Content-Based Identification Algorithms Combination Framework Against Audiovisual Piracy

Author: Torres,A.; Demanboro A.C.

Abstract

With the event of the Internet, video and image files are widely shared and consumed by users from all over the world. Recent studies point out that one out of two internet users have engaged in activities classified as illicit. Unauthorized copy, distribution or publishing of digital content without the proper rights holder consent is what is commonly called piracy. Those that profit from digital piracy ignore the intellectual property laws and copyrights from the owners, programmers, distributors and many others that live and depend on the economic value of these assets. Methods to identify these files have emerged to preserve intellectual and commercial rights such as content-based identification techniques also known as perceptual hashing. With said techniques a unique identifier is generated making possible to compare two images or videos and decide if they are equal, similar or different. This article has as objective to discuss the application of content-based identification technologies as a method to fight piracy, presenting a framework where perceptual hashing can be used to prevent publishing and/or distribution of video content. The methodology proposed is to combine four types of perceptual hash (ahash, dhash, phash, whash) to make it possible to identify illegal videos with more accuracy. The results are encouraging, considering the most common forms of attacks.

Index Terms: Content-Based Identification, Piracy, Security, Intellectual Property

Continue…

Infinite loop using wget

Im working in a project where I have to simulate traffic to certain website sites. The solution had to be simple and while python would be the obvious choice bash was right there with wget to be used with less lines and libs than python.

Continue…

Early 2000 nostalgia with Microsoft Zune

It was thrown in some drawer along with a bunch of cables and accessories I never use. Have you stopped a minute to check how many crap you have storred in your closet? PSVita? Old Nintendos, Old Ipods ou MP3 players? geee I have all that. Last week I turned the PSvita on, played a little and returned it back to where it was. And this week by chance I was trying to make my kid’s Hercules DJ work with Linux.. (waste of time) when I found it there… laying in its solitud, long abandoned, Yes, the Microsoft Zune 30GB. Would it still work? I wondered.

Continue…

Choose your Ecosystem and love your choice

The phrase “Choose your love and Love your choice” was said in 2011 by Thomas S.Monson, it has to do with marriage and love and fidelity but it made much more sense to me this last days when I decided to move away from Iphone\iOS and go to Android. Then I paraphrased Thomas with the following: Choose your Ecosystem and love your choice.

Continue…

Christmas Challenge 2019

Hi there

Some of you might remember the Christmas Challenge 2018 right? It is about to become a tradition!!

This time I had an encounter with a rather unusual Santa Claus and he sent me a curious message along with a set corrupted files that I can’t open. He said that I had to read carefully the message below to be able to crack it… ingenious Santa!

The message goes like this:

 

“I come with many colors, so beautiful and bright, I turn so many houses into a beautiful sight. What am I?”

 

The files Santa sent:

SantaClausImage.jpg, key.txt, checksum

 

 

Have fun a excellent Christmas!

The Password Sharing Problem – A Paradox

The password sharing activity has happened to me at least in two different occasions, and I’m certain it has happened with you too. See if this story is familiar to you. A family that had recently purchased a smart tv asked to use the service, NETFLIX – they were not fond of using credit card transactions. In a under developed countries having people afraid of using their credit card is quite common. The second instance was during my master course, where I had purchased a software that would ease the transcript of documents and the process of writing the dissertation. A friend wanted me to share it to ease his burdens. In both occasions I didn’t feel bad. I don’t think anybody does. Continue…

ELK: Deleting unassigned shards to restore cluster health

Had a red flag on my ElasticSearch cluster these days and found that the reason was related to an unassigned shards between the nodes.

As the data I collect is not that sensitive I could easy delete it and recreate in case I need in the future. But first we need to find it. There is many articles on the internet to help one to understand the shards allocation but I offer here a simple solution which is – simply delete the bastard.

First, we check on the cluster health and get the count of unassigned shards.

curl -XGET http://<elastichost>:9200/_cluster/health?pretty | grep unassigned_shards

The list of unassigned shards can be retrieved using:

curl -XGET http://<elastichost>:9200/_cat/shards | grep UNASSIGNED | awk {'print $1'}

And if you want to delete every unassigned shard in the list above, you could send it to xargs and do a DELETE.

curl -XGET http://<elastichost>:9200/_cat/shards | grep UNASSIGNED | awk {'print $1'} | xargs -i curl -XDELETE "http://<elastichost>:9200/{}"

In my case the I found the name of the index that was cause problems and I deleted

 curl -XDELETE "http://<elastichost>:9200/INDEXNAME

 

Done Cluster health is green again.