You are on page 1of 5

International Journal of Scientific Research and Review ISSN No.

: 2279-543X
Volume 07, Issue 03, March 2019 UGC Journal No.: 64650

IOT BASED ANTI-PIRACY SYSTEM


Abhishek Kumar B A, A Pranith, B Sumanth Krishna, Basavaraj J N
Deepthi Murthy T.S
School of Electronicsand Communication Engineering, REVA University, India

ABTRACT
Now a days camcorder piracy make a great impact on the content holder, so we planned to overcome
theproblem by using a technique in T V remote, that is infrared light. Infrared light is
electromagnetic radiation with a longer wavelength than those of visible light, therefore the rays are
invisible to the human eye and these I R radiations are visible to the digital camera or mobile phones.
Using this technology, we reducethepiracy in themovie theatres. RFID tagsareused for security
purposetoturn on thescreen.

Keywords: Camcorder, human eye, IR radiations, mobile phones,piracy

I. INTRODUCTION
During the past decade, the Internet has witnessed an increasing level of online piracy of copyright content.
The availability of copyright contentby these systems at no cost, has led to an explosion in their popularity and
their contribution in overall Internet traffic. Legal actions were taken against few major and minor violators
who illegally published, consumed or facilitated the distribution of copyright content, online piracy
appears to become even more widespread in different countries. I n recent years, these trends have prompted
copy-right holders to demand the legislation and implementation of more effective online antipiracy
laws in several countries. However, such an effort has faced strong opposition by various stake holders in
several countries. In fact, we are only aware of a small number of countries that have legislated and
implemented an online antipiracy screen. Now a day’smoviepiracy hasbecomea widerangedueto more internet
usage. Themotion picture association of America (MPAA ) conducted an investigation on the movie piracy in
2005. According to the statistics in the report piracy cost these U .S Industries collectively 425.6 billion loss
revenue[ 1] .In the Temporal Psycho visual modulation technique they have made a system that
tracking information is embedded in the form of barcodes, and other messages the message indicates the all the
information about the show time theatre name date and projectionist name [ 2] . I f we want to make a
watermarking system in the movie theatres on the screen, the watermark will be seen on the device display
which createsproblemfor visualization totheaudience. Current copyright policy failstomatch the realities of
today’s digital age, intellectual property theft continues to threaten the economic security of creative
professionals. United States topped the list of countries with the most visits to these websites, followed by

Russia, India, Brazil, Turkey and Japan[ 3] . Study streamof reportshave asserted that movie piracy ison the
rise in countries around the world resulting in hundreds of millions of pounds in lost revenue, and these aresold

2048
International Journal of Scientific Research and Review ISSN No.: 2279-543X
Volume 07, Issue 03, March 2019 UGC Journal No.: 64650

by copying into DVD 'sand making themasa commercial market, fromthisthereisa hugelosstothe content
holdersand alsorevenuelosstothecountry[ 4] .
II. RELATED WORK
2.1[ 5] S .Suma Christal Mary says that he Steganography comes from Greek, it means "enclosed or hidden
writing". Data hiding should be use concealed transmissions, closed captioning, indexing, or watermarking. I
t is in contrast to cryptography, where the survival of the message itself is not masked, but the contentis hidden.
Steganography is implemented in different fields such as military and Industrial applications. By using lossless
steganography technique messages can be sent and received securely.
Traditionally, steganography was based on hiding secret information in image files. Recently, there has been
growing interest in implementing stenographictechniques to video files as well as audio files. The advantage of
using video files in hiding information is to be added security against hacker attacks due to
therelativecomplexity of videocompared toimagefilesand audiofiles.

2.2[ 6] Digital pirates continued to swarm over entertainment in 2017, even with the rise of legal streaming
services like Netflix and Spotify. Worldwide, users made a total of 300 billion visits to internet piracysites
last year, up 1.6% from 2016, according to antipiracy consulting firmMuso. But while illegal streaming and
downloads of T V shows and music increased in 2017, film piracy actually declined,Muso’sanalysis
showed. TV accounted for more than one-third of the reported global piracy activity, with 106.9 billion
visits, followed by music(73.9 billion) and film(53.2 billion)
III. PROPOSED WORK
The System consist of RFID tag in which RFID card is going to be read by the reader. Microcontroller will
send the Card number to the cloud server by using the GPRS. Simultaneously microcontroller checks the card
is valid or invalid,if the card is valid then it asks for the password, if the entered password is correct, the relay
which acts as a switch, turns on the sets of I R emitters which are placed behind the screen shown in Fig5.2
The entire process is controlled by the RENESAS microcontroller. The screen is going to be on, the infrared
light can’t be seen by the naked eye. The block diagram of the Anti-piracy system is shown in the Fig 3.1 and
Table.1 Shows the hardware and software used in the project.

2049
International Journal of Scientific Research and Review ISSN No.: 2279-543X
Volume 07, Issue 03, March 2019 UGC Journal No.: 64650

LCD
DISPLA
Y

RENESAS
RFID RFID RELAY SETS OF
MICROCONTROLLER
TAGS READER IR

4*4 MATRIX AMAZON


RESET KEYPAD GPRS CLOUD
SERVER

Fig3.1Block diagramofAnti-piracySystem

Fig 3.2 flowchart of the Anti-piracy system


IV. HARDWARE AND SOFTWARE
Table1.Hardware and Software
Hardware Software
LCD display Embedded C
RENESAS Cube suit+ compiler
Microcontroller
Relay
4*4 Matrix Keypad
RFID Tag and Reader
GPRS
Amazon Cloud Server

2050
International Journal of Scientific Research and Review ISSN No.: 2279-543X
Volume 07, Issue 03, March 2019 UGC Journal No.: 64650

V. RESULTS

Fig 5.1 Hardware model

Fig5.2 Normal screen by naked eye Fig 5.3 Recording with devices

VI. CONCLUSION
In thisproject wehave achieved to reduce thepiracy in the theatreswith thefollowing work likeusing the RFID
tags and IR sensorssothat it generatestheglaressuch that themoviecannot beviewed properlythough it is
captured.
Themain advantageof this project is it providesthesecurity for themodule(in operating room),preventing
moviepiracy.
The disadvantage of this model is Installation will be difficult that is we need to install in every theatres for
Anti-piracy
VII. ACKNOWLEDGEMENTS
We thank Dr. Rajashekar C Biradar, Director School of Electronicsand Communication Engineering, REVA
University, Bengaluru for extending hisfull support and co-operation

REFERENCES
[1] S. E. Siwek, The true cost of copyright industry piracy to the US economy. IPI Canter for Technology
Freedom, 2007.
[2]YuanchunChen,GuangtaoZhai, ZhongpaiGao, KeGu, Wenjun Zhang, Menghan Hu, Jing LiuMovie Piracy
Tracking using Temporal Psycho visual ModulationInstitute of Image Communication and Information
Processing, Shanghai Jiao Tong University, Shanghai, China
[3] J. Dorning, Intellectual Property Theft: A Threat to U.S. Workers, Industries, and Our Economy.
DPE ResearchDepartment, 2014.
[4]B.NEWS, “The fact and fiction of camcorder piracy,”[Online].
2051
International Journal of Scientific Research and Review ISSN No.: 2279-543X
Volume 07, Issue 03, March 2019 UGC Journal No.: 64650

Available: http://news.bbc.co.uk/2/hi/technology/6334913.stm, 2015.


[5] S. Suma Christal Mary ”improved protection in video steganography used compressed video
bitstreams”(IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 764-
766
[6] Global Piracy in 2017: TV and Music Illegal Activity Rose, While Film Declined
[7] A. Denso, “QR Code essentials,” 2011, retrieved 12 March 2013.
[8]J. Haitsma and T. Kalker, “A watermarking scheme for digital cinema,” in Image Processing,
2001.Proceedings. 2001 International Conference
[9]G. Zhai and X. Wu, “Defeating camcorder piracy by temporal psycho visual modulation,” J. Display
Technol., vol. 10, no. 9, pp.754–757, Sep 2014. [Online]. Available: http://jdt.osa.org/abstract.cfm?URI=jdt-10-
9-754
[10] Y. Chen, N. Liu, G. Zhai, Z. Gao, and K. Gu, “Information security display system on android device,”
in2016 IEEE Region 10 Conference(TENCON), Nov2016,pp.1634–1637.2001.Proceedings. 2001International
conference

2052

You might also like