نتایج جستجو برای: composite fingerprinting

تعداد نتایج: 130702  

2009
Ehsan Amiri Gábor Tardos

Including a unique code in each copy of a distributed document is an effective way of fighting intellectual piracy. Codes designed for this purpose that are secure against collusion attacks are called fingerprinting codes. In this paper we consider fingerprinting with the marking assumption and design codes that achieve much higher rates than previous constructions. We conjecture that these cod...

2003
Antoni Martínez-Ballesté Francesc Sebé Josep Domingo-Ferrer Miguel Soriano

Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that...

2014
Dominik Herrmann Karl-Peter Fuchs Hannes Federrath

Fingerprinting techniques are receiving widespread attention in the field of information security. In this paper we argue that they may be of specific interest for the field of network forensics. In three case studies, we explore the use of fingerprinting techniques to improve and extend current investigative methods and showcase why fingerprinting allows for more target-oriented investigations...

Journal: :Physica B: Condensed Matter 2004

Journal: :Nature Immunology 2013

2004
Z. Jane Wang Min Wu Wade Trappe Ray Liu

Digital fingerprinting of multimedia data involves embedding information in the content, and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprints is collusion, whereby a group of adversaries combine their in&vidual copies in an attempt to remove the underlying fingerprint...

2017
Min-Seok Choi Beakcheol Jang

Recently, many studies of indoor positioning system using wireless signals such as WiFi, Bluetooth, have been researched actively. There are three types of indoor positioning system, triangulation method, fingerprinting technique and Cell-ID technique. Triangulation method has advantages in searching locations in wide environment, but its accuracy deteriorates in narrow indoor environment due t...

Journal: :IEICE Transactions 2005
JaeGwi Choi Goichiro Hanaoka KyungHyune Rhee Hideki Imai

Digital fingerprinting schemes are cryptographic methods deterring buyers from illegally redistributing digital contents. It enables sellers to identify the traitor by providing each buyer with a slight different version. What is important in designing fingerprinting scheme is to make it more practical and efficient. Recently, two oblivious transfer protocolbased schemes to consider practicalit...

Journal: :iranian journal of microbiology 0
rashid ramazanzadeh cellular & molecular research center and microbiology department, faculty of medicine, kurdistan university of medical sciences, sanandaj, iran. serveh zamani student research committee of medicine, kurdistan university of medical sciences, sanandaj, iran. saman zamani student research committee of medicine, kurdistan university of medical sciences, sanandaj, iran.

background and objectives: the escherichia coli strains are greatly important in nosocomial and community acquired infections. the aim of this study was to determine the transmission of bacterial infections using genetic analysis. materials and methods: two hundred and thirty escherichia coli strains, isolated from different clinical samples, were characterized by enterobacterial repetitive int...

2006
Ashwin Swaminathan Shan He Min Wu

Digital fingerprinting is an emerging technology to protect multimedia from unauthorized use by embedding a unique fingerprint signal into each user’s copy. A robust embedding algorithm is an important building block in order to make the fingerprint resilient to various distortions and collusion attacks. Spread spectrum embedding has been widely used for multimedia fingerprinting. In this paper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید