Detecting Pirated Movie‘s with Similarity Assessment Based on Earth Mover‘s Distance

Full Text (PDF, 471KB), PP.47-54

Views: 0 Downloads: 0

Author(s)

Srinivas Baggam 1,* K.Venkata Rao 2 P. Suresh Varma 3

1. Department of Computer Science and Engineering, M.V.G.R College of Engineering, India

2. Department of Computer Science and Engineering, Vignan Institute of Information Technology, India

3. Department of Computer Science and Engineering, University College Adikavi Nannaya University, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2013.04.06

Received: 27 Apr. 2012 / Revised: 3 Sep. 2012 / Accepted: 27 Oct. 2012 / Published: 8 Mar. 2013

Index Terms

Piracy, Download, Pirated Movies, Earth Movers Distance

Abstract

Piracy is no new lesson to every user of technology. It is a giant existing in the industry of technology numbing the heights software is reaching in terms of efficiency and use in all the sectors to an extent where even the industry of enterprise, beaurocracy, technology etc. depend upon the use of software in various ways to contribute their needs and success. Dollars are running at stakes of any industry while the piracy is acting as a dominator of all illegal transactions indirectly by giving easy and such illegal access to many users. One such victim is the entertainment industry where movies are being pirated and accessed to users causing millions of dollars of loss to the entertainment industry. Many researchers and technical specialists have made their contributions to save technology. Our paper is another potential solution with a promise of accuracy rate in detecting the pirated movies. It is a known fact that primary detection is the source of prevention. Our paper puts forth a technique that efficiency detects piracy to reduce such illegal downloads using the efficient measures of signature generation, normalization in an effective manner.

Cite This Paper

Srinivas Baggam, K.Venkata Rao, P. Suresh Varma, "Detecting Pirated Movie’s with Similarity Assessment Based on Earth Mover’s Distance", International Journal of Information Technology and Computer Science(IJITCS), vol.5, no.4, pp.47-54, 2013. DOI:10.5815/ijitcs.2013.04.06

Reference

[1]Alvisi, M., Argentesi, E., Carbonara, E., Piracy and Quality Choice in Monopolistic Markets, URL:http://www.serci.org/2002/Carbonara.pdf.

[2]Bhattacharjee, S., Gopal, R.D., et al, 2003. Digital music and online sharing: software piracy 2.0? Association for computing machinery. Communications of the ACM 46 (7), 107.

[3]Bhattarcharjee, S., Gopal, R. D., Lertwachara, K., & Marsden, J. R. (2006). Impact of legal threats on online music sharing activity: An analysis of music industry legal actions. Journal of Law and Economics, 49, 91–114.

[4]Das, Sanjukta. 2008. “Timing Movie Release on the Internet in the Context of Piracy.” Journal of Organizational Computing and Electronic Commerce 18(4): 307. Mahwah: Oct 2008.

[5]D’Astous, F., Montpetit, D., 2005. Music piracy on the web – how effective are anti-piracy arguments? Evidence from the theory of planned behaviour. Journal of Consumer Policy 28, 289–310.

[6]E. Levina and P. Bickel, “The Earth Mover’s Distance is the Mallows Distance: Some Insights from Statistics,” Proc. IEEE Int’l Conf. Computer Vision, vol. 2, 2001.

[7]K. Grauman and T. Darrell, “Fast Contour Matching Using Approximate Earth Mover’s Distance,” Proc. 2004 IEEE CS Conf. Computer Vision and Pattern Recognition, vol. 1, pp. 220-227, 2004

[8]Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.

[9]J. Lubin, J. A. Bloom, and H. Cheng, “Robust, content-dependent, high-fidelity watermark for tracking in digital cinema,” Proc. SPIE Security and Watermarking of Multimedia Contents V, vol. 5020, pp. 536–545, Jan. 2003. 

[10]J. Haitsma and T. Kalker, “A watermarking scheme for digital cinema,” in Proc. Int. Conf. Image Processing, Oct. 2001, vol. 2, pp. 487–489.

[11]MPAA Statistics. 2005. Cost of Movie Piracy. Retrieved from http://motionpictureassociation.org/researchStatistics.asp

[12]Prendergast, Gerard, Leung Hing Chuen, and Ian Phau. 2002. "Understanding Consumer Demand for Non-Deceptive Pirated Brands." Marketing Intelligence & Planning 20 (7): 405-16.

[13]S. Gohshi, H. Nakamura, H. Ito, R. Fujii, M. Suzuki, S. Takai, and Y.Tani, “A new watermark surviving after re-shooting the images displayed on a screen,” KES (2), vol. 3682, pp. 1099–1107, 2005.

[14]Thong, James Y. L. and Chee-Sing Yap. 1998. "Testing an Ethical-Decision Making Theory: The Case of Softlifting." Journal of Management Information Systems 15 (1): 213-37.

[15]Wagner, Suzanne C. and Lawrence G. Sanders. 2001. "Considerations in Ethical Decision Making and Software Piracy." Journal of Business Ethics 29 (1): 1/2.