首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >Network-Based Traitor-Tracing Technique Using Traffic Pattern
【24h】

Network-Based Traitor-Tracing Technique Using Traffic Pattern

机译:使用流量模式的基于网络的叛徒追踪技术

获取原文
获取原文并翻译 | 示例
           

摘要

Today, with the rapid advance in broadband technology, streaming technology is applied to many applications, such as content delivery systems and web conference systems. On the other hand, we must implement digital rights management (DRM) to control content spreading and to avoid unintended content use. Traitor tracing is one of the key technologies that constructs DRM systems, and enables content distributors to observe and control content reception. General methods make use of watermarking to provide users' individual information unique to each user. However, these methods need to produce many individual contents. Especially, this is not realistic for real-time streaming systems. Furthermore, watermarking, which is a key technology adopted by contemporary methods, has known limitations and attacks against it. This is why the authors have proposed a method to monitor the content stream using traffic patterns constructed from only traffic volume information obtained from routers. The proposed method can determine who is watching the streaming content and whether or not a secondary content delivery exists. This information can be also used with general methods to construct a more practical traitor-tracing system. A method to cope with random errors and burst errors has also been investigated. Finally, the results of simulation and practical experiment are provided demonstrating the effectiveness of the proposed approach.
机译:如今,随着宽带技术的飞速发展,流传输技术已应用于许多应用程序,例如内容交付系统和Web会议系统。另一方面,我们必须实施数字版权管理(DRM),以控制内容的传播并避免意外使用内容。跟踪者跟踪是构建DRM系统的关键技术之一,它使内容分发者可以观察和控制内容接收。通用方法利用水印来提供每个用户唯一的用户个人信息。但是,这些方法需要产生许多单独的内容。特别是,对于实时流系统来说,这是不现实的。此外,作为现代方法所采用的关键技术的水印具有已知的局限性和针对其的攻击。这就是为什么作者提出了一种仅使用从路由器获得的流量信息构建的流量模式来监视内容流的方法的原因。所提出的方法可以确定谁在观看流媒体内容以及是否存在辅助内容传递。此信息也可以与一般方法一起使用,以构建更实用的叛徒追踪系统。还研究了一种应对随机错误和突发错误的方法。最后,提供了仿真结果和实际实验,证明了该方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号