Abstract
Multicast distribution of content is not suited to content-based electronic commerce because all buyers obtain exactly the same copy of the content, in such a way that unlawful redistributors cannot be traced. Unicast distribution has the shortcoming of requiring one connection with each buyer, but it allows the merchant to embed a different serial number in the copy obtained by each buyer, which enables redistributor tracing. Peer-to-peer (P2P) distribution is a third option which may combine some of the advantages of multicast and unicast: on the one hand, the merchant only needs unicast connections with a few seed buyers, who take over the task of further spreading the content; on the other hand, if a proper fingerprinting mechanism is used, unlawful redistributors of the P2P distributed content can still be traced. In this chapter, we describe a co-utile fingerprinting mechanism for P2P content distribution which allows redistributor tracing, while preserving the privacy of most honest buyers and offering collusion resistance and buyer frameproofness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bo, Y., Piyuan, L., Wenzheng, Z.: An efficient anonymous fingerprinting protocol. In: Computational Intelligence and Security, LNCS, vol. 4456, pp. 824–832. Springer, Berlin (2007)
Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Advances in Cryptology, LNCS, vol. 963, pp. 452–465. Springer, Berlin (1995)
Camenisch, J.: Efficient anonymous fingerprinting with group signatures. In: Asiacrypt, LNCS, vol. 1976, pp. 415–428. Springer, Berlin (2000)
Chang, C.-C., Tsai, H.-C., Hsieh, Y.-P.: An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput. Secur. 29(2), 269–277 (2010)
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, Burlington (2008)
Domingo-Ferrer, J.: Anonymous fingerprinting of electronic information with automatic identification of redistributors. Electron. Lett. 34(13), 1303–1304 (1998)
Domingo-Ferrer, J.: Anonymous fingerprinting based on committed oblivious transfer. In: Public Key Cryptography-PKC 1999, LNCS, vol. 1560, pp. 43–52. Springer, Berlin (1999)
Domingo-Ferrer, J., Herrera-JoancomartĂ, J.: Short collusion-secure fingerprints based on dual binary Hamming codes. Electron. Lett. 36(20), 1697–1699 (2000)
Domingo-Ferrer, J., MartĂnez, S., Sánchez, D., Soria-Comas, J.: Co-utility: self-enforcing protocols for the mutual benefit of participants. Eng. Appl. Artif. Intell. 59, 148–158 (2017)
Domingo-Ferrer, J., MegĂas, D.: Distributed multicast of fingerprinted content based on a rational peer-to-peer community. Comput. Commun. 36, 542–550 (2013)
Domingo-Ferrer, J., Sánchez, D., Soria-Comas, J.: Co-utility: self-enforcing collaborative protocols with mutual help. Prog. Artif. Intell. 5(2), 105–110 (2016)
Fallahpour, M., MegĂas, D.: High capacity audio watermarking using the high frequency band of the wavelet domain. Multimed. Tools Appl. 52(2), 485–498 (2011)
Fallahpour, M., MegĂas, D.: Secure logarithmic audio watermarking scheme based on the human auditory system. Multimed. Syst. 20, 155–164 (2014)
Goldberg, D.: Genetic Algorithms in Search. Optimization and Machine Learning. Addison-Wesley, Boston (1989)
Katzenbeisser, S., Lemma, A., Celik, M., van der Veen, M., Maas, M.: A buyer-seller watermarking protocol based on secure embedding. IEEE Trans. Inf. Forensics Secur. 3(4), 783–786 (2008)
Kuribayashi, M.: On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol. EURASIP J. Inf. Secur. 2010, art 694797 (2010)
Lei, C.-L., Yu, P.-L., Tsai, P.-L., Chan, M.-H.: An efficient and anonymous buyer-seller watermarking protocol. IEEE Trans. Image Process. 13(12), 1618–1626 (2004)
MegĂas, D.: Improved privacy-preserving P2P multimedia distribution based on recombined fingerprints. IEEE Trans. Dependable Secur. Comput. 12(2), 179–189 (2015)
MegĂas, D., Serra-Ruiz, J., Fallahpour, M.: Efficient self-synchronised blind audio watermarking system based on time domain and FFT amplitude modification. Signal Process. 90(12), 3078–3092 (2010)
MegĂas, D., Domingo-Ferrer, J.: DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2013), pp. 2376–2383 (2013)
MegĂas, D., Domingo-Ferrer, J.: Privacy-aware peer-to-peer content distribution using automatically recombined fingerprints. Multimed. Syst. 20(2), 105–125 (2014)
Memon, N., Wong, P.-W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643–649 (2001)
Nuida, K., Fujitsu, S., Hagiwara, M., Kitagawa, T., Watanabe, H, Ogawa, K., Imai, H.: An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths. In: Proceedings of the 17th International Conference on Applied Algebra, Algebraic Algorithms and Error-correcting Codes (AAECC’07), pp. 80–89. Springer, Berlin (2007)
Pfitzmann, B., Waidner, M.: Anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’96, LNCS, vol. 1233, pp. 88–102. Springer, Berlin (1997)
Pfitzmann, B., Sadeghi, A.-R.: Coin-based anonymous fingerprinting. In: Advances in Cryptology-EUROCRYPT’99, LNCS, vol. 1592, pp. 150–164. Springer, Berlin (1999)
Preda, R.O., Vizireanu, D.N.: Robust wavelet-based video watermarking scheme for copyright protection using the human visual system. J. Electron. Imaging 20, 13022–130030 (2011)
Prins, J.P., Erkin, Z., Lagendijk, R.L.: Anonymous fingerprinting with robust QIM watermarking techniques. EURASIP J. Inf. Secur. 2007, art 20 (2007)
Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC ’03), pp. 116–125. ACM, New York (2003)
Acknowledgements
Funding by the Templeton World Charity Foundation (grant TWCF0095/AB60 “CO-UTILITY”) is gratefully acknowledged. Also, partial support to this work has been received from the Government of Catalonia (ICREA Acadèmia Prize to J. Domingo-Ferrer and grant 2014 SGR 537), the Spanish Government (projects TIN2014-57364-C2-1-R “SmartGlacis”, TIN2015-70054-REDC and TIN2016-80250-R “Sec-MCloud”) and the European Commission (projects H2020-644024 “CLARUS” and H2020-700540 “CANVAS”). The authors are with the UNESCO Chair in Data Privacy, but the views in this work are the authors’ own and are not necessarily shared by UNESCO or any of the funding bodies.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
MegĂas, D., Domingo-Ferrer, J. (2018). Co-utile Privacy-Aware P2P Content Distribution. In: Domingo-Ferrer, J., Sánchez, D. (eds) Co-utility. Studies in Systems, Decision and Control, vol 110. Springer, Cham. https://doi.org/10.1007/978-3-319-60234-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-60234-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60233-2
Online ISBN: 978-3-319-60234-9
eBook Packages: EngineeringEngineering (R0)