Abstract
This paper presents how to detect MP3 files that have been downloaded from peer-to-peer networks to a user hard disk. The technology can be used for forensics of copyright infringements related to peer-to-peer file sharing, and for copyright payment services. We selected 23 indicators, which show peer-to-peer history for a MP3 file. We developed software to record the indicator values. A group of selected examinees ran the software on their hard disks. We analyzed the experimental results, and evaluated the indicators. We found out that the performance of the indicators varies from user to user. We were able to find a few good indicators, for example related to the number of MP3 files in one directory.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-642-02312-5_25
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Alves, K., Michael, K.: The Rise and Fall of Digital Music Distribution Services: a Cross-Case Comparison of MP3.com, Napster and Kazaa. In: Cerpa, N., Bro, P. (eds.) Building Society Through E-Commerce, 1st edn., University of Talca, Talca (2005)
Creative Commons licenses, http://creativecommons.org/licenses/
World of Warcraft – Frequently Asked Questions, http://www.blizzard.co.uk/wow/faq/bittorrent.shtml
Kokkinen, H., Ekberg, J.E.: Post-payment copyright for digital content. In: 5th Consumer Communications and Networking Conference, CCNC, pp. 1278–1283. IEEE, Las Vegas (2008)
Broucek, V., Turner, P.: Computer Incident Investigations: e-forensic Insights on Evidence Acquisition. In: 13th Annual EICAR Conference, Grand-Duche du Luxembourg (2004)
Ho, G.L., Taek, Y.N., Jong S.J.: The method of P2P traffic detecting for P2P harmful contents prevention. In: 7th International Conference on Advanced Communication Technology, vol. 2, pp. 777–780 (2005)
Togawa, S., Kanenishi, K., Yano, Y.: Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining. HCI (8), 769–778 (2007)
Nikolaidis, N., Giannoula, A.: Robust Zero-Bit and Multi-Bit Audio Watermarking Using Correlation Detection and Chaotic. In: Digital Audio Watermarking Techniques and Technologies: Applications and Benchmarks. Idea Group Inc. (IGI) (2007)
Koso, A., Turi, A., Obimbo, C.: Embedding Digital Signatures in MP3s. IMSA. pp. 271–274 (2005)
Sung, B., Jung, M., Ham, J., Kim, J., Ko, I.: Feature Based Same Audio Perception method for Filtering of Illegal Music Contents. In: 10th Int. conference on Advanced Communication Technology, ICACT, pp. 2194–2198 (2008)
Böhme, R., Westfeld, A.: Statistical characterisation of MP3 encoders for steganalysis. In: International Multimedia conference, workshop on Multimedia and security, pp. 25–34. Magdeburg, Germany (2004)
Fake MP3 detector, http://www.sharewareconnection.com/fake-MP3-detector.htm
Mee, J., Watters, P.A.: Detecting and Tracing Copyright Infringements in P2P Networks. In: International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL 2006), p. 60 (2006)
MP3 Kingz, http://www.mp3kingz.org/
NfoDB.com, http://www.nfodb.com/section_4_mp3_nfo.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kokkinen, H., Nöyränen, J. (2009). Forensics for Detecting P2P Network Originated MP3 Files on the User Device. In: Sorell, M. (eds) Forensics in Telecommunications, Information and Multimedia. e-Forensics 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 8. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02312-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-02312-5_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02311-8
Online ISBN: 978-3-642-02312-5
eBook Packages: Computer ScienceComputer Science (R0)