The Road to Watercasting
|
|
|
Jon Crowcroft,UCL & |
|
Ian Brown, Hidden Footprints |
|
http://www.hiddenfootprints.com |
Hidden Footprints
Corporation
Project Goals
|
|
|
Provide Digital Wrongs Management |
|
Relates to Content Distribution and
online rights management/licensing/copyright protection |
|
Looking at Broadband Internet of Future
with film and game content as well as mp3/napster… |
Slide 4
Slide 5
Description
|
|
|
Tracking the trail of the wiley
copy-wrongdoer – requires thinking about evidence |
|
Critical problem is not to prevent disclosure,
since this is impossible |
|
Rights management is a red-herring and
is more about fee collection. |
Watermarking
|
|
|
LSBs, compression parameters etc.
changed to imperceptibly mark image |
Competitive Analysis
|
|
|
Pure watermarking is now fairly common
– problems abound |
|
Scaling |
|
Scrubbing |
|
Collusion |
|
Upgrade… |
|
SDMI…..not too clueful J |
SDMI
|
|
|
NOT trying to do the impossible ie
replace all current audio players with SDMI-compliant "trusted"
clients. |
|
NOT trying to target the consumer: they are too many of them,
with too few resources, who would get too pissed off at the content providers
– bills are already being proposed in Congress that would help Napster and
MP3.com because the voters like them... |
|
* being realistic about where content
can be controlled -- yes with a small number of users for a limited period of
time who can be forced to accept high liability for pirated content (eg
cinemas), no with consumers. |
Streaming Servers abound,
but…
|
|
|
|
Real, etc have scaling problems |
|
Viz cnn.com |
|
Viz evolution of napster to gnutella |
|
New emergence of intermediaries: |
|
Akamai, Inktomi, and middleware
business for them – e.g. |
|
Ffnet, ensim, bandwiz, digital
fountain… |
|
Strengths – good at scale and
heterogeneity |
|
Weaknesses – still don’t track content |
Our Technology
|
|
|
Based on combination of distribution
network, and source marking |
|
Source adds more than enough watermarks
– similar technique to layered FEC multicast (rlc/digital fountain), with
meta data on packets |
|
Distribution network removes different
subset of marks for different receivers` |
WWW & CDNP
|
|
|
|
HTTP: |
|
access mechanism |
|
TCP |
|
Client-server: |
|
proxy arrangement possible |
|
Client-side cache: |
|
speeds up multiple access to same page |
|
Proxy cache: |
|
multiple hosts on same network |
Content Distribution Nets
|
|
|
Extension of HTTP |
|
To peer-to-peer |
|
Synchronise between proxies/replicas |
|
Load balance etc etc |
|
Can apply out tech., there too. |
Or Level 3 multicast
|
|
|
|
Many-to-many: |
|
many senders and receivers |
|
host group or multicast group |
|
One transmission, many receivers |
|
Optimise transmissions: |
|
e.g. reduce duplication |
|
Class D IP address: |
|
224.0.0.0 - 239.255.255.255 |
|
not a single host interface |
|
some addresses reserved |
|
Applications: |
|
conferencing |
|
software update/distribution |
|
news distribution |
|
mutli-player games |
|
distributed simulations |
|
Network support: |
|
LAN |
|
WAN (Internet routers) |
|
scoped transmission: IP TTL header
field |
IP multicast and IGMP
|
|
|
|
Features of IP multicast: |
|
group of hosts |
|
Class D address |
|
leaf nodes (hosts) and intermediate
nodes (routers) |
|
dynamic membership, leaf-initiated join |
|
non-group member can send to group |
|
multicast capable routers |
|
local delivery mechanism |
|
IGMP: group membership control |
Multicast: LAN
|
|
|
|
Need to translate to MAC address |
|
Algorithmic resolution: |
|
quick, easy, distributed |
|
MAC address format: |
|
IANA MAC address allocation |
|
last 23-bits of Class D |
|
not 1-1 mapping |
|
Host filtering required at IP layer |
Multicast routing [1]
Multicast routing [2]
|
|
|
|
Distance vector: |
|
need next hop information |
|
(or use poisoned reverse) |
|
Link state: |
|
construction of all SP trees for all
nodes possible |
|
“tie-break” rules required |
Multicast routing [3]
|
|
|
|
Networks with no group members pruned
from tree |
|
Must somehow allow tree to re-grow |
|
Soft-state: |
|
timeout – re-flood |
|
downstream nodes prune again |
|
Explicit graft: |
|
downstream nodes join tree |
Pragmatic General
Multicast
|
|
|
|
State assumptions about resources
allocated to this project |
|
People |
|
Equipment |
|
Locations |
|
Support & outside services |
|
Manufacturing |
|
Sales |
Product Breakdown
Structure (PBS)
Work Breakdown Structure
(WBS)
Slide 23
Generic Router Assist
|
|
|
Highlight any procedural differences
from regular projects of this type |
|
Discuss requirements, benefits, and
issues of using new procedures |
Watermarking and
multicast
|
|
|
Sending differently marked data streams
to each client rules out multicast. |
|
Even if bandwidth was available,
marking algorithms don’t scale. |
Watercasting: marking
data
|
|
|
Server watermarks and multicasts n
versions of each packet, where n ³ tree depth |
|
Routers drop one packet version based
on next hop’s IP address |
|
Last-hop router passes on only one
packet version based on receiver and router identification key |
Example
|
|
|
Source creates 5 versions of each
packet |
|
Each router drops one version |
|
Last-hop router passes on one version
to client |
Implementation
|
|
|
PGM application-layer filters could be
used at routers, but have extra security requirements |
|
Reverse SPMs require special support |
|
Client only needs way to obtain
security parameters from server - no media tool alteration is necessary |
Source requirements
|
|
|
Provide each client with media
decryption keys after receiving valid reverse SPM |
|
Store original media, client details
and tree topology for as long as content needs to be traced |
|
|
Tracing traitors
|
|
|
Classify recovered clip’s packets -
ACCEDBADABCD |
|
Simulate network behaviour during that
period |
|
Calculate users and routers who
individually or in collusion are most likely to have produced clip |
Watercast Trial
|
|
|
Review high-level schedule milestones
here |
Current Status
|
|
|
|
High-level overview of progress against
schedule |
|
On-track in what areas |
|
Behind in what areas |
|
Ahead in what areas |
|
Unexpected delays or issues |
Related Documents
|
|
|
|
Marketing plan |
|
Location or contact name/phone |
|
Budget |
|
Location or contact name/phone |
|
Post mortem |
|
Location or contact name/phone |
|
Submit questions |
|
Location or contact name/phone |