Skip to main content
Erschienen in: Multimedia Systems 2/2014

01.03.2014 | Regular Paper

Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints

verfasst von: David Megías, Josep Domingo-Ferrer

Erschienen in: Multimedia Systems | Ausgabe 2/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multicast distribution of content is not suited to content-based electronic commerce because all buyers obtain exactly the same copy of the content, in such a way that unlawful redistributors cannot be traced. Unicast distribution has the shortcoming of requiring one connection with each buyer, but it allows the merchant to embed a different serial number in the copy obtained by each buyer, which enables redistributor tracing. Peer-to-peer (P2P) distribution is a third option which may combine some of the advantages of multicast and unicast: on the one hand, the merchant only needs unicast connections with a few seed buyers, who take over the task of further spreading the content; on the other hand, if a proper fingerprinting mechanism is used, unlawful redistributors of the P2P-distributed content can still be traced. In this paper, we propose a novel fingerprinting mechanism for P2P content distribution which allows redistributor tracing, while preserving the privacy of most honest buyers and offering collusion resistance and buyer frameproofness.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Bo, Y., Piyuan, L., Wenzheng Z.: An efficient anonymous fingerprinting protocol. In: Computational Intelligence and Security, LNCS, vol. 4456, pp. 824–832. Springer, Berlin (2007) Bo, Y., Piyuan, L., Wenzheng Z.: An efficient anonymous fingerprinting protocol. In: Computational Intelligence and Security, LNCS, vol. 4456, pp. 824–832. Springer, Berlin (2007)
3.
Zurück zum Zitat Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology-CRYPTO’95, LNCS, vol. 963, pp. 452–465. Springer, Berlin (1995) Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology-CRYPTO’95, LNCS, vol. 963, pp. 452–465. Springer, Berlin (1995)
4.
Zurück zum Zitat Camenisch, J.: Efficient anonymous fingerprinting with group signatures. In: Asiacrypt 2000, LNCS, vol. 1976, pp. 415–428. Springer, Berlin (2000) Camenisch, J.: Efficient anonymous fingerprinting with group signatures. In: Asiacrypt 2000, LNCS, vol. 1976, pp. 415–428. Springer, Berlin (2000)
5.
Zurück zum Zitat Chang, C.-C., Tsai, H.-C., Hsieh, Y.-P.: An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput. Secur. 29(2), 269–277 (2010)CrossRef Chang, C.-C., Tsai, H.-C., Hsieh, Y.-P.: An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput. Secur. 29(2), 269–277 (2010)CrossRef
6.
Zurück zum Zitat Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef
7.
Zurück zum Zitat Chaum, D.: Untraceable electronic cash. In: Advances in Cryptology-CRYPTO’88, LNCS, vol. 403, pp. 319–327. Springer, Berlin (1990) Chaum, D.: Untraceable electronic cash. In: Advances in Cryptology-CRYPTO’88, LNCS, vol. 403, pp. 319–327. Springer, Berlin (1990)
8.
Zurück zum Zitat Chaum, D., Damgård, I., van de Graaf, J.: Multiparty computations ensuring privacy of each party’s input and correctness of the result. In: Advances in Cryptology-CRYPTO’87, LNCS, vol. 293, pp. 87–119. Springer, Berlin (1988) Chaum, D., Damgård, I., van de Graaf, J.: Multiparty computations ensuring privacy of each party’s input and correctness of the result. In: Advances in Cryptology-CRYPTO’87, LNCS, vol. 293, pp. 87–119. Springer, Berlin (1988)
9.
Zurück zum Zitat Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008) Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008)
10.
Zurück zum Zitat Damgård, I., Ishai, Y., Krøigaard, M.: Perfectly secure multiparty computation and the computational overhead of cryptography. In: EUROCRYPT 2010, LNCS, vol. 6110, pp. 445–465. Springer, Berlin (2010) Damgård, I., Ishai, Y., Krøigaard, M.: Perfectly secure multiparty computation and the computational overhead of cryptography. In: EUROCRYPT 2010, LNCS, vol. 6110, pp. 445–465. Springer, Berlin (2010)
11.
Zurück zum Zitat Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic identification of redistributors. Electr. Lett. 34(13), 1303–1304 (1998)CrossRef Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic identification of redistributors. Electr. Lett. 34(13), 1303–1304 (1998)CrossRef
12.
Zurück zum Zitat Domingo-Ferrer, J.: Anonymous fingerprinting based on committed oblivious transfer. In: Public Key Cryptography-PKC 1999, LNCS, vol. 1560, pp. 43–52. Springer, Berlin (1999) Domingo-Ferrer, J.: Anonymous fingerprinting based on committed oblivious transfer. In: Public Key Cryptography-PKC 1999, LNCS, vol. 1560, pp. 43–52. Springer, Berlin (1999)
13.
Zurück zum Zitat Domingo-Ferrer, J.: Coprivacy: towards a theory of sustainable privacy. In: Privacy in Statistical Databases-PSD 2010, LNCS, vol. 6344, pp. 258–268. Springer, Berlin (2010) Domingo-Ferrer, J.: Coprivacy: towards a theory of sustainable privacy. In: Privacy in Statistical Databases-PSD 2010, LNCS, vol. 6344, pp. 258–268. Springer, Berlin (2010)
14.
Zurück zum Zitat Domingo-Ferrer, J.: Coprivacy: an introduction to the theory and applications of co-operative privacy. SORT-Statistics and Operations Research Transactions, 35(special issue: Privacy in statistical databases):25–40 (2011) Domingo-Ferrer, J.: Coprivacy: an introduction to the theory and applications of co-operative privacy. SORT-Statistics and Operations Research Transactions, 35(special issue: Privacy in statistical databases):25–40 (2011)
15.
Zurück zum Zitat Domingo-Ferrer, J., Herrera-Joancomartí, J.: Short collusion-secure fingerprints based on dual binary Hamming codes. Electron. Lett. 36(20), 1697–1699 (2000)CrossRef Domingo-Ferrer, J., Herrera-Joancomartí, J.: Short collusion-secure fingerprints based on dual binary Hamming codes. Electron. Lett. 36(20), 1697–1699 (2000)CrossRef
17.
Zurück zum Zitat Fallahpour, M., Megías, D.: High capacity audio watermarking using the high frequency band of the wavelet domain. Multimedia Tools Appl. 52(2), 485–498 (2011)CrossRef Fallahpour, M., Megías, D.: High capacity audio watermarking using the high frequency band of the wavelet domain. Multimedia Tools Appl. 52(2), 485–498 (2011)CrossRef
18.
Zurück zum Zitat Goldberg, D.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley, Boston (1989)MATH Goldberg, D.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley, Boston (1989)MATH
19.
Zurück zum Zitat Maymounkov, P., Mazières. D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: PTPS 2002-First International Workshop on Peer-to-Peer Systems, LNCS, vol. 2429, pp. 43–65. Springer, Berlin (2002) Maymounkov, P., Mazières. D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: PTPS 2002-First International Workshop on Peer-to-Peer Systems, LNCS, vol. 2429, pp. 43–65. Springer, Berlin (2002)
20.
Zurück zum Zitat Katzenbeisser, S., Lemma, A., Celik, M., van der Veen, M., Maas, M.: A buyer-seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forens. Secur. 3(4), 783–786 (2008)CrossRef Katzenbeisser, S., Lemma, A., Celik, M., van der Veen, M., Maas, M.: A buyer-seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forens. Secur. 3(4), 783–786 (2008)CrossRef
21.
Zurück zum Zitat Kuribayashi, M.: On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J. Inf. Secur. 2010, 1:1–1:11 (2010) Kuribayashi, M.: On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J. Inf. Secur. 2010, 1:1–1:11 (2010)
22.
Zurück zum Zitat Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)CrossRef Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)CrossRef
23.
Zurück zum Zitat Megías, D., Serra-Ruiz, J., Fallahpour, M.: Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification. Signal Process. 90(12), 3078–3092 (2010)CrossRefMATH Megías, D., Serra-Ruiz, J., Fallahpour, M.: Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification. Signal Process. 90(12), 3078–3092 (2010)CrossRefMATH
24.
Zurück zum Zitat Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process 10(4), 643–649 (2001)CrossRefMATH Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process 10(4), 643–649 (2001)CrossRefMATH
25.
Zurück zum Zitat Nuida, K., Fujitsu, S., Hagiwara, M., Kitagawa, T., Watanabe, H., Ogawa, K., Imai, H.: An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths. In: Proceedings of the 17th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC’07), pp. 80–89. Springer, Berlin (2007) Nuida, K., Fujitsu, S., Hagiwara, M., Kitagawa, T., Watanabe, H., Ogawa, K., Imai, H.: An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths. In: Proceedings of the 17th International Conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC’07), pp. 80–89. Springer, Berlin (2007)
27.
Zurück zum Zitat Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’96, LNCS, vol. 1233, pp. 88–102. Springer, Berlin (1997) Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’96, LNCS, vol. 1233, pp. 88–102. Springer, Berlin (1997)
28.
Zurück zum Zitat Pfitzmann, B., Sadeghi, A.-R.: Coin-based anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’99, LNCS, vol. 1592, pp. 150–164. Springer, Berlin (1999) Pfitzmann, B., Sadeghi, A.-R.: Coin-based anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’99, LNCS, vol. 1592, pp. 150–164. Springer, Berlin (1999)
29.
Zurück zum Zitat Prins, J.P., Erkin, Z., Lagendijk, R.L.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J. Inf. Secur., 2007, 20:1–20:7 (2007) Prins, J.P., Erkin, Z., Lagendijk, R.L.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J. Inf. Secur., 2007, 20:1–20:7 (2007)
30.
Zurück zum Zitat Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the thirty-fifth annual ACM symposium on Theory of computing (STOC ’03), pp. 116–125. ACM, New York (2003) Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the thirty-fifth annual ACM symposium on Theory of computing (STOC ’03), pp. 116–125. ACM, New York (2003)
Metadaten
Titel
Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints
verfasst von
David Megías
Josep Domingo-Ferrer
Publikationsdatum
01.03.2014
Verlag
Springer Berlin Heidelberg
Erschienen in
Multimedia Systems / Ausgabe 2/2014
Print ISSN: 0942-4962
Elektronische ISSN: 1432-1882
DOI
https://doi.org/10.1007/s00530-013-0307-3

Weitere Artikel der Ausgabe 2/2014

Multimedia Systems 2/2014 Zur Ausgabe

Neuer Inhalt