Approach for the Prevention of Audio Piracy

  • Avantika MussadyEmail author
  • Parichita Ray
  • Sauvik Bal
Conference paper
Part of the Learning and Analytics in Intelligent Systems book series (LAIS, volume 12)


Idea behind this approach deals with the attainment and utilization of multimedia files which includes songs, videos, stories, lectures etc. from unauthorized source and is termed as Online Piracy. Yes, piracy is illegal, and is one of the most commonly faced issue in today’s era of the multimedia files being available exclusively on websites. These users extricate stream of content illegally and when asked why the most popular reason that comes up is people find it hard to wait for the release, the cost is high and they are unwilling to pay in exchange of the media content, etc. They put effort on finding and accessing such unlicensed content through various websites. This paper provides an approach which can be used to keep a check on the rate of online piracy of multimedia files, using the basic encryption followed by advanced decryption.


Multimedia file encryption Online piracy Runtime decryption 


  1. 1.
    Mussady, A., Ray, P., Sherpa, L.W., Bal, S.: Unique key identification of audio. Int. J. Sci. Eng. Res. 10(3) (2019). ISSN 2229-5518Google Scholar
  2. 2.
    Bhattacharjee, S., Gopal, R.D., Lertwachara, K., Marsden, J.R.: No more shadow boxing with online music piracy: strategic business models to enhance revenues. Department of Operations and Information Management School of Business University of Connecticut (2003)Google Scholar
  3. 3.
    Chow, K.P., Cheng, K.Y., Man, L.Y., Lai, P.K.Y., Hui, L.C.K., Chong, C.F., Pun, K.H., Tsang, W.W., Chan, H.W., Yiu, S.M.: BTM – an automated rule-based BT monitoring system for piracy detection. In: Second International Conference on Internet Monitoring and Protection (ICIMP 2007) (2007). 0-7695-2911-9/07Google Scholar
  4. 4.
    Farahbakhsh, R., Cuevas, A., Cuevas, R., Rejaie, R., Kryczka, M., Gonzalez, R., Crespi, N.: Investigating the reaction of BitTorrent content publishers to antipiracy actions. In: 13-th IEEE International Conference on Peer-to-Peer Computing (2013)Google Scholar
  5. 5.
    Fetscherin, M., Zaugg, S.: Music piracy on peer-to-peer networks. In: Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2004) (2004)Google Scholar
  6. 6.
    Kelkoul, H., Zaz, Y., Tribak, H., Schaefer, G.: A Robust Combined Audio and Video Watermark Algorithm Against Cinema Piracy (2018). 978-1-5386-6220-5/18/31.00Google Scholar
  7. 7.
    Kumar, G.S., Manikanta, G., Srinivas, B.: A novel framework for video content infringement detection and prevention. In: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (2013). MVGR College of EngineeringGoogle Scholar
  8. 8.
    Djekic, P., Loebbecke, C.: Software piracy prevention through digital rights management systems. In: Proceedings of the Seventh IEEE International Conference on E-Commerce Technology (CEC 2005) (2005)Google Scholar
  9. 9.
    Stolikj, M., Jarnikov, D., Wajs, A.: Artificial intelligence for detecting media piracy. SMPTE Motion Imaging J. 127(6), 22–27 (2018)CrossRefGoogle Scholar
  10. 10.
    Tribak, H., Zaz, Y., Kelkoul, H.: Advanced Video Watermarking Approach based on Convolutional Encoding (2018). 978-1-5386-6220-5/18/31.00Google Scholar
  11. 11.
    Watters, P.A., Watters, M., Ziegler, J.: Malicious advertising and music piracy. In: 2014 Fifth Cybercrime and Trustworthy Computing Conference (2014)Google Scholar
  12. 12.
    Hughes, A.T., Pearce, D.B.: Hardware ID to prevent software piracy.
  13. 13.
    Liew, W., Liu, C.: IP-based video-on-demand system with anti-piracy capabilities.
  14. 14.
    Tchoukaleysky, E.: Digital cinema anti-piracy method and apparatus for liquid crystal projection systems.
  15. 15.
    Sitrick, D.H., Fancher, J.A.: Anti-piracy protection system and methodology.
  16. 16.
    Yadav, G., Kamath, S.S., Prasad, G.: Secure music sharing with improved potato system using cryptographic techniques. In: 2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES) (2015)Google Scholar
  17. 17.
    Hsieh, C.-J., Li, J.-S., Hung, C.-F.: A robust audio fingerprinting scheme for MP3 copyright. In: Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) (2007)Google Scholar
  18. 18.
    Loytynoja, M., Cvejic, N., Lahetkangas, E., Seppanen, T.: Audio encryption using fragile watermarking. In: 2005 Fifth International Conference on Information Communications & Signal Processing (2005)Google Scholar
  19. 19.
    Fetscherin, M., Lattemann, C.: Motives and willingness to pay for digital music. In: Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2007 (2007)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringUniversity of Engineering & Management, JaipurJaipurIndia

Personalised recommendations