Piracy Protection Software for Audio files: [Essay Example], 628 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Piracy Protection Software for Audio Files

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

The project “Piracy Protection Software for Audio files” is developed and designed using the Microsoft’s language C# .Net. This application is very user friendly and it is very innovative, it specially designed for the music industry. The main intention of this software is to determine the unethical party who distribute the unauthorized copies of the multimedia contents. The users need not be a computer professional with the basic knowledge of computers the user will be able to work with this application.

Digital rights protection is a major issue in the e-commerce of the multimedia contents. Watermarking technology has been proposed has an enabling technology for the rights protection of the multimedia digital contents. In order to reinforce protection and access control this application has been developed. A unique watermark is embedded in each piece of the multimedia content before it is distributed to the customer. So the user who buys the multimedia contents from the content provider will have the watermarked multimedia content. When he tries to make an unauthorized copy of the multimedia content the duplicate copy will also have a unique watermark embedded in each piece of the multimedia contents. So when unauthorized copies of a piece of contents are found, the customer who owns the content will readily identified by the embedded watermark and also the content provider who sells the content will have the details of the customer like customer’s name, transaction dates and serial number. This software employs a commutative encryption algorithm to protect the privacy of watermarks.

Existing System

  • Images were mostly embedded with watermarks.
  • More time to be spent.
  • It is not feasible.
  • Less security and unauthorized.
  • Easily detected and removed.

Proposed System

  • Watermarking the audio data is to protect its piracy of unauthorized persons –is a great solution to the multimedia content provider who owns the particular content.
  • The form of the watermark inserted can be determined by the content provider only therefore the customer do have no idea or knowledge of the watermark and could never figure out the watermark.
  • The system had implemented a symmetric key encryption.

Modular Design

Software is divided into separately named and addressable components, called modules that are integrated to satisfy problem requirements. The modular design is just another name for one of the most important design principles, which states that we should strive to minimize the inventory of different elements and materials used in any single composition. This principle is immensely powerful and universally applicable. By enforcing consistency and integrity, modular design makes our work not only easier but, more importantly, better and understandable. The modules are presented below.

  • Encoding
  • Protocol employs a commutative encryption algorithm to protect the privacy of watermarks. Two encryption keys kept separately by a customer and a content provider doubly lock information. In the protocol, a customer only gets a piece of watermarked multimedia contents in a transaction and the customer has no idea how the watermark is formed.

  • Watermarking
  • Watermarking technology has been proposed has an enabling technology for the rights protection of the multimedia digital contents. In order to reinforce protection and access control this application has been developed. A unique watermark is embedded in each piece of the multimedia content before it is distributed to the customer. So the user who buys the multimedia contents from the content provider will have the watermarked multimedia content.

  • Decoding and Detection of watermark.
  • When unauthorized copies of a piece of contents are found, the customer who owns the content will readily identified by the embedded watermark and also the content provider who sells the content will have the details of the customer like customer’s name, transaction dates and serial number.

Hardware Requirement

  • Processor – Intel i3
  • CPU -1 GHz
  • RAM – 2 GB
  • Monitor – 17” color monitor
  • Hard Disk – 500 GB
  • Keyboard – Standard Keyboard with 104 Keys
  • Mouse – Optical Mouse
  • Software Requirement

  • Tools – .NET Framework
  • Programming Language – C#
  • Platform – Windows 7.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2019). Piracy Protection Software for Audio files. Retrived from https://gradesfixer.com/free-essay-examples/piracy-protection-software-for-audio-files/
GradesFixer. "Piracy Protection Software for Audio files." GradesFixer, 11 Feb. 2019, https://gradesfixer.com/free-essay-examples/piracy-protection-software-for-audio-files/
GradesFixer, 2019. Piracy Protection Software for Audio files. [online] Available at: <https://gradesfixer.com/free-essay-examples/piracy-protection-software-for-audio-files/> [Accessed 23 September 2020].
GradesFixer. Piracy Protection Software for Audio files [Internet]. GradesFixer; 2019 [cited 2019 February 11]. Available from: https://gradesfixer.com/free-essay-examples/piracy-protection-software-for-audio-files/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.