Distributed multicast of fingerprinted content based on a rational peer-to-peer community
نویسندگان
چکیده
Keywords: Co-utility Multicast fingerprinting Anonymous fingerprinting Game theory a b s t r a c t In conventional multicast transmission, one sender sends the same content to a set of receivers. This precludes fingerprinting the copy obtained by each receiver (in view of redistribution control and other applications). A straightforward alternative is for the sender to separately fingerprint and send in unicast one copy of the content for each receiver. This approach is not scalable and may implode the sender. We present a scalable solution for distributed multicast of fingerprinted content, in which receivers rationally cooperate in fingerprinting and spreading the content. Furthermore, fingerprinting can be anonymous, in order for honest receivers to stay anonymous. Copyright protection techniques have gained widespread attention by both academia and industry in the recent years. Home Internet access and the increased bandwidth of communications have contributed to the explosion of copyright-breaking copying of digital contents. In this context, fingerprinting emerged as a convenient technology to fight against unlawful digital content distribution [6,4]. Fingerprinting techniques consist of embedding a transparent watermark into the protected content in such a way that a unique identifier exists for each buyer of the content. This identifier can be extracted later on and might be used to trace and match an illegal distributor of the content. This makes it possible to undertake the appropriate legal actions against such treacherous buyers. Fingerprinting schemes can be classified in three different categories [7], namely symmetric, asymmetric and anonymous. In symmetric fingerprinting, the embedding of the fingerprint is performed by the merchant only and, thus, it provides no valid evidence of a treacherous behavior of a buyer (since the merchant herself could be the illegal distributor). In asymmetric fingerprinting, the embedding is performed using a protocol designed in such a way that only the buyer obtains the fingerprinted copy of the content. This makes it possible to prove the illegal distributor's treachery to a third party. Finally, anonymous fingerprinting retains the asymmetric property and also protects the privacy of buyers, whose identity is only revealed and disclosed in case of illegal distribution. From the point of view of a buyer, anonymity is a valuable property and several protocols have been proposed for anonymous fingerprinting. However, current anonymous fingerprinting proposals in the literature (see Section 2.3 below for a brief review) place a substantial computational and communication burden on the merchant. The merchant's overhead is …
منابع مشابه
Content-Based Multicast: Comparison of Implementation Options
This paper is an attempt to quantify the performance differences for content-based multicast implemented inside the overlay routing algorithm or built on top of the simple API provided by the routing layer. We focus on overlay networks designed for peer-to-peer distributed hash table (DHT) applications where content-based multicast is most applicable. In particular we study the Content Addressa...
متن کاملThe long, interesting tail of Indie TV
We describe a scenario of independent TV programme dissemination where viewers receive their own tailored channel created from content in which they’re interested. We focus primarily on the problem of distributing the content from the producers to all interested viewers. Our approach is based on a multicast scheme called implicit group messaging, realised as a distributed structured peer-to-pee...
متن کاملMulticast vs. P2P for content distribution
Many different service architectures, ranging from centralized client-server to fully distributed are available in today’s world for Content Distribution on the Internet. The IP Multicast seemed to be a wonderful technology with potential benefits for one-tomany or many-to-many content distribution applications. However, even after more than two decades of its invention, only very few commercia...
متن کاملData Distribution Optimization using Offline Algorithms and a Peer-to-Peer Small Diameter Tree Architecture with Bounded Node Degrees
Multicast data transfers occur in many distributed systems and applications (e.g. IPTV, Grids, content delivery networks). Because of this, efficient multicast data distribution optimization techniques are required. In the first part of this paper we present a small diameter, bounded degree, collaborative peerto-peer multicast tree architecture, which supports dynamic node arrivals and departur...
متن کاملPeer-Assessment and Student-Driven Negotiation of Meaning: Two Ingredients for Creating Social Presence in Online EFL Social Contexts
With the current availability of state-of-the-art technology, particularly the Internet, people have expanded their channels of communication. This has similarly led to many people utilizing technology to learn second/foreign languages. Nevertheless, many current computer-assisted language learning (CALL) programs still appear to be lacking in interactivity and what is termed social presence, w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Communications
دوره 36 شماره
صفحات -
تاریخ انتشار 2013