Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

Network-Based Traitor-Tracing Technique Using Traffic Pattern

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
3 Author(s)
Nakayama, H. ; Dept. of Electron. & Intell. Syst., Tohoku Inst. of Technol., Sendai, Japan ; Jamalipour, A. ; Kato, N.

Today, with the rapid advance in broadband technology, streaming technology is applied to many applications, such as content delivery systems and web conference systems. On the other hand, we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. Traitor tracing is one of the key technologies that constructs DRM systems, and enables content distributors to observe and control content reception. General methods make use of watermarking to provide users' individual information unique to each user. However, these methods need to produce many individual contents. Especially, this is not realistic for real-time streaming systems. Furthermore, watermarking, which is a key technology adopted by contemporary methods, has known limitations and attacks against it. This is why the authors have proposed a method to monitor the content stream using traffic patterns constructed from only traffic volume information obtained from routers. The proposed method can determine who is watching the streaming content and whether or not a secondary content delivery exists. This information can be also used with general methods to construct a more practical traitor-tracing system. A method to cope with random errors and burst errors has also been investigated. Finally, the results of simulation and practical experiment are provided demonstrating the effectiveness of the proposed approach.

Published in:

Information Forensics and Security, IEEE Transactions on  (Volume:5 ,  Issue: 2 )