Abstract
We outline a scheme by which encrypted multicast audiovisual data may be watermarked by lightweight active network components in the multicast tree. Every recipient receives a slightly different version of the marked data, allowing those who illegally re-sell that data to be traced. Groups of cheating users or multicast routers can also be traced. There is a relationship between the requirements for the scheme proposed here, the requirements for reliable multicast protocols, and proposed mechanisms to support layered delivery of streamed media in the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.J., Manifavas, C.: Chameleon – A New Kind of Stream Cipher. In: Fourth Workshop on Fast Software Encryption, January 1997, pp. 107–113 (1997)
Ballardie, A.: Scalable Multicast Key Distribution. RFC 1949 (May 1996)
Ballardie, A., Crowcroft, J.: Multicast-Specific Security Threats and Counter-Measures. In: The Internet Society Symposium on Network and Distributed System Security, San Diego, California (February 1995)
Barlow, J.P.: The economy of ideas. Wired 2(3), 85 (1994)
Bolot, J.-C., Vega-García, A.: The Case for FEC-Based Error Control for Packet Audio in the Internet. ACM Multimedia Systems (1997)
Briscoe, B., Fairman, I.: Nark: Receiver-based Multicast Non-repudiation and Key Management. In: ACM Conference on Electronic Commerce (EC 1999), Denver, Colorado (November 1999)
Cáceres, R., Duffield, N.G., Horowitz, J., Towsley, D., Bu, T.: Multicast-Based Inference of Network-Internal Characteristics: Accuracy of Packet Loss Estimation. In: IEEE Infocom, New York (March 1999)
Carle, G., Biersack, E.: A Survey of Error Recovery Techniques for IP-Based Audio-Visual Multicast Applications. IEEE Network (November/December 1997)
Dwork, C., Lotspiech, J., Naor, M.: Digital Signets: Self Enforcing Protection of Digital Information. In: 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, May 1996, p. 489 (1996)
Handley, M.: An Examination of Mbone Performance. USC/ISI Research Report ISI/RR-97-450 (April 1997)
Handley, M., Thaler, D.: Multicast-Scope Zone Announcement Protocol. IETF (October 1998) (work in progress)
Hardjono, T., Cain, B., Doraswamy, N.: A Framework for Group Key Management for Multicast Security. IETF (July 1998) (work in progress)
International Federation of the Phonographic Industry. Request for proposals Embedded signalling systems issue 1.0 (June 1997)
Kent, S., Atkinson, R.: IP Authentication Header. RFC 2402 (November 1998)
Kent, S., Atkinson, R.: IP Encapsulating Security Payload. RFC 2406 (November 1998)
Levine, B., Garcia-Luna-Aceves, J.J.: A Comparison of Reliable Multicast Protocols. ACM Multimedia Systems Journal (August 1998)
Levine, B., Paul, S., Garcia-Luna-Aceves, J.J.: Organizing Multicast Receivers Deterministically by Packet-Loss Correlation. Preprint, University of California, Santa Cruz
McCanne, S., Jacobson, V., Vetterli, M.: Receiver-driven Layered Multicast. In: ACM SIGCOMM 1996, Stanford, CA (August 1996)
Meyer, D.: Administratively Scoped IP Multicast. RFC 2365 (July 1998)
Moon, S., Kurose, J., Skelly, P., Towsley, D.: Correlation of Packet Delay and Loss in the Internet. Technical Report 98-11, Department of Computer Science, University of Massachusetts, Amherst, MA 01003, USA
Naor, M., Pinkas, B.: Threshold Traitor Tracing. In: CRYPTO 1988. LNCS, vol. 403 (1988)
Perkins, C., Hodson, O., Hardman, V.: A Survey of Packet Loss Recovery Techniques for Streaming Audio. IEEE Network, pp. 40–49 (September/October 1998)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Second Workshop on Information Hiding, Portland, Oregon (April 1998)
Ratnasamy, S., McCanne, S.: Inference of Multicast Routing Trees and Bottleneck Bandwidths using End-to-end Measurements. In: IEEE Infocom, New York (March 1999)
Rohatgi, P.: A Hybrid Signature Scheme for Multicast Source Authentication. IRTF (June 1999) (work in progress)
Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-time Applications. RFC 1889 (January 1996)
Speakman, T., Farinacci, D., Lin, S., Tweedly, A.: PGM Reliable Transport Protocol Specification. IETF (February 1999) (work in Progress)
Vicisano, L., Rizzo, L., Crowcroft, J.: TCP-like congestion control for layered multicast data transfer. In: IEEE Infocom, San Francisco (March 1998)
Watson, A., Sasse, M.A.: Measuring Perceived Quality of Speech and Video in Multimedia Conferencing Applications. In: ACM Multimedia 1998, Bristol, England, September 1998, pp. 55–60 (1998)
Yajnik, M., Kurose, J., Towsley, D.: Packet Loss Correlation in the Mbone Multicast Network. In: IEEE Global Internet Conference (November 1996)
Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and Modelling of the Temportal Dependence in Packet Loss. In: IEEE Infocom, New York (March 1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brown, I., Perkins, C., Crowcroft, J. (1999). Watercasting: Distributed Watermarking of Multicast Media. In: Rizzo, L., Fdida, S. (eds) Networked Group Communication. NGC 1999. Lecture Notes in Computer Science, vol 1736. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-46703-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-46703-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66782-7
Online ISBN: 978-3-540-46703-8
eBook Packages: Springer Book Archive