Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
A Video Scrambling Technique Based On Space Filling Curves
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
IEICE - Transactions on Information and Systems
Channels with side information at the transmitter
IBM Journal of Research and Development
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
Statistical invisibility for collusion-resistant digital video watermarking
IEEE Transactions on Multimedia
Collusion-secure fingerprinting for digital data
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Digital rights management and watermarking of multimedia content for m-commerce applications
IEEE Communications Magazine
New paradigms for effective multicasting and fingerprinting of entertainment media
IEEE Communications Magazine
On the limits of steganography
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Today, with the rapid advance in broadband technology, streaming technology is applied to many applications, such as content delivery systems and web conference systems. On the other hand, we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. Traitor tracing is one of the key technologies that constructs DRM systems, and enables content distributors to observe and control content reception. General methods make use of watermarking to provide users' individual information unique to each user. However, these methods need to produce many individual contents. Especially, this is not realistic for real-time streaming systems. Furthermore, watermarking, which is a key technology adopted by contemporary methods, has known limitations and attacks against it. This is why the authors have proposed a method to monitor the content stream using traffic patterns constructed from only traffic volume information obtained from routers. The proposed method can determine who is watching the streaming content and whether or not a secondary content delivery exists. This information can be also used with general methods to construct a more practical traitor-tracing system. A method to cope with random errors and burst errors has also been investigated. Finally, the results of simulation and practical experiment are provided demonstrating the effectiveness of the proposed approach.