Watercasting: Distributed Watermarking of Multicast Media

  • Ian Brown
  • Colin Perkins
  • Jon Crowcroft
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1736)


We outline a scheme by which encrypted multicast audiovisual data may be watermarked by lightweight active network components in the multicast tree. Every recipient receives a slightly different version of the marked data, allowing those who illegally re-sell that data to be traced. Groups of cheating users or multicast routers can also be traced. There is a relationship between the requirements for the scheme proposed here, the requirements for reliable multicast protocols, and proposed mechanisms to support layered delivery of streamed media in the Internet.


Packet Loss Watermark Scheme Multicast Tree Content Provider Transmission Group 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, R.J., Manifavas, C.: Chameleon – A New Kind of Stream Cipher. In: Fourth Workshop on Fast Software Encryption, January 1997, pp. 107–113 (1997)Google Scholar
  2. 2.
    Ballardie, A.: Scalable Multicast Key Distribution. RFC 1949 (May 1996)Google Scholar
  3. 3.
    Ballardie, A., Crowcroft, J.: Multicast-Specific Security Threats and Counter-Measures. In: The Internet Society Symposium on Network and Distributed System Security, San Diego, California (February 1995)Google Scholar
  4. 4.
    Barlow, J.P.: The economy of ideas. Wired 2(3), 85 (1994)MathSciNetGoogle Scholar
  5. 5.
    Bolot, J.-C., Vega-García, A.: The Case for FEC-Based Error Control for Packet Audio in the Internet. ACM Multimedia Systems (1997)Google Scholar
  6. 6.
    Briscoe, B., Fairman, I.: Nark: Receiver-based Multicast Non-repudiation and Key Management. In: ACM Conference on Electronic Commerce (EC 1999), Denver, Colorado (November 1999)Google Scholar
  7. 7.
    Cáceres, R., Duffield, N.G., Horowitz, J., Towsley, D., Bu, T.: Multicast-Based Inference of Network-Internal Characteristics: Accuracy of Packet Loss Estimation. In: IEEE Infocom, New York (March 1999)Google Scholar
  8. 8.
    Carle, G., Biersack, E.: A Survey of Error Recovery Techniques for IP-Based Audio-Visual Multicast Applications. IEEE Network (November/December 1997)Google Scholar
  9. 9.
    Dwork, C., Lotspiech, J., Naor, M.: Digital Signets: Self Enforcing Protection of Digital Information. In: 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, May 1996, p. 489 (1996)Google Scholar
  10. 10.
    Handley, M.: An Examination of Mbone Performance. USC/ISI Research Report ISI/RR-97-450 (April 1997)Google Scholar
  11. 11.
    Handley, M., Thaler, D.: Multicast-Scope Zone Announcement Protocol. IETF (October 1998) (work in progress)Google Scholar
  12. 12.
    Hardjono, T., Cain, B., Doraswamy, N.: A Framework for Group Key Management for Multicast Security. IETF (July 1998) (work in progress)Google Scholar
  13. 13.
    International Federation of the Phonographic Industry. Request for proposals Embedded signalling systems issue 1.0 (June 1997)Google Scholar
  14. 14.
    Kent, S., Atkinson, R.: IP Authentication Header. RFC 2402 (November 1998)Google Scholar
  15. 15.
    Kent, S., Atkinson, R.: IP Encapsulating Security Payload. RFC 2406 (November 1998)Google Scholar
  16. 16.
    Levine, B., Garcia-Luna-Aceves, J.J.: A Comparison of Reliable Multicast Protocols. ACM Multimedia Systems Journal (August 1998)Google Scholar
  17. 17.
    Levine, B., Paul, S., Garcia-Luna-Aceves, J.J.: Organizing Multicast Receivers Deterministically by Packet-Loss Correlation. Preprint, University of California, Santa CruzGoogle Scholar
  18. 18.
    McCanne, S., Jacobson, V., Vetterli, M.: Receiver-driven Layered Multicast. In: ACM SIGCOMM 1996, Stanford, CA (August 1996)Google Scholar
  19. 19.
    Meyer, D.: Administratively Scoped IP Multicast. RFC 2365 (July 1998)Google Scholar
  20. 20.
    Moon, S., Kurose, J., Skelly, P., Towsley, D.: Correlation of Packet Delay and Loss in the Internet. Technical Report 98-11, Department of Computer Science, University of Massachusetts, Amherst, MA 01003, USAGoogle Scholar
  21. 21.
    Naor, M., Pinkas, B.: Threshold Traitor Tracing. In: CRYPTO 1988. LNCS, vol. 403 (1988)Google Scholar
  22. 22.
    Perkins, C., Hodson, O., Hardman, V.: A Survey of Packet Loss Recovery Techniques for Streaming Audio. IEEE Network, pp. 40–49 (September/October 1998)Google Scholar
  23. 23.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: Second Workshop on Information Hiding, Portland, Oregon (April 1998)Google Scholar
  24. 24.
    Ratnasamy, S., McCanne, S.: Inference of Multicast Routing Trees and Bottleneck Bandwidths using End-to-end Measurements. In: IEEE Infocom, New York (March 1999)Google Scholar
  25. 25.
    Rohatgi, P.: A Hybrid Signature Scheme for Multicast Source Authentication. IRTF (June 1999) (work in progress)Google Scholar
  26. 26.
    Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-time Applications. RFC 1889 (January 1996)Google Scholar
  27. 27.
    Speakman, T., Farinacci, D., Lin, S., Tweedly, A.: PGM Reliable Transport Protocol Specification. IETF (February 1999) (work in Progress)Google Scholar
  28. 28.
    Vicisano, L., Rizzo, L., Crowcroft, J.: TCP-like congestion control for layered multicast data transfer. In: IEEE Infocom, San Francisco (March 1998)Google Scholar
  29. 29.
    Watson, A., Sasse, M.A.: Measuring Perceived Quality of Speech and Video in Multimedia Conferencing Applications. In: ACM Multimedia 1998, Bristol, England, September 1998, pp. 55–60 (1998)Google Scholar
  30. 30.
    Yajnik, M., Kurose, J., Towsley, D.: Packet Loss Correlation in the Mbone Multicast Network. In: IEEE Global Internet Conference (November 1996)Google Scholar
  31. 31.
    Yajnik, M., Moon, S., Kurose, J., Towsley, D.: Measurement and Modelling of the Temportal Dependence in Packet Loss. In: IEEE Infocom, New York (March 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Ian Brown
    • 1
  • Colin Perkins
    • 1
  • Jon Crowcroft
    • 1
  1. 1.Department of Computer ScienceUniversity College LondonLondonUK

Personalised recommendations