نتایج جستجو برای: composite fingerprinting

تعداد نتایج: 130702  

2008
Jean-François Jourdas Pierre Moulin

In fingerprinting, a signature, unique to each user, is embedded in each distributed copy of a multimedia content, in order to identify potential illegal redistributors. This paper investigates digital fingerprinting problems involving millions of users and a handful of colluders. In such problems the rate of the fingerprinting code is often well below fingerprinting capacity, and the use of co...

Journal: :Computer Communications 2013
Josep Domingo-Ferrer David Megías

Keywords: Co-utility Multicast fingerprinting Anonymous fingerprinting Game theory a b s t r a c t In conventional multicast transmission, one sender sends the same content to a set of receivers. This precludes fingerprinting the copy obtained by each receiver (in view of redistribution control and other applications). A straightforward alternative is for the sender to separately fingerprint an...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه مواد و انرژی - پژوهشکده سرامیک 1392

thermal barrier coatings (tbcs) are used to provide thermal insulation to the hot section components of gas turbines in order to enhance the operating temperature and turbine efficiency. hot corrosion and thermal shocks are the main destructive factors in tbcs which comes as a result of oxygen and molten salt diffusion into the coating. in this thesis atmospheric plasma spraying was used to dep...

Journal: :EURASIP J. Adv. Sig. Proc. 2004
Z. Jane Wang Min Wu Wade Trappe K. J. Ray Liu

Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprinting is collusion, whereby a group of adversaries combine their individual copies in an attempt to remove the underlying fi...

2005
Shingo Okamura Maki Yoshida Toru Fujiwara

As the markets of digital contents over computer networks become more popular, illegal redistribution of contents by a buyer becomes the more serious problem. To deter illegal redistribution, various fingerprinting schemes have been proposed. The fingerprinting schemes enable merchants to embed information which identifies the original buyer to the purchased content. Identifying the original bu...

Journal: :CoRR 2016
Anupam Das Nikita Borisov Edward Chou Muhammad Haris Mughees

Advertisers are increasingly turning to fingerprinting techniques to track users across the web. As web browsing activity shifts to mobile platforms, traditional browser fingerprinting techniques become less effective; however, device fingerprinting using built-in sensors offers a new avenue for attack. We study the feasibility of using motion sensors to perform device fingerprinting at scale, ...

Journal: :research journal of pharmacognosy 0
a. hamedi medicinal plants processing research center, shiraz university of medical sciences, shiraz, iran. department of pharmacognosy, school of pharmacy, shiraz university of medical sciences, shiraz, iran. a. sakhteman department of medicinal chemistry, school of pharmacy, shiraz university of medical sciences, shiraz, iran. f. ahmadi department of pharmaceutics, school of pharmacy, shiraz university of medical sciences, shiraz, iran. m. sohrabpour student research committee, shiraz university of medical sciences, shiraz, iran. m.m. zarshenas medicinal plants processing research center, shiraz university of medical sciences, shiraz, iran. department of phytopharmaceuticals (traditional pharmacy), school of pharmacy, shiraz university of medical sciences, shiraz, iran.

background and objectives: traditional polyherbal oils are still in use in persian traditional medicine (ptm). most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. thus, their quality control, standardization and authentication are real challenges due to the lack o...

1997
Tina Lindkvist Jacob Löfvenberg

Coding methods for fingerprinting digital information are considered, with the aim of deterring users from copyright violation. A general model for discrete fingerprinting is presented, along with a simple embedding method for text documents. Different types of attacks are discussed, including attacks from colluding pirates. Some preliminary results are derived for random fingerprinting codes. ...

Journal: :Infection, genetics and evolution : journal of molecular epidemiology and evolutionary genetics in infectious diseases 2012
Luiz Claudio O Lazzarini Jeffrey Rosenfeld Richard C Huard Véronique Hill José Roberto Lapa e Silva Rob DeSalle Nalin Rastogi John L Ho

Global control of tuberculosis is increasingly dependent on rapid and accurate genetic typing of Mycobacteriumtuberculosis. Spoligotyping is a first-line genotypic fingerprinting method for M.tuberculosis isolates. An international online database (SpolDB4) of spoligotype patterns has been established wherein a clustered pattern (shared by ≥2 isolates) is designated a shared international type ...

2003
Minoru Kuribayashi Hatsukazu Tanaka

Fingerprinting protocol applies a watermarking technique to embed a fingerprinting information in a digital content such as music, image, movie, etc.. The cryptographic protocol is studied by many researchers, but how to apply watermarking techniques is not remarked. In this paper, we study the problem to implement the watermarking techniques in the fingerprinting protocol, and then propose an ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید