DocumentCode :
1456260
Title :
Network-Based Traitor-Tracing Technique Using Traffic Pattern
Author :
Nakayama, Hidehisa ; Jamalipour, Abbas ; Kato, Nei
Author_Institution :
Dept. of Electron. & Intell. Syst., Tohoku Inst. of Technol., Sendai, Japan
Volume :
5
Issue :
2
fYear :
2010
fDate :
6/1/2010 12:00:00 AM
Firstpage :
300
Lastpage :
313
Abstract :
Today, with the rapid advance in broadband technology, streaming technology is applied to many applications, such as content delivery systems and web conference systems. On the other hand, we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. Traitor tracing is one of the key technologies that constructs DRM systems, and enables content distributors to observe and control content reception. General methods make use of watermarking to provide users´ individual information unique to each user. However, these methods need to produce many individual contents. Especially, this is not realistic for real-time streaming systems. Furthermore, watermarking, which is a key technology adopted by contemporary methods, has known limitations and attacks against it. This is why the authors have proposed a method to monitor the content stream using traffic patterns constructed from only traffic volume information obtained from routers. The proposed method can determine who is watching the streaming content and whether or not a secondary content delivery exists. This information can be also used with general methods to construct a more practical traitor-tracing system. A method to cope with random errors and burst errors has also been investigated. Finally, the results of simulation and practical experiment are provided demonstrating the effectiveness of the proposed approach.
Keywords :
broadband networks; media streaming; pattern recognition; real-time systems; telecommunication security; telecommunication traffic; watermarking; DRM; Web conference systems; broadband technology; burst errors; content delivery systems; content distributors; digital rights management; network based traitor tracing technique; random errors; real-time streaming systems; streaming technology; traffic pattern; traffic volume information; watermarking method; Digital rights management (DRM); pattern recognition; streaming contents; traffic pattern; traitor tracing;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2010.2046961
Filename :
5439773
Link To Document :
بازگشت