Leaker identification in multicast communication
dc.contributor.author | Mohamed, Emad Eldin | |
dc.contributor.author | Guerchi, Driss | |
dc.date.accessioned | 2020-10-01T10:16:22Z | |
dc.date.available | 2020-10-01T10:16:22Z | |
dc.date.copyright | 2012 | |
dc.date.issued | 2012 | |
dc.description | This conference paper is not available at CUD collection. The version of scholarly record of this conference paper is published in Communications in Computer and Information Science (2012), available online at: https://doi.org/10.1007/978-3-642-30507-8_27 | en_US |
dc.description.abstract | Multicast is a communication mode in which data is exchanged among multiple end systems. An important concern in multicast communications is the protection of copyrights. While preventing copyright violations seems very difficult, tracing copyright violators (leaker identification) is more feasible and can be used as a deterrence alternative. In order to identify leakers in a multicast environment, every receiver should obtain a uniquely marked copy of the data. However, delivering unique copies from the sender to the receivers is inefficient. This paper investigates multicast leaker identification and introduces an efficient solution that is based on binary search tree. We introduce the notion of suspicious set that includes suspected end systems. When a leak is detected, all receivers are inserted in the suspicious set. Using a binary search, the suspicious set is refined successively until it includes only the leakers. An analytical study is conducted to evaluate the proposed solution. © Springer-Verlag Berlin Heidelberg 2012. | en_US |
dc.description.sponsorship | BCS The Chartered Institute for IT,Springer,IEEE - UAE Computer Section | en_US |
dc.identifier.citation | Mohamed, E.E., Guerchi, D. (2012). Leaker Identification in Multicast Communication. In: R. Benlamri (Eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_27 | en_US |
dc.identifier.isbn | 978-364230506-1 | |
dc.identifier.issn | 18650929 | |
dc.identifier.uri | http://dx.doi.org/10.1007/978-3-642-30507-8_27 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12519/243 | |
dc.language.iso | en | en_US |
dc.publisher | Springer Nature Switzerland AG | en_US |
dc.relation | Authors Affiliations : Mohamed, E.E., School of Engineering, Applied Science and Technology, Canadian University of Dubai, Dubai, United Arab Emirates; Guerchi, D., School of Engineering, Applied Science and Technology, Canadian University of Dubai, Dubai, United Arab Emirates | |
dc.relation.ispartofseries | Communications in Computer and Information Science;293 PART 1 | |
dc.rights | License to reuse the abstract has been secured from Springer Nature and Copyright Clearance Center. | |
dc.rights.holder | Copyright : © Springer-Verlag Berlin Heidelberg 2012 | |
dc.rights.license | License Number 5486900761566 License date Feb 13, 2023 | |
dc.rights.uri | https://s100.copyright.com/CustomerAdmin/PLF.jsp?ref=c34f27d4-0dc0-4f9c-89be-ca4e162a3bee | |
dc.subject | Analytical studies | en_US |
dc.subject | Binary search | en_US |
dc.subject | Binary search trees | en_US |
dc.subject | Communication mode | en_US |
dc.subject | Copyright protections | en_US |
dc.subject | End systems | en_US |
dc.subject | Multicast communication | en_US |
dc.subject | Tracing traitors | en_US |
dc.subject | Binary trees | en_US |
dc.subject | Communication | en_US |
dc.subject | Copyrights | en_US |
dc.subject | Multicasting | en_US |
dc.title | Leaker identification in multicast communication | en_US |
dc.type | Conference Paper | en_US |