Secure Guaranteed Rate Scheduling Of Streams Using Traitor Tracing Technique
|R. Kalpana, K. Lalithambigai
Department of Computer Science & Engineering, Pondicherry Engineering College, Pondicherry, India
|Related article at Pubmed, Scholar Google|
Today, streaming technology is applied to many applications as it delivers audio and video without making the viewer wait tediously to download files. But a problem that exists in streaming technology is the use of content without knowledge of the content holders and content providers. The digital rights management system protects the rights associated with the use of digital content through various techniques and one among them is Traitor Tracing Systems. General traitor tracing systems uses digital watermarks and encryption keys to ensure content protection. But these techniques are not effective when illegal processes are carried out at the user-side. Another traitor tracing method provides content protection by monitoring traffic patterns constructed from routers. But a 2% delay jitter rate starts to render the video stream unusable and hence monitoring the content becomes a problem. In the proposed scheme a Guaranteed Rate scheduling algorithm is utilized to minimize the delay jitter and to ensure secure delivery of the streaming content. Finally, the results of simulation are provided to demonstrate the effectiveness of the proposed scheme.