it is distributed to the customer. So the user who buys the multimedia contents from the content provider will have the watermarked multimedia content.

  • Decoding and Detection of watermark.
  • When unauthorized copies of a piece of contents are found, the customer who owns the content will readily identified by the embedded watermark and also the content provider who sells the content will have the details of the customer like customer’s name, transaction dates and serial number.

Hardware Requirement

  • Processor – Intel i3
  • CPU -1 GHz
  • RAM – 2 GB
  • Monitor – 17” color monitor
  • Hard Disk – 500 GB
  • Keyboard – Standard Keyboard with 104 Keys
  • Mouse – Optical Mouse
  • Software Requirement

  • Tools – .NET Framework
  • Programming Language – C#
  • Platform – Windows 7.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2019, February, 11) Piracy Protection Software for Audio files. Retrived February 19, 2020, from https://gradesfixer.com/free-essay-examples/piracy-protection-software-for-audio-files/
"Piracy Protection Software for Audio files." GradesFixer, 11 Feb. 2019, https://gradesfixer.com/free-essay-examples/piracy-protection-software-for-audio-files/. Accessed 19 February 2020.
GradesFixer. 2019. Piracy Protection Software for Audio files., viewed 19 February 2020, <https://gradesfixer.com/free-essay-examples/piracy-protection-software-for-audio-files/>
GradesFixer. Piracy Protection Software for Audio files. [Internet]. February 2019. [Accessed February 19, 2020]. Available from: https://gradesfixer.com/free-essay-examples/piracy-protection-software-for-audio-files/
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

close

Thanks!

Your essay sample has been sent.

Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

thanks-icon Order now
boy

Hi there!

Are you interested in getting a customized paper?

Check it out!
Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.