SWARM INTELLIGENCE APPROACH OF LEAKER IDENTIFICATION IN SECURE MULTICAST

被引:0
|
作者
Sreelaja, N. K. [1 ]
Pai, G. A. Vijayalakshmi [1 ]
机构
[1] PSG Coll Technol, Coimbatore, Tamil Nadu, India
来源
2009 WORLD CONGRESS ON NATURE & BIOLOGICALLY INSPIRED COMPUTING (NABIC 2009) | 2009年
关键词
Swarm Intelligence; Ant Colony Optimization; Leaker Identification; Watermarking; Multicast;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure multicasting is used in a wide range of multicast applications such as commercial pay-per-view video multicast and pay-per view digital library. The multicast protocol used must be secure with copyright protection to prevent the users from leaking the information. This paper focuses on the problem of leaker identification using a swarm intelligence (Ant Colony Optimization) based approach. Termed Ant Colony Optimized Leaker Identification algorithm (ACOLIA), the novel technique serves to efficiently identify the leaker while overcoming the drawbacks of the existing sequential search method, for leaker identification. Simulation results are shown to prove that the number of comparisons made by the ACOLIA is less when compared to the sequential search method for leaker identification.
引用
收藏
页码:659 / 664
页数:6
相关论文
共 50 条
  • [21] A Swarm Intelligence Approach to the Quadratic Multiple Knapsack Problem
    Sundar, Shyam
    Singh, Alok
    NEURAL INFORMATION PROCESSING: THEORY AND ALGORITHMS, PT I, 2010, 6443 : 626 - 633
  • [22] Finding a learning path:: Toward a swarm intelligence approach
    Gutiérrez, S
    Pardo, A
    Kloos, CD
    PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON WEB-BASED EDUCATION, 2006, : 94 - +
  • [23] A swarm intelligence approach to the early/tardy scheduling problem
    Sundar, Shyam
    Singh, Alok
    SWARM AND EVOLUTIONARY COMPUTATION, 2012, 4 : 25 - 32
  • [24] A swarm intelligence approach to counting stacked symmetric objects
    George, C
    Wolfer, J
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS, 2006, : 125 - +
  • [25] Segmentation of dental radiographs using a swarm intelligence approach
    Keshtkar, Fazel
    Gueaieb, Wail
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 611 - +
  • [26] Secure Communication in Multicast Graphs
    Yang, Qiushi
    Desmedt, Yvo
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2011, 2011, 7073 : 538 - 555
  • [27] Secure IP multicast for DMS
    Wu, J
    Seberry, J
    Xia, TB
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 163 - 167
  • [28] A Swarm Intelligence Based Approach for Image Feature Extraction
    Lakehal, E.
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 31 - 35
  • [29] Swarm intelligence applied to identification of nonlinear ship steering model
    Tomera, Miroslaw
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2015, : 133 - 139
  • [30] Swarm Intelligence Based Author Identification for Digital Typewritten Text
    Baig, Abdul Rauf
    Kayani, Hassan Mujtaba
    2015 FIRST INTERNATIONAL CONFERENCE ON ANTI-CYBERCRIME (ICACC), 2015, : 32 - 37