نتایج جستجو برای: e colin ericpcr fingerprinting

تعداد نتایج: 1028120  

1997
Tina Lindkvist Jacob Löfvenberg

Coding methods for fingerprinting digital information are considered, with the aim of deterring users from copyright violation. A general model for discrete fingerprinting is presented, along with a simple embedding method for text documents. Different types of attacks are discussed, including attacks from colluding pirates. Some preliminary results are derived for random fingerprinting codes. ...

2003
Minoru Kuribayashi Hatsukazu Tanaka

Fingerprinting protocol applies a watermarking technique to embed a fingerprinting information in a digital content such as music, image, movie, etc.. The cryptographic protocol is studied by many researchers, but how to apply watermarking techniques is not remarked. In this paper, we study the problem to implement the watermarking techniques in the fingerprinting protocol, and then propose an ...

2009
Ehsan Amiri Gábor Tardos

Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...

Journal: :J. Comb. Theory, Ser. B 2001
László Lovász

We show that the Steinitz representations of 3-connected planar graphs are correspond, in a well described way, to Colin de Verdière matrices of such graphs.

2003
Antoni Martínez-Ballesté Francesc Sebé Josep Domingo-Ferrer Miguel Soriano

Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that...

2014
Dominik Herrmann Karl-Peter Fuchs Hannes Federrath

Fingerprinting techniques are receiving widespread attention in the field of information security. In this paper we argue that they may be of specific interest for the field of network forensics. In three case studies, we explore the use of fingerprinting techniques to improve and extend current investigative methods and showcase why fingerprinting allows for more target-oriented investigations...

Journal: :Physica B: Condensed Matter 2004

Journal: :Nature Immunology 2013

2015
Colin Howson

In a recent survey of the literature on the relation between information and confirmation, Crupi and Tentori (2014) claim that the former is a fruitful source of insight into the latter, with two well-known measures of confirmation being definable purely information-theoretically. I argue that of the two explicata of semantic information (due originally to Bar Hillel and Carnap) which are consi...

2004
Z. Jane Wang Min Wu Wade Trappe Ray Liu

Digital fingerprinting of multimedia data involves embedding information in the content, and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprints is collusion, whereby a group of adversaries combine their in&vidual copies in an attempt to remove the underlying fingerprint...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید