sold on online auction sites, via e-mail solicitation and bystreet vendors. The source of these pirated versions couldeither be an original DVD, an illegally copied DVD orsimply an online pirated version of the movie, and to-gether with the low cost of disc burning devices andblank discs, the proliferation of hard goods piracy nowspins out of control.Internet Piracy: It
is “is the downloading or distribution
of unauthorized copies of intellectual property such asmovies, television, music, games and software programs
via the Internet”. People often download free illegal co
p-ies of movies from sharing networks, pirate websites or
servers such as “Topsites”, and its immense speed and
easy navigation allows for the explosion of global Internetmovie piracy. The primary source of pirated moviescomes from those who secretly record films in theatersand sell them to individuals who will then distributethem on peer-to-peer (P2P) file sharing networks such aseDonkey  and Limewire.However, we completely focus on detecting movie piracy
through the internet. Movies or ‘warez’ are typically a
c-cessed over the Internet in three ways: IRC, Bit-Torrent/P2P, and FTP. Internet Relay Chat (IRC) allowsto access ones personal files through one-to-one sharingscenario. BitTorrent or P2P (Peer-to-Peer) is the mostpopular and mainstream way to download illegal movies.This technology, often a site, serves as a file aggregatorsourcing the Internet for bits of larger files are requested.P2P systems serves strictly as a facilitator for illegaldownloading, sites like PirateBay , BTJunkie etc,
don’t actually host any movie files.
File Transfer Protocol(FTP) which are also called as distro sites, are built oncredibility within the online community, mainly due tothe quality and speed of the movie. For example, they are
‘rippers’, who are focused on ripping the highest quality
at the lowest file size. These rippers work with couriers
who tag the file ,and release it to predefined ‘distro’ sites.
Then eventually the content bubbles up to main streamP2P aggregators like Pirate Bay. In addition to internetsites, there are many devices which rip or burns to anoth-
er device.tools like Netgear’s, RealDVD are examples of
this kind of ripping.
2.1 An Analysis On Movie Piracy
Poddar , proposed a two-period model to find out theimpact of movie piracy on both movie theaters and DVDmarkets, they considered three scenarios for their analy-sis: no piracy case, piracy in first period and lastly piracyonly begins in the second period. They found that a highquality pirated copy will have adverse effect on pricesand they also proved that the profit for movie producer isthe highest when there is no piracy. And thus, it is theproducers interest to eliminate piracy altogether. Theyalso analyzed their survey from consumer point of viewregarding piracy which clearly highlights the fact the con-sumers and movie producers have a clash of interests.They also proved that reducing piracy at the first phase
can improve the producer’s economy.
Kerry-Ann et al. , based on the theory of planned be-havior, they quantitatively examined the factors impact-ing domestic movie piracy behaviors in US respondentsbetween 17 and 70 years of age, they analyzed differencesacross groups and examined the underlying rationale forpiracy behaviors. They proposed that the MPAA shouldfind ways to communicate with each group through effec-tive marketing, education and enforcement of its piracypolicies and penalties. Jenessa et al. studied self-control perspective to examinethe attitudes of high school students towards the internetpiracy of music and movies. They studied the behaviorsof many high school students. Their study also suggeststhat piracy prevention efforts may be most appropriatelyfocused on high school age individuals and directed to-wards increasing self-control.
2.2 Previous Work on Detecting Movie Piracy
NZFACT, a member of anti counterfeiting group,
which represents the interests of New Zealand’s major
intellectual property stakeholders, including music, mov-ies, luxury goods, sport, software and publishing.NZFACT works along with internet businesses such asMySpace to identify pirates and to support legitimatebusinesses from movie industries via Internet. They oper-
ate a “Target Auction Piracy” (TAP) program and take
legal action against people who are tracked while sellingpirated DVDs via online auction houses.Engineers of Dr. Alex Bronstein of Tel Aviv Universityfrom the department of Electrical Engineering, developed
a new way to stop movie and video pirates using “videoDNA matching” which creates a unique fingerprint for
every movie. They employed an invisible sequence andseries of grids applied over the film. Their tool can scanthe content of web sites for pirated films, pinpointingsubsequent mutations of the original. It detects piracy inthe same way biologists detect mutations in genetic code.Kristleifur et al.  proposed their mechanism using VI-dentifier, their detection is proposed in two scenarios, inthe first scenario, Videntifier detects pirated copies frominternet even in the case of strong modifications, for de-tection videos are first decomposed into frames then eve-ry 12
frame is used to compute up to 400
de-scriptors and are used as queries for NV-Tree database. inthe second scenario they promoted video monitoring ap-plication. A web cam is used to record a movie fromcomputer screen and is referenced against the legitimatevideo to detect the piracy.Yuta et al.  presented a position estimation system toprevent camcorder piracy in theaters as new applicationof audio watermarking technique. They presented a wa-termarking algorithm and position estimator. The algo-rithm is used to obtain the delay times and then imple-ment position estimation using detection strengths basedon the recorded movie soundtracks.
JOURNAL OF COMPUTING, VOLUME 4, ISSUE 5, MAY 2012, ISSN 2151-9617https://sites.google.com/site/journalofcomputingWWW.JOURNALOFCOMPUTING.ORG276