نتایج جستجو برای: e colin ericpcr fingerprinting
تعداد نتایج: 1028120 فیلتر نتایج به سال:
Coding methods for fingerprinting digital information are considered, with the aim of deterring users from copyright violation. A general model for discrete fingerprinting is presented, along with a simple embedding method for text documents. Different types of attacks are discussed, including attacks from colluding pirates. Some preliminary results are derived for random fingerprinting codes. ...
Fingerprinting protocol applies a watermarking technique to embed a fingerprinting information in a digital content such as music, image, movie, etc.. The cryptographic protocol is studied by many researchers, but how to apply watermarking techniques is not remarked. In this paper, we study the problem to implement the watermarking techniques in the fingerprinting protocol, and then propose an ...
Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...
We show that the Steinitz representations of 3-connected planar graphs are correspond, in a well described way, to Colin de Verdière matrices of such graphs.
Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that...
Fingerprinting techniques are receiving widespread attention in the field of information security. In this paper we argue that they may be of specific interest for the field of network forensics. In three case studies, we explore the use of fingerprinting techniques to improve and extend current investigative methods and showcase why fingerprinting allows for more target-oriented investigations...
In a recent survey of the literature on the relation between information and confirmation, Crupi and Tentori (2014) claim that the former is a fruitful source of insight into the latter, with two well-known measures of confirmation being definable purely information-theoretically. I argue that of the two explicata of semantic information (due originally to Bar Hillel and Carnap) which are consi...
Digital fingerprinting of multimedia data involves embedding information in the content, and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprints is collusion, whereby a group of adversaries combine their in&vidual copies in an attempt to remove the underlying fingerprint...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید