CFP last date
20 May 2024
Reseach Article

Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns

Published on None 2011 by K. Ramya, D. Ramya Dorai, Dr. M. Rajaram
Computational Science - New Dimensions & Perspectives
Foundation of Computer Science USA
NCCSE - Number 2
None 2011
Authors: K. Ramya, D. Ramya Dorai, Dr. M. Rajaram
26d190ff-9164-44e3-b89f-6d407159037e

K. Ramya, D. Ramya Dorai, Dr. M. Rajaram . Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns. Computational Science - New Dimensions & Perspectives. NCCSE, 2 (None 2011), 80-85.

@article{
author = { K. Ramya, D. Ramya Dorai, Dr. M. Rajaram },
title = { Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns },
journal = { Computational Science - New Dimensions & Perspectives },
issue_date = { None 2011 },
volume = { NCCSE },
number = { 2 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 80-85 },
numpages = 6,
url = { /specialissues/nccse/number2/1865-167/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Computational Science - New Dimensions & Perspectives
%A K. Ramya
%A D. Ramya Dorai
%A Dr. M. Rajaram
%T Tracing Illegal Redistributors of Streaming Contents using Traffic Patterns
%J Computational Science - New Dimensions & Perspectives
%@ 0975-8887
%V NCCSE
%N 2
%P 80-85
%D 2011
%I International Journal of Computer Applications
Abstract

The tracing scheme is using similarity of traffic pattern to trace the source of leaks when sensitive or proprietary data is made available to large set of parties. On the other hand we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. General tracing methods use either watermarking or cryptographic keys to protect the digitally protected content. In those methods, malicious users can interrupt tracing with illegal process at user side computers. To prevent all illegal process at user side, routers should analyze information embedded in to packets which is unrealistic. The proposed method is used to detect illegal content streaming by using only traffic patterns which are constructed from amount of traffic traversing routers.

References
  1. Y. Chu, S. G. Rao, S. Seshan and H. Zhang, “Enabling conferencing applications on the Internet using an overlay multicast architecture,” in Proc. ACM SIGCOM, pp. 55-67, California, USA, Aug. 2001.
  2. Z. Yang, H. Ma, and J. Zhang, “A dynamic scalable service model for SIP-based video conference,” in Proc. 9th International Conference on Computer Supported Cooperative Work in Design, Vol. 1, pp. 24-26, Coventry, UK, May. 2005.
  3. J. Schwenk and J. Ueberberg, Tracing Traitors using Finite Geometries, manuscript.
  4. B. Chor, A. Fiat, and M. Naor, Tracing Traitors, Proc. Crypto 94, LNCS 839, Springer-Verlag, Berlin,
  5. A. Fiat and T. Tassa, “Dynamic traitor tracing,” J. Cryptology, vol. 14, no. 3, pp. 211–223, 2001.
  6. D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data, IEEE Transactions on Information Theory, vol. 44, no. 5 (1998), pp. 1897–1905 (see also Proc. Crypto 95, LNCS 963, Springer-Verlag,Berlin, 1995, pp. 452–465).
  7. I. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, A Secure, Robust Watermark for Multimedia, Information Hiding, LNCS 1174, Springer-Verlag, Berlin, 1996, pp. 185–226.
  8. M. Dobashi, H. Nakayama, N. Kato, Y. Nemoto, and A. Jamalipour, “Traitor tracing technology of streaming contents delivery using traffic pattern in wired/wireless environments,” in Proc. IEEE GLOBECOM, Nov. 2006, pp. 1–5.
  9. “Youtube - Broadcast Yourself,” Available at: http://www.youtube.com/
  10. “MSN Video,” Available at: http://video.in.msn.com/
  11. R.S. Naini, and Y. Wang, “Sequential traitor tracing,” IEEE Trans. On Information Theory, vol.49, no.5, pp. 1319–1326, 2003.
  12. K. Matsui, Basic knowledge of digital watermark, Morikita Shuppan,1998.
  13. B. Turnbull, “Important legal developments regarding protection of copyrighted content against unauthorized copying,” IEEE Comm. Magazine,vol.39, no.8, pp. 92–100, Aug. 2001.
  14. D. Kundur, and K. Karthik, “Video fingerprinting and encryption principles for digital rights management,” Proc. of the IEEE, vol.92, no.6,pp. 918–932, June 2004.
  15. D. Boneh, and M. Franklin, “An efficient public key traitor tracing scheme,” Advances in Cryptology - Crypto’99, pp. 338–353, 1999.
  16. R. Duda, P. Hart, and D. Stork, Pattern Classification(2nd ed.), John Wiley & Sons, 2000.
  17. K. Matsuda, H. Nakayama, and N. Kato, “A Study on Streaming Video Detection using Dynamic Traffic Pattern,” IEICE Transactions on Communications (Japanese Edition), Vol. J19-B, No. 02, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Rights Management (DRM) Streaming Content Traffic Pattern