نتایج جستجو برای: composite fingerprinting

تعداد نتایج: 130702  

Fingerprint method is one of the new methods to determine the contribution of suspended sediment in the land units. In this method, a suitable composite (set) of diagnostic properties and a multivariate mixing model are employed to estimate the relative contribution of sediment sources to sediments transported to watershed outlet. This research carried out in the Tull Bane watershed with 3278.9...

Journal: :Tropical medicine & international health : TM & IH 2007
Isdore Chola Shamputa Armand Van Deun Md Abdul Hamid Salim Md Anwar Hossain Krista Fissette Pim de Rijk Leen Rigouts Françoise Portaels

OBJECTIVE To determine the relative frequencies of reinfection vs. reactivation or treatment failure in patients from a high tuberculosis incidence setting with a low prevalence of HIV infection. METHOD We performed DNA fingerprinting on serial isolates from one and multiple TB episodes from 97 retreatment patients; 35 patients had been previously cured, whereas 62 had not. RESULTS DNA fing...

2005
In Koo Kang Hae-Yeoun Lee Won-Young Yoo Heung-Kyu Lee

Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but simple attack to diminish fingerprint signals is averaging. While several fingerprinting schemes against collusion attacks were proposed, they often do not fully account for multimedia data. In this paper, we propose a z...

2004
Shan He Min Wu

Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Fingerprinting based on error correction coding (ECC) handle the important issue of how to embed the fingerprint into host data in an abstract way known as the marking assumptions, which often do not fully account for multimedia specific ...

2005
Hyun-Ho Kang Brian M. Kurkoski Young-Ran Park Hyejoo Lee Sanguk Shin Kazuhiko Yamaguchi Kingo Kobayashi

In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the tree, the legitimate users as the leaves, and the internal nodes as content buyer or seller. Because there is a limited number of user areas available in each tree, we propose to build sub-trees, where each sub-tree h...

2014
Saeed ur Rehman Shafiq Alam Iman T. Ardekani

Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless devices. RF fingerprinting classification is performed by selecting an “unknown” signal from the pool, generating its RF fingerprint, and using a classifier to correlate the recei...

Journal: :Computers & Security 2022

Privacy protection and traitor tracing have always been two separate research subjects. Meanwhile, digital fingerprinting, which tracks illegally distributed media by creating a unique code for each user, has long regarded as one of the effective means tracking down illegal users. However, most existing fingerprinting schemes focus on how to design more robust or general fingerprint target user...

Journal: :Journal of Cloud Computing 2021

Abstract Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and delay, but it also brings challenges data security privacy. Website fingerprinting (WF) is a passive traffic analysis attack that threatens website privacy which poses great threat user’s web security. It collects network packets generated while user accesses website, then uses seri...

2005
Kozo Banno Shingo Orihara Takaaki Mizuki Takao Nishizeki

Digital watermarking used for fingerprinting may receive a collusion attack; two or more users collude, compare their data, find a part of embedded watermarks, and make an unauthorized copy by masking their identities. In this paper, assuming that at most c users collude, we give a characterization of the fingerprinting codes that have the best security index in a sense of “(c, p/q)-secureness”...

2004
Jonathan Irons Martin Schmucker

Publishers of sheet music are generally reluctant in distributing their content via the Internet. Although online sheet music distribution’s advantages are numerous the potential risk of Intellectual Property Rights (IPR) infringement, e.g. illegal online distributions, disables any innovation propensity. While active protection techniques only deter external risk factors, additional technology...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید