Improved Hybrid Fingerprint-Based P2P Media Distribution For Privacy Protection



It has been suggested that anonymous fingerprinting could be an easy way to ensure the lawful dissemination of copyright-protected multimedia content without compromising the privacy of customers, whose names would only be revealed in the event of illegal re-distribution of the content. This idea has been put forward as a potential solution to the problem. However, the majority of the currently available anonymous fingerprinting systems are not practical. This is due to the fact that they make use of complicated protocols that take up a lot of time, as well as homomorphic encryption of the data. Furthermore, they distribute the data using a unicast approach, which does not scale well for a large number of clients. The concept of recombined fingerprints serves as the foundation for this body of work, which also makes an effort to overcome some of these restrictions. On the other hand, recommended fingerprint approaches need a complex graph search for traitor monitoring, which in turn demands the participation of additional buyers and honest proxies in their P2P distribution scenario. Getting rid of these issues and developing a fingerprinting system that is not only efficient but also scalable, private, and makes use of P2P technology is the purpose of this research.


J. Camenisch, “Efficient anonymous fingerprinting with group signatures,” in Proc. 6th Int. Conf. Theory Appl. Cryptology Inf. Security: Adv. Cryptology, 2000, pp. 415–428.

C.-C. Chang, H.-C. Tsai, and Y.-P. Hsieh, “An efficient and fair buyer-seller fingerprinting scheme for large scale networks,” Comput. Security, vol. 29, pp. 269–277, Mar. 2010.

D. L. Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms,” Commun. ACM, vol. 24, pp. 84–90, Feb. 1981.

I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography. Burlington, MA, USA: Morgan Kaufmann, 2008.

J. Domingo-Ferrer and D. Megıas, “Distributed multicast of fingerprinted content based on a rational peer-to-peer community,” Comput. Commun., vol. 36, pp. 542–550, Mar. 2013.

M. Fallahpour and D. Megıas, “Secure logarithmic audio watermarking scheme based on the human auditory system,” Multimedia Syst., vol. 20, pp. 155–164, 2014.

S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, and M. Maas, “A buyer-seller watermarking protocol based on secure embedding,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 783–786, Dec. 2008.

M. Kuribayashi, “On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol,” EURASIP J. Inf. Security, vol. 2010, pp. 1:1–1:11, Jan. 2010.

C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan, “An efficient and anonymous buyer-seller watermarking protocol,” IEEE Trans. Image Process., vol. 13, no. 12, pp. 1618–1626, Dec. 2004.

D. Megıas and J. Domingo-Ferrer, “DNA-inspired anonymous fingerprinting for efficient peer-to-peer content distribution,” in Proc. IEEE Congress Evol. Comput., Jun. 2013, pp. 2376–2383

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at