نتایج جستجو برای: fingerprinting techniques

تعداد نتایج: 636550  

2014
Ira Ray Jenkins Rebecca Shapiro Sergey Bratus Ryan Speers Travis Goodspeed

We present a reliable method of PHY-layer fingerprinting of IEEE 802.15.4-conformant nodes with commodity digital radio chips widely used in building inexpensive IEEE 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they can fingerprint; our method does not require a software-defined radio and use...

2013
R.Caroline Jeba

With the increasing demand for health care approaches, resurgence of herbal medicines has taken up great dimensions in changing the health care scenario across the globe. However, identification of the correct species of therapeutic importance is of utmost necessity to deliver quality products to the global market. Hence, modern approach in the standardization of single herbal preparations empl...

1998
John Lach William H. Mangione-Smith Miodrag Potkonjak

As CAD tools and semiconductor technology improvements increase market opportunities for reusable hardware components, it becomes more important to produce techniques for protecting intellectual property rights. This work presents a method of fingerprinting an FPGA design component, so that products in the field can be used to identify both the component designer as well as the customer of reco...

Journal: :PoPETs 2018
Anupam Das Nikita Borisov Edward Chou

The ability to track users’ activities across different websites and visits is a key tool in advertising and surveillance. The HTML5 DeviceMotion interface creates a new opportunity for such tracking via fingerprinting of smartphone motion sensors. We study the feasibility of carrying out such fingerprinting under real-world constraints and on a large scale. In particular, we collect measuremen...

2011
Linhai Niu Nitin Mantri Chun Guang Li Charlie Xue Edwin Pang

Poor quality control of medicinal herbs has led to instances of toxicity, poisoning and even deaths. The fundamental step in quality control of herbal medicine is accurate identification of herbs. Array-based techniques have recently been adapted to authenticate or identify herbal plants. This article reviews the current array-based techniques, eg oligonucleotides microarrays, gene-based probe ...

2012
Minoru Kuribayashi

According to the development of the Internet, multi-media contents such as music, picture, movie, etc. are treated by digital format on the network. It enables us to purchase digital contents via a net easily. However, it causes several problems such as violation of ownership and illegal distribution of the copy. Digital fingerprinting is used to trace back the illegal users, where unique ID kn...

Journal: :EURASIP J. Information Security 2007
Jeroen P. Prins Zekeriya Erkin Reginald L. Lagendijk

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is es...

Journal: :Computer Communications 2013
Josep Domingo-Ferrer David Megías

Keywords: Co-utility Multicast fingerprinting Anonymous fingerprinting Game theory a b s t r a c t In conventional multicast transmission, one sender sends the same content to a set of receivers. This precludes fingerprinting the copy obtained by each receiver (in view of redistribution control and other applications). A straightforward alternative is for the sender to separately fingerprint an...

2007
Jeroen Prins Zekeriya Erkin Reginald Lagendijk

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. An efficient, anonymous fingerprinting scheme has been proposed by Kuribayashi and Tanaka to provide a secure and efficient protocol for both buyer and merchant [2]. However, the underlying watermarking scheme is based on basic quantization index modulation (QIM). Unfortunately, QIM watermar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید