Miguel Razo, Shreejith Billenahalli, Wanjun Huang, Arularasi Sivasankaran, Limin Tang, Hars Vardhan, Marco Tacca, Andrea Fumagalli, Paolo Monti, Young Lee, Xinchao Liu, Zhicheng Sui
Hierarchical (multi-core) Wavelength Division Multiplexing (WDM) networks present
a challenging design problem to the network designer who wishes to establish all-optical circuits
end-to-end and across multiple network cores. Due to the nature of the hierarchical structure and its
traffic distribution, it is likely that the inner core requires more capacity when compared to the capacity
required by the metro cores, which are individually connected to the inner core. This capacity
mismatch cannot be addressed by assigning distinct transmission rates to each core, as this solution
would result in using electronic time division add-drop multiplexer to interconnect the traffic across
cores with distinct rates.
An alternative solution to addressing the capacity mismatch betweenWDM metro and inner core
is explored in this paper, which is based on a limited number of wavelengths (a subset of the full set)
being used in the metro core, when compared to the full set of wavelengths being used in the inner
core. Two available architectures are presented in the paper, discussing their respective advantages
and disadvantages.
Digital fingerprinting is an available method that can identify the customer or owner of the digital media (image, video,
etc) and protect the copyright of the content providers. Fingerprinting system embeds a unique fingerprint, which is the
identity of the owner, into each individual copy of the original content. The monitor can detect the original user of the
legal copies and track the usage of the copyrighted media content. The most serious problem to fingerprinting is how to
resist the effective attack--collusion. Collusion is to use some different marked copies of the same original content and
generate a new version from which the detector can't regain the correct fingerprint. In this paper we use combinatorial
theory and construct nonlinear DBBD (Differential Balanced Block Design) code as fingerprint for digital media. The
code is collusion-secure and has the capability of error correction which is beneficial to the robustness of the fingerprint.
We also present a scheme for combining this collusion-secure fingerprinting code with a multi-resolution wavelet based
watermarking mechanism. We use wavelet-watermarking techniques to embed and extract the fingerprints, and then use
our detection scheme and the error correction ability of the DBBD code to find the pirates.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.