Abstract
One of the main problems that remain to be solved in pay-per-view Internet services is copyright protection. As in almost every scenario, any copyright protection scheme has to deal with two main aspects: protect the true content authors from those who may dishonestly claim ownership of intellectual property rights and prevent piracy by detecting the authorized (but dishonest) users responsible of illegal redistribution of copies. The former aspect can be solved with watermarking techniques while for the latter, fingerprinting mechanisms are the most appropriate ones. In internet services such as Web-TV or near video on-demand where multicast is used, watermarking can be directly applied. On the other hand, multicast fingerprinting has been seldom studied because delivering different marked content for different receivers seems a contradiction with multicast basics. In this paper we present a solution to prevent unauthorized redistribution of content in multicast scenarios. The system is based on a trusted soft-engine embedded in the receiver and co-managed by the content distributor. The trusted soft-engine is responsible of the client-side multicast key management functions. It only will allow the decryption and displaying of the actual data if it has previously inserted a fingerprinting mark with the identity of the decoder. Upon finding a pirate copy of any multicast delivered content, this mark can be used to unambiguously reveal the identity of the receiver that decoded the content from which the pirate copies are made.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet Draft. irtf-smug-groupkeymgmt-oft-00.txt, work in progress (August 2000)
Barg, A., Blakley, G.R., Kabatiansky, G.: Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory 49(4), 852–865 (2003)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)
Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998)
Brown, I., Perkins, C., Crowcroft, J.: Watercasting: Distributed Watermarking of Multicast Media. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol. 1736, pp. 286–300. Springer, Heidelberg (1999)
Canetti, R., Malkin, T., Nissim, K.: Efficient Communication Storage Tradeoffs for Multicast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 456–470. Springer, Heidelberg (1999)
Canetti, R., Pinkas, B.: A taxonomy of multicast security issues, IETF Internet Draft draft-irtf-smugtaxonomy -01.txt, work in progress (April 1999)
Caronni, G., Schuba, C.: Enabling Hierarchical and Bulk-Distribution for Watermarked Content. In: The 17th Annual Computer Security Applications Conference, New Orleans, LA, December 10-14 (2001)
Chor, D., et al.: Tracing Traitors. IEEE Transactions on Information Theory 46(3), 893–910 (2000)
Chu, H., Qiao, L., Nahrstedt, K.: A Secure Multicast Protocol with Copyright Protection. In: Proceedings of IS&T/SPIE Symposium on Electronic Imaging: Science and Technology, January 25-27 (1999)
Fernandez, M., Soriano, M.: Soft-Decision Tracing in Fingerprinted Multimedia Contents. IEEE Multimedia 11(2) (2004)
Hardjono, T., Cain, B., Doraswamy, N.: A Framework for Group Key Management for Multicast Security, IETF Internet Draft, draft-ietf-ipsec-gkmframework-03.txt, work in progress (August 2000)
Harney, H., Harder, E.: Logical Key Hierarchy Protocol (LKH). IETF Internet Draft, harney-sparta-lkhp-sec-00.txt, work in progress (March 1999)
Harney, H., Muckenhirn, C., Rivers, T.: Group Key Management (GKMP) Architecture, SPARTA, Inc., IETF RFC 2094 (July 1997)
Judge, P., Ammar, M.: WHIM: Watermarking Multicast Video with a Hierarchy of Intermediaries. In: The 10th International Workshop on Network and Operation System Support for Digital Audio and Video, Chapel Hill, NC, June 26-28 (2000)
Pegueroles, J., Bin, W., Soriano, M., Rico-Novella, F.: Group Rekeying Algorithm using Pseudo-Random Functions and Modular Reduction. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 875–882. Springer, Heidelberg (2004)
Wagner, N.: Fingerprinting. In: Proceedings of the 1983 IEEE Symposium on Security and Privacy, April 1983, pp. 18–22 (1983)
Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. IETF RFC 2627 (June 1999)
Yoshioka, K., et al.: Systematic Treatment of Collusion secure codes: security definitions and their relations. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 408–421. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pegueroles, J., Fernández, M., Rico-Novella, F., Soriano, M. (2006). A Practical Solution for Distribution Rights Protection in Multicast Environments. In: Gavrilova, M., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751595_56
Download citation
DOI: https://doi.org/10.1007/11751595_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34075-1
Online ISBN: 978-3-540-34076-8
eBook Packages: Computer ScienceComputer Science (R0)