Abstract
Multicast is a communication mode in which data is exchanged among multiple end systems. An important concern in multicast communications is the protection of copyrights. While preventing copyright violations seems very difficult, tracing copyright violators (leaker identification) is more feasible and can be used as a deterrence alternative. In order to identify leakers in a multicast environment, every receiver should obtain a uniquely marked copy of the data. However, delivering unique copies from the sender to the receivers is inefficient. This paper investigates multicast leaker identification and introduces an efficient solution that is based on binary search tree. We introduce the notion of suspicious set that includes suspected end systems. When a leak is detected, all receivers are inserted in the suspicious set. Using a binary search, the suspicious set is refined successively until it includes only the leakers. An analytical study is conducted to evaluate the proposed solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., Manifavas, C.: Chameleon – A New Kind of Stream Cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 107–113. Springer, Heidelberg (1997)
Brassil, J., Low, S., Maxemchuk, N., O’Gorman, L.: Electronic Marking and Identification Techniques to Discourage Document Copying. In: Proceedings of IEEE Infocom 1994, vol. 3, pp. 1278–1287 (1994)
Brown, I., Perkins, C., Crowcroft, J.: Watercasting: Distributed Watermarking of Multicast Media. In: Proceedings of the First International Workshop on Networked Group Communication, pp. 286–300 (1999)
Chu, H., Qiao, L., Nahrstedt, K., Wang, H., Jain, R.: A Secure Multicast Protocol with Copyright Protection. ACM SIGCOMM Computer Communication Review 32(2), 42–60 (2002)
Chu, Y., Rao, S., Seshan, S., Zhang, H.: Enabling Conferencing Applications on the Internet Using an Overlay Multicast Architecture. In: Proceedings of ACM SIGCOMM 2001 (2001)
Chu, Y., Rao, S., Zhang, H.: A Case for End System Multicast. In: Proceedings of ACM SIGMETRICS, pp. 1–12 (2000)
Craver, S., Memon, N., Yeo, B., Yeung, M.: Can Invisible Watermarks Resolve Rightful Ownerships? In: Proceedings of the IS & T/SPIE Conference on Storage and Retrieval for Image and Video Databases, vol. 3022, pp. 310–321 (1997)
Deering, S.: Host Extensions for IP Multicast. Internet RFCÂ 1112 (1989)
Judge, P., Ammar, M.: Security Issues and Solutions in Multicast Content Distribution: A Survey. IEEE Network 17(1), 30–36 (2003)
Judge, P., Ammar, M.: WHIM: Watermarking Multicast Video with a Hierarchy of Intermediaries. Computer Networks 39(6), 699–712 (2002)
Mohamed, E.: Copyright Protection in Overlay Multicast Communication. In: Fourth International Conference on Innovations in Information Technology (IIT 2007), Dubai, UAE, pp. 103–107 (2007)
Pegueroles, J., Fernández, M., Rico-Novella, F., Soriano, M.: A Practical Solution for Distribution Rights Protection in Multicast Environments. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 527–536. Springer, Heidelberg (2006)
Pendarakis, D., Shi, S., Verma, D., Waldvogel, M.: ALMI: an Application Level Multicast Infrastructure. In: Proceedings of the Third Usenix Symposium on Internet Technologies and Systems (USITS), San Francisco, CA, USA, pp. 49–60 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mohamed, E.E., Guerchi, D. (2012). Leaker Identification in Multicast Communication. In: Benlamri, R. (eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-30507-8_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30506-1
Online ISBN: 978-3-642-30507-8
eBook Packages: Computer ScienceComputer Science (R0)