Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Network-Based Traitor-Tracing Technique Using Traffic Pattern
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Network-Based Traitor-Tracing Technique Using Traffic Pattern


[attachment=27687]

INTRODUCTION

IN recent years, with the rapid advance in broadband technology,
streaming technology has been applied for many
applications, such as content delivery systems, video conference
systems, e-learning systems, remote diagnosis systems,
and so on [1], [2]. Video conference systems, which use local
area networks (LANs) and the Internet, are a new technology
and replace previous systems which use leased lines. For example,
e-learning is already used for educational purposes in
companies. The most important feature of this kind of system
is that a person can obtain many kinds of lectures at any time
without inviting instructors. This increases the efficiency of selflearning
and reduces the cost of the education.



RELATED WORKS

A brief yet comprehensive summary of DRM technology is
provided by Eskicloglu and Lin et al. [5], [6]. DRM technology
consists of several technologies, such as encryption [23]–[26]
. Technique to verify the existence of secondary content distributions and
to find the runoff source of it.
and access conditioning[27]. The traitor-tracing technology is
also one of the key technologies that constructs DRM systems,
and is used to monitor the content usage and to confirm that a
user appropriately uses contents.
The simplest traitor-tracing system is considered as shown in
The following is the procedure adopted by this system
1) The content provider embeds unique information1 into the
content using digital watermarking, and produces copies of
the content.


Experimental Result With Burst Errors

Next, we present experimental results in the environment
where the burst errors occur. The burst errors keep dropping
packets for a few seconds, so that the traffic pattern is distorted
partially. This causes an adverse affect on generating the similarity
of traffic patterns accurately.
Fig. 11(a) shows the result of the comparison between the
server ’s and the user ’s traffic patterns. Fig. 11(b) shows
the result of the comparison between the server ’s and the
user ’s traffic patterns. As the case of the random error, the
peak of the similarity graph is significantly lower than that presented
in Fig. 9(a). However, thanks to the dynamic determination
threshold and the burst error avoidance in Section III-B1,
the proposed method accurately detects the peak of similarity.


CONCLUSION

Thanks to broadband technology, streaming technology is
used in many kinds of applications. However, a control method
for the steaming content delivery is required to prevent abuse of
the content. Traitor-tracing technology is one of these technologies
and is used to observe the usage of content. General tracing
methods have limitations, because of a high load to produce
many contents and the watermark’s limitation. To advance the
security of content delivery, we proposed a method, which takes
advantage of the traffic pattern. To evaluate the performance of
the proposed method, simulations and actual experiments were
conducted. Finally, we obtained satisfactory results, verifying
the effectiveness of our approach.