نتایج جستجو برای: e colin ericpcr fingerprinting

تعداد نتایج: 1028120  

2017
Min-Seok Choi Beakcheol Jang

Recently, many studies of indoor positioning system using wireless signals such as WiFi, Bluetooth, have been researched actively. There are three types of indoor positioning system, triangulation method, fingerprinting technique and Cell-ID technique. Triangulation method has advantages in searching locations in wide environment, but its accuracy deteriorates in narrow indoor environment due t...

Journal: :IEICE Transactions 2005
JaeGwi Choi Goichiro Hanaoka KyungHyune Rhee Hideki Imai

Digital fingerprinting schemes are cryptographic methods deterring buyers from illegally redistributing digital contents. It enables sellers to identify the traitor by providing each buyer with a slight different version. What is important in designing fingerprinting scheme is to make it more practical and efficient. Recently, two oblivious transfer protocolbased schemes to consider practicalit...

Journal: :desert 2013
a. kouhpeima s. feiznia h. ahmadi s.a. asghar hashemi h. ghadimi

this contribution determines suitable fingerprinting properties for sediment source discrimination within theamrovan and atary catchments in semnan province, iran. these catchments are representative of a range of geology formations and should therefore provide a meaningful basis for a general assessment of the degree of sediment source discrimination afforded by a range of fingerprint properti...

2006
Ashwin Swaminathan Shan He Min Wu

Digital fingerprinting is an emerging technology to protect multimedia from unauthorized use by embedding a unique fingerprint signal into each user’s copy. A robust embedding algorithm is an important building block in order to make the fingerprint resilient to various distortions and collusion attacks. Spread spectrum embedding has been widely used for multimedia fingerprinting. In this paper...

Journal: :J. Comput. Syst. Sci. 2014
Saeed Ur Rehman Kevin W. Sowerby Colin Coghill

rticle history: eceived 30 November 2012 eceived in revised form 30 April 2013 ccepted 14 June 2013 vailable online xxxx eywords: adio fingerprinting mpersonation attack hysical layer security ardware security Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fing...

2007
Jeroen P. Prins

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content, so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is e...

Journal: :EURASIP J. Information Security 2007
Jeroen P. Prins Zekeriya Erkin Reginald L. Lagendijk

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is es...

Journal: :PoPETs 2017
Fatemeh Rezaei Amir Houmansadr

Flow fingerprinting is a mechanism for linking obfuscated network flows at large scale. In this paper, we introduce the first blind flow fingerprinting system called TagIt. Our system works by modulating fingerprint signals into the timing patterns of network flows through slightly delaying packets into secret time intervals only known to the fingerprinting parties. We design TagIt to to enable...

2009
Jian Lu

Research that began a decade ago in video copy detection has developed into a technology known as “video fingerprinting”. Today, video fingerprinting is an essential and enabling tool adopted by the industry for video content identification and management in online video distribution. This paper provides a comprehensive review of video fingerprinting technology and its applications in identifyi...

2016
Jamie Hayes George Danezis

Website fingerprinting enables an attacker to infer the source of a web page when a client is browsing through encrypted or anonymized network connections. We present a new website fingerprinting attack based on fingerprints extracted from random decision forests and evaluate performance on three separate data sets consisting of both standard web pages as well as Tor hidden services. Within the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید