Skip to main content

A Practical Solution for Distribution Rights Protection in Multicast Environments

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3982))

Included in the following conference series:

Abstract

One of the main problems that remain to be solved in pay-per-view Internet services is copyright protection. As in almost every scenario, any copyright protection scheme has to deal with two main aspects: protect the true content authors from those who may dishonestly claim ownership of intellectual property rights and prevent piracy by detecting the authorized (but dishonest) users responsible of illegal redistribution of copies. The former aspect can be solved with watermarking techniques while for the latter, fingerprinting mechanisms are the most appropriate ones. In internet services such as Web-TV or near video on-demand where multicast is used, watermarking can be directly applied. On the other hand, multicast fingerprinting has been seldom studied because delivering different marked content for different receivers seems a contradiction with multicast basics. In this paper we present a solution to prevent unauthorized redistribution of content in multicast scenarios. The system is based on a trusted soft-engine embedded in the receiver and co-managed by the content distributor. The trusted soft-engine is responsible of the client-side multicast key management functions. It only will allow the decryption and displaying of the actual data if it has previously inserted a fingerprinting mark with the identity of the decoder. Upon finding a pirate copy of any multicast delivered content, this mark can be used to unambiguously reveal the identity of the receiver that decoded the content from which the pirate copies are made.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet Draft. irtf-smug-groupkeymgmt-oft-00.txt, work in progress (August 2000)

    Google Scholar 

  2. Barg, A., Blakley, G.R., Kabatiansky, G.: Digital fingerprinting codes: Problem statements, constructions, identification of traitors. IEEE Trans. Inform. Theory 49(4), 852–865 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  3. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

    Google Scholar 

  4. Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Inform. Theory 44(5), 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  5. Brown, I., Perkins, C., Crowcroft, J.: Watercasting: Distributed Watermarking of Multicast Media. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol. 1736, pp. 286–300. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  6. Canetti, R., Malkin, T., Nissim, K.: Efficient Communication Storage Tradeoffs for Multicast Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 456–470. Springer, Heidelberg (1999)

    Google Scholar 

  7. Canetti, R., Pinkas, B.: A taxonomy of multicast security issues, IETF Internet Draft draft-irtf-smugtaxonomy -01.txt, work in progress (April 1999)

    Google Scholar 

  8. Caronni, G., Schuba, C.: Enabling Hierarchical and Bulk-Distribution for Watermarked Content. In: The 17th Annual Computer Security Applications Conference, New Orleans, LA, December 10-14 (2001)

    Google Scholar 

  9. Chor, D., et al.: Tracing Traitors. IEEE Transactions on Information Theory 46(3), 893–910 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  10. Chu, H., Qiao, L., Nahrstedt, K.: A Secure Multicast Protocol with Copyright Protection. In: Proceedings of IS&T/SPIE Symposium on Electronic Imaging: Science and Technology, January 25-27 (1999)

    Google Scholar 

  11. Fernandez, M., Soriano, M.: Soft-Decision Tracing in Fingerprinted Multimedia Contents. IEEE Multimedia 11(2) (2004)

    Google Scholar 

  12. Hardjono, T., Cain, B., Doraswamy, N.: A Framework for Group Key Management for Multicast Security, IETF Internet Draft, draft-ietf-ipsec-gkmframework-03.txt, work in progress (August 2000)

    Google Scholar 

  13. Harney, H., Harder, E.: Logical Key Hierarchy Protocol (LKH). IETF Internet Draft, harney-sparta-lkhp-sec-00.txt, work in progress (March 1999)

    Google Scholar 

  14. Harney, H., Muckenhirn, C., Rivers, T.: Group Key Management (GKMP) Architecture, SPARTA, Inc., IETF RFC 2094 (July 1997)

    Google Scholar 

  15. Judge, P., Ammar, M.: WHIM: Watermarking Multicast Video with a Hierarchy of Intermediaries. In: The 10th International Workshop on Network and Operation System Support for Digital Audio and Video, Chapel Hill, NC, June 26-28 (2000)

    Google Scholar 

  16. Pegueroles, J., Bin, W., Soriano, M., Rico-Novella, F.: Group Rekeying Algorithm using Pseudo-Random Functions and Modular Reduction. In: Li, M., Sun, X.-H., Deng, Q.-n., Ni, J. (eds.) GCC 2003. LNCS, vol. 3032, pp. 875–882. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  17. Wagner, N.: Fingerprinting. In: Proceedings of the 1983 IEEE Symposium on Security and Privacy, April 1983, pp. 18–22 (1983)

    Google Scholar 

  18. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures. IETF RFC 2627 (June 1999)

    Google Scholar 

  19. Yoshioka, K., et al.: Systematic Treatment of Collusion secure codes: security definitions and their relations. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 408–421. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pegueroles, J., Fernández, M., Rico-Novella, F., Soriano, M. (2006). A Practical Solution for Distribution Rights Protection in Multicast Environments. In: Gavrilova, M., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3982. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751595_56

Download citation

  • DOI: https://doi.org/10.1007/11751595_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34075-1

  • Online ISBN: 978-3-540-34076-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics