Prefix routing schemes in dynamic networks
Computer Networks and ISDN Systems
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Summary cache: a scalable wide-area Web cache sharing protocol
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Robust MPEG video watermarking technologies
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
A case for end system multicast (keynote address)
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Enabling conferencing applications on the internet using an overlay muilticast architecture
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A Model of Attacks of Malicious Hosts Against Mobile Agents
ECOOP '98 Workshop ion on Object-Oriented Technology
Watercasting: Distributed Watermarking of Multicast Media
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
ICMCS '98 Proceedings of the IEEE International Conference on Multimedia Computing and Systems
Scattercast: an architecture for internet broadcast distribution as an infrastructure service
Scattercast: an architecture for internet broadcast distribution as an infrastructure service
A hierarchical internet object cache
ATEC '96 Proceedings of the 1996 annual conference on USENIX Annual Technical Conference
RMTP: a reliable multicast transport protocol
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 3
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
A survey of active network research
IEEE Communications Magazine
Multicast group behavior in the Internet's multicast backbone (MBone)
IEEE Communications Magazine
IEEE Communications Magazine
Reliable multicast transport protocol (RMTP)
IEEE Journal on Selected Areas in Communications
Video Watermarking and Benchmarking
Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies
Key management for multicast fingerprinting
ICISS'05 Proceedings of the First international conference on Information Systems Security
Hi-index | 0.00 |
Fingerprinting, watermarking content to identify the recipient, provides a good deterrence to unauthorized duplication and propagation of multimedia streams. This is straightforward in a unicast environment; however, in a multicast environment, inserting a fingerprint at the source does not provide any security since many receivers will share a common fingerprint. A simple solution would be to fingerprint the data for each user at the source and unicast the different streams. We aim to achieve a more scalable solution while maintaining and even increasing the level of security. To achieve this, we have developed WHIM, a scalable system that allows multicast content to be marked with distinct information for distinct receivers securely. This system introduces two new concepts: (1) generating a watermark based on the receiver's location in a tree overlaying the network and (2) inserting the watermark in the content incrementally as it traverses an overlay network. We propose and evaluate several forms of this architecture and show how it improves scalability while increasing security.