نتایج جستجو برای: fingerprinting techniques

تعداد نتایج: 636550  

2003
Minoru Kuribayashi Hatsukazu Tanaka

Fingerprinting protocol applies a watermarking technique to embed a fingerprinting information in a digital content such as music, image, movie, etc.. The cryptographic protocol is studied by many researchers, but how to apply watermarking techniques is not remarked. In this paper, we study the problem to implement the watermarking techniques in the fingerprinting protocol, and then propose an ...

2014
Amin Faiz Khademi

Most Web users are unaware of being identified or followed by web agents which leverage techniques such as browser fingerprinting (or fingerprinting). Data obtained through such fingerprinting techniques can be utilized for various purposes ranging from understanding the types and properties of the user’s browser to learning the user Web experience (e.g., through the browsing history). For ente...

Journal: :CoRR 2010
Mikkel Baun Kjærgaard

An increasingly important requirement for many novel applications is sensing the positions of people, equipment, animals, etc. GPS technology has proven itself as a successfull technology for positioning in outdoor environments but indoor no technology has yet gained a similar wide-scale adoption. A promising indoor positioning technique is radio-based location fingerprinting, having the major ...

Journal: :International Journal of Computer Theory and Engineering 2014

Journal: :Proceedings of the National Academy of Sciences 1973

Journal: :IEEE Transactions on Information Forensics and Security 2006

2007
Min Wu Shan He

Title of Dissertation: A JOINT CODING AND EMBEDDING FRAMEWORK FOR MULTIMEDIA FINGERPRINTING Shan He, Doctor of Philosophy, 2007 Dissertation directed by: Professor Min Wu Department of Electrical and Computer Engineering Technology advancement has made multimedia content widely available and easy to process. These benefits also bring ease to unauthorized users who can duplicate and manipulate m...

2014
Syed Abdul Sattar

Digital watermarking is not a new name in the tech neology world but there are different techniques in data hiding which are similar to watermarking. In this paper we compare digital watermarking with other techniques of data hiding. Stenography, Fingerprinting, cryptography and Digital signature techniques are compared with watermarking. We need water marking for digital data security .It prov...

Journal: :Journal of clinical microbiology 1995
P W Hermans M Sluijter T Hoogenboezem H Heersma A van Belkum R de Groot

The aim of this study was to identify the strengths and weaknesses of five DNA fingerprint methods for epidemiological typing of Streptococcus pneumoniae. We investigated the usefulness of (i) ribotyping, (ii) BOX fingerprinting with the BOX repetitive sequence of S. pneumoniae as a DNA probe, (iii) PCR fingerprinting with a primer homologous to the enterobacterial repetitive intergenic consens...

1999
Birgit Pfitzmann Ahmad-Reza Sadeghi

Fingerprinting schemes are technical means to discourage people from illegally redistributing the digital data they have legally purchased. These schemes enable the original merchant to identify the original buyer of the digital data. In so-called asymmetric fingerprinting schemes the fingerprinted data item is only known to the buyer after a sale and if the merchant finds an illegally redistri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید