You are on page 1of 8

Page | 1

SOFTWARE ENGINEERING
SUBJECT CODE: SE-207
LAB FILE

Submitted By
Mohit
(2K22/SE/115)
Batch – SE A2 (3rd Semester)
Submitted To
PRIYA SINGH

DEPARTMENT OF SOFTWARE ENGINEERING


DELHI TECHNOLOGICAL UNIVERSITY
SHAHBAD DAULATPUR
(FORMERLY DELHI COLLEGE OF ENGINEERING)
Page | 2

MAIN BAWANA ROAD, DELHI-110042

INDEX
S.NO TITLE DATE PAGE NO SIGNATURE
1

10
Page | 3

Experiment-1
AIM- Write a program to count lines of code excluding blank lines and
comments
ALGORITHM:
1. Open the file and point it to the file pointer fp1.
2. Initialize the variables.
3. Using a while loop read the next line character. Do this until EOF.
4. Inside the loop and using if, and else statements count the number of lines in the file.
5. Print the variables.

CODE:

FILE:
Page | 4

OUTPUT:
Page | 5

Experiment-2
AIM- Write the problem statement of case study 1/2.

Problem Statement in Multimedia Protection Content System:


In the rapidly evolving landscape of digital media and content distribution, ensuring the protection and
security of multimedia content has become a critical challenge. With the proliferation of high-quality
multimedia creation tools and the widespread availability of high-speed internet, unauthorized access,
distribution, and reproduction of multimedia content have escalated, leading to significant financial losses,
intellectual property theft, and erosion of creative rights.
The problem at hand is to design and implement a robust multimedia protection content system that
safeguards multimedia content from unauthorized access, reproduction, distribution, and manipulation
while preserving the integrity of the user experience. This system should address the following key issues:

1. Piracy Prevention: Unauthorized copying, distribution, and sharing of multimedia


content such as videos, images, audio, and interactive media are rampant. The solution
should employ advanced encryption, watermarking, and access control mechanisms to
prevent unauthorized duplication and sharing of content.

2. Digital Rights Management (DRM): Establishing a secure and effective DRM framework
to control how multimedia content is accessed, used, and shared across various devices and
platforms. This includes managing licenses, permissions, and enforcing usage restrictions.

3. Content Authentication: Ensuring the authenticity and integrity of multimedia content.


Implementation of techniques such as digital signatures, hash verification, and content
fingerprinting can help detect tampering or unauthorized modifications.

4. Streaming Security: Protecting multimedia content during streaming to prevent


unauthorized capturing or redistribution. This involves implementing secure streaming
protocols, adaptive bitrate streaming, and content encryption for real-time delivery.

5. User Privacy: Balancing content protection with user privacy concerns. The system
should handle user data and interactions with sensitivity, adhering to data protection
regulations and ensuring that user privacy is maintained.
Page | 6

6. Cross-Platform Compatibility: Multimedia content is accessed across a wide range of


devices, operating systems, and applications. The protection system should be designed to
seamlessly integrate with various platforms and ensure consistent security measures across
them.

7. Usability and Performance: The system should provide a seamless user experience
without compromising on performance. Complex security measures should not degrade the
quality of multimedia content or cause significant delays during access or playback.

8. Content Traceability: Implementing mechanisms to trace the origin and distribution of


multimedia content. This can aid in identifying potential breaches and sources of
unauthorized distribution.

9. Legal and Regulatory Compliance: Adhering to copyright laws, intellectual property


regulations, and other legal considerations in different jurisdictions. The system should
provide tools to manage licensing, usage agreements, and content takedown requests.

10. Scalability: As the volume of multimedia content continues to grow, the protection
system must be designed to scale efficiently, accommodating large libraries of content and
a growing user base.

Addressing these challenges requires a comprehensive and multidisciplinary approach,


encompassing encryption technologies, digital watermarking, authentication protocols,
secure streaming mechanisms, and robust user management systems. The goal is to create
a multimedia protection content system that empowers content creators, distributors, and
consumers while mitigating the risks associated with unauthorized access and distribution.

EXPERIMENT – 3
Page | 7

AIM: Design use case diagram of Multimedia Content Protection System.


Page | 8

You might also like