Mohamed, Emad EldinGuerchi, Driss2020-10-012020-10-0120122012Mohamed, E.E., Guerchi, D. (2012). Leaker Identification in Multicast Communication. In: R. Benlamri (Eds) Networked Digital Technologies. NDT 2012. Communications in Computer and Information Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30507-8_27978-364230506-118650929http://dx.doi.org/10.1007/978-3-642-30507-8_27http://hdl.handle.net/20.500.12519/243Multicast is a communication mode in which data is exchanged among multiple end systems. An important concern in multicast communications is the protection of copyrights. While preventing copyright violations seems very difficult, tracing copyright violators (leaker identification) is more feasible and can be used as a deterrence alternative. In order to identify leakers in a multicast environment, every receiver should obtain a uniquely marked copy of the data. However, delivering unique copies from the sender to the receivers is inefficient. This paper investigates multicast leaker identification and introduces an efficient solution that is based on binary search tree. We introduce the notion of suspicious set that includes suspected end systems. When a leak is detected, all receivers are inserted in the suspicious set. Using a binary search, the suspicious set is refined successively until it includes only the leakers. An analytical study is conducted to evaluate the proposed solution. © Springer-Verlag Berlin Heidelberg 2012.enLicense to reuse abstract has been provided by Springer Nature and Copyright Clearance Center.Analytical studiesBinary searchBinary search treesCommunication modeCopyright protectionsEnd systemsMulticast communicationTracing traitorsBinary treesCommunicationCopyrightsMulticastingLeaker identification in multicast communicationConference PaperCopyright : © Springer-Verlag Berlin Heidelberg 2012