Skip to main content

Watercasting: Distributed Watermarking of Multicast Media

  • Conference paper
Book cover Networked Group Communication (NGC 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1736))

Included in the following conference series:

Abstract

We outline a scheme by which encrypted multicast audiovisual data may be watermarked by lightweight active network components in the multicast tree. Every recipient receives a slightly different version of the marked data, allowing those who illegally re-sell that data to be traced. Groups of cheating users or multicast routers can also be traced. There is a relationship between the requirements for the scheme proposed here, the requirements for reliable multicast protocols, and proposed mechanisms to support layered delivery of streamed media in the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Manifavas, C.: Chameleon – A New Kind of Stream Cipher. In: Fourth Workshop on Fast Software Encryption, January 1997, pp. 107–113 (1997)

    Google Scholar 

  2. Ballardie, A.: Scalable Multicast Key Distribution. RFC 1949 (May 1996)

    Google Scholar 

  3. Ballardie, A., Crowcroft, J.: Multicast-Specific Security Threats and Counter-Measures. In: The Internet Society Symposium on Network and Distributed System Security, San Diego, California (February 1995)

    Google Scholar 

  4. Barlow, J.P.: The economy of ideas. Wired 2(3), 85 (1994)

    MathSciNet  Google Scholar 

  5. Bolot, J.-C., Vega-García, A.: The Case for FEC-Based Error Control for Packet Audio in the Internet. ACM Multimedia Systems (1997)

    Google Scholar 

  6. Briscoe, B., Fairman, I.: Nark: Receiver-based Multicast Non-repudiation and Key Management. In: ACM Conference on Electronic Commerce (EC 1999), Denver, Colorado (November 1999)

    Google Scholar 

  7. Cáceres, R., Duffield, N.G., Horowitz, J., Towsley, D., Bu, T.: Multicast-Based Inference of Network-Internal Characteristics: Accuracy of Packet Loss Estimation. In: IEEE Infocom, New York (March 1999)

    Google Scholar 

  8. Carle, G., Biersack, E.: A Survey of Error Recovery Techniques for IP-Based Audio-Visual Multicast Applications. IEEE Network (November/December 1997)

    Google Scholar 

  9. Dwork, C., Lotspiech, J., Naor, M.: Digital Signets: Self Enforcing Protection of Digital Information. In: 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, May 1996, p. 489 (1996)

    Google Scholar 

  10. Handley, M.: An Examination of Mbone Performance. USC/ISI Research Report ISI/RR-97-450 (April 1997)

    Google Scholar 

  11. Handley, M., Thaler, D.: Multicast-Scope Zone Announcement Protocol. IETF (October 1998) (work in progress)

    Google Scholar 

  12. Hardjono, T., Cain, B., Doraswamy, N.: A Framework for Group Key Management for Multicast Security. IETF (July 1998) (work in progress)

    Google Scholar 

  13. International Federation of the Phonographic Industry. Request for proposals Embedded signalling systems issue 1.0 (June 1997)

    Google Scholar 

  14. Kent, S., Atkinson, R.: IP Authentication Header. RFC 2402 (November 1998)

    Google Scholar 

  15. Kent, S., Atkinson, R.: IP Encapsulating Security Payload. RFC 2406 (November 1998)

    Google Scholar 

  16. Levine, B., Garcia-Luna-Aceves, J.J.: A Comparison of Reliable Multicast Protocols. ACM Multimedia Systems Journal (August 1998)

    Google Scholar 

  17. Levine, B., Paul, S., Garcia-Luna-Aceves, J.J.: Organizing Multicast Receivers Deterministically by Packet-Loss Correlation. Preprint, University of California, Santa Cruz

    Google Scholar 

  18. McCanne, S., Jacobson, V., Vetterli, M.: Receiver-driven Layered Multicast. In: ACM SIGCOMM 1996, Stanford, CA (August 1996)

    Google Scholar 

  19. Meyer, D.: Administratively Scoped IP Multicast. RFC 2365 (July 1998)

    Google Scholar 

  20. Moon, S., Kurose, J., Skelly, P., Towsley, D.: Correlation of Packet Delay and Loss in the Internet. Technical Report 98-11, Department of Computer Science, University of Massachusetts, Amherst, MA 01003, USA

    Google Scholar 

  21. Naor, M., Pinkas, B.: Threshold Traitor Tracing. In: CRYPTO 1988. LNCS, vol. 403 (1988)

    Google Scholar 

  22. Perkins, C., Hodson, O., Hardman, V.: A Survey of Packet Loss Recovery Techniques for Streaming Audio. IEEE Network, pp. 40–49 (September/October 1998)

    Google Scholar 

  23. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Second Workshop on Information Hiding, Portland, Oregon (April 1998)

    Google Scholar 

  24. Ratnasamy, S., McCanne, S.: Inference of Multicast Routing Trees and Bottleneck Bandwidths using End-to-end Measurements. In: IEEE Infocom, New York (March 1999)

    Google Scholar 

  25. Rohatgi, P.: A Hybrid Signature Scheme for Multicast Source Authentication. IRTF (June 1999) (work in progress)

    Google Scholar 

  26. Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-time Applications. RFC 1889 (January 1996)

    Google Scholar 

  27. Speakman, T., Farinacci, D., Lin, S., Tweedly, A.: PGM Reliable Transport Protocol Specification. IETF (February 1999) (work in Progress)

    Google Scholar 

  28. Vicisano, L., Rizzo, L., Crowcroft, J.: TCP-like congestion control for layered multicast data transfer. In: IEEE Infocom, San Francisco (March 1998)

    Google Scholar 

  29. Watson, A., Sasse, M.A.: Measuring Perceived Quality of Speech and Video in Multimedia Conferencing Applications. In: ACM Multimedia 1998, Bristol, England, September 1998, pp. 55–60 (1998)

    Google Scholar 

  30. Yajnik, M., Kurose, J., Towsley, D.: Packet Loss Correlation in the Mbone Multicast Network. In: IEEE Global Internet Conference (November 1996)

    Google Scholar 

  31. Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and Modelling of the Temportal Dependence in Packet Loss. In: IEEE Infocom, New York (March 1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brown, I., Perkins, C., Crowcroft, J. (1999). Watercasting: Distributed Watermarking of Multicast Media. In: Rizzo, L., Fdida, S. (eds) Networked Group Communication. NGC 1999. Lecture Notes in Computer Science, vol 1736. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-46703-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-46703-8_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66782-7

  • Online ISBN: 978-3-540-46703-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics