International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 7, Issue 4 (July-August 2025) Submit your research before last 3 days of August to publish your research paper in the issue of July-August.

Network-Based Security: Traitor Tracing and Encrypted File Transmission

Author(s) Dr. Vasanth Kumar S, Mr. Balamuthukumar P
Country India
Abstract Today in the competitive world transferring of files from on source to another destination without attacks is a challenging one. we can achieve easily by traitor tracing method. It is a copy right detection system which works by tracing the source of leaked files rather than by direct protection. When a copy of it is leaked to the public, the distributor adds a unique value to each copy given out. Watermarking is the key technology adopted by contemporary methods has many limitations and does not realistic for real time applications like video conference systems-learning systems, remote diagnosis systems and so on. But in proposed system, it can watch all the process from source to destination.
Keywords Keywords—Digital Rights Management(DRM), traitor tracing, watermarking, digital finger printing.
Field Computer > Network / Security
Published In Volume 7, Issue 4, July-August 2025
Published On 2025-07-18
DOI https://doi.org/10.36948/ijfmr.2025.v07i04.50679
Short DOI https://doi.org/g9tz2n

Share this