Skip to main content

Leaker Identification in Multicast Communication

  • Conference paper
Networked Digital Technologies (NDT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 293))

Included in the following conference series:

  • 1470 Accesses

Abstract

Multicast is a communication mode in which data is exchanged among multiple end systems. An important concern in multicast communications is the protection of copyrights. While preventing copyright violations seems very difficult, tracing copyright violators (leaker identification) is more feasible and can be used as a deterrence alternative. In order to identify leakers in a multicast environment, every receiver should obtain a uniquely marked copy of the data. However, delivering unique copies from the sender to the receivers is inefficient. This paper investigates multicast leaker identification and introduces an efficient solution that is based on binary search tree. We introduce the notion of suspicious set that includes suspected end systems. When a leak is detected, all receivers are inserted in the suspicious set. Using a binary search, the suspicious set is refined successively until it includes only the leakers. An analytical study is conducted to evaluate the proposed solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., Manifavas, C.: Chameleon – A New Kind of Stream Cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 107–113. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  2. Brassil, J., Low, S., Maxemchuk, N., O’Gorman, L.: Electronic Marking and Identification Techniques to Discourage Document Copying. In: Proceedings of IEEE Infocom 1994, vol. 3, pp. 1278–1287 (1994)

    Google Scholar 

  3. Brown, I., Perkins, C., Crowcroft, J.: Watercasting: Distributed Watermarking of Multicast Media. In: Proceedings of the First International Workshop on Networked Group Communication, pp. 286–300 (1999)

    Google Scholar 

  4. Chu, H., Qiao, L., Nahrstedt, K., Wang, H., Jain, R.: A Secure Multicast Protocol with Copyright Protection. ACM SIGCOMM Computer Communication Review 32(2), 42–60 (2002)

    Article  Google Scholar 

  5. Chu, Y., Rao, S., Seshan, S., Zhang, H.: Enabling Conferencing Applications on the Internet Using an Overlay Multicast Architecture. In: Proceedings of ACM SIGCOMM 2001 (2001)

    Google Scholar 

  6. Chu, Y., Rao, S., Zhang, H.: A Case for End System Multicast. In: Proceedings of ACM SIGMETRICS, pp. 1–12 (2000)

    Google Scholar 

  7. Craver, S., Memon, N., Yeo, B., Yeung, M.: Can Invisible Watermarks Resolve Rightful Ownerships? In: Proceedings of the IS & T/SPIE Conference on Storage and Retrieval for Image and Video Databases, vol. 3022, pp. 310–321 (1997)

    Google Scholar 

  8. Deering, S.: Host Extensions for IP Multicast. Internet RFC 1112 (1989)

    Google Scholar 

  9. Judge, P., Ammar, M.: Security Issues and Solutions in Multicast Content Distribution: A Survey. IEEE Network 17(1), 30–36 (2003)

    Article  Google Scholar 

  10. Judge, P., Ammar, M.: WHIM: Watermarking Multicast Video with a Hierarchy of Intermediaries. Computer Networks 39(6), 699–712 (2002)

    Article  Google Scholar 

  11. Mohamed, E.: Copyright Protection in Overlay Multicast Communication. In: Fourth International Conference on Innovations in Information Technology (IIT 2007), Dubai, UAE, pp. 103–107 (2007)

    Google Scholar 

  12. Pegueroles, J., Fernández, M., Rico-Novella, F., Soriano, M.: A Practical Solution for Distribution Rights Protection in Multicast Environments. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 527–536. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  13. Pendarakis, D., Shi, S., Verma, D., Waldvogel, M.: ALMI: an Application Level Multicast Infrastructure. In: Proceedings of the Third Usenix Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, USA, pp. 49–60 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mohamed, E.E., Guerchi, D. (2012). Leaker Identification in Multicast Communication. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30507-8_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30506-1

  • Online ISBN: 978-3-642-30507-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics