نتایج جستجو برای: fingerprinting

تعداد نتایج: 9139  

2005
Hyun-Ho Kang Brian M. Kurkoski Young-Ran Park Hyejoo Lee Sanguk Shin Kazuhiko Yamaguchi Kingo Kobayashi

In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the tree, the legitimate users as the leaves, and the internal nodes as content buyer or seller. Because there is a limited number of user areas available in each tree, we propose to build sub-trees, where each sub-tree h...

2014
Saeed ur Rehman Shafiq Alam Iman T. Ardekani

Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless devices. RF fingerprinting classification is performed by selecting an “unknown” signal from the pool, generating its RF fingerprint, and using a classifier to correlate the recei...

Journal: :Computers & Security 2022

Privacy protection and traitor tracing have always been two separate research subjects. Meanwhile, digital fingerprinting, which tracks illegally distributed media by creating a unique code for each user, has long regarded as one of the effective means tracking down illegal users. However, most existing fingerprinting schemes focus on how to design more robust or general fingerprint target user...

Journal: :Journal of Cloud Computing 2021

Abstract Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and delay, but it also brings challenges data security privacy. Website fingerprinting (WF) is a passive traffic analysis attack that threatens website privacy which poses great threat user’s web security. It collects network packets generated while user accesses website, then uses seri...

2005
Kozo Banno Shingo Orihara Takaaki Mizuki Takao Nishizeki

Digital watermarking used for fingerprinting may receive a collusion attack; two or more users collude, compare their data, find a part of embedded watermarks, and make an unauthorized copy by masking their identities. In this paper, assuming that at most c users collude, we give a characterization of the fingerprinting codes that have the best security index in a sense of “(c, p/q)-secureness”...

2004
Jonathan Irons Martin Schmucker

Publishers of sheet music are generally reluctant in distributing their content via the Internet. Although online sheet music distribution’s advantages are numerous the potential risk of Intellectual Property Rights (IPR) infringement, e.g. illegal online distributions, disables any innovation propensity. While active protection techniques only deter external risk factors, additional technology...

1996
Birgit Pfitzmann Matthias Schunter

Fingerprinting schemes deter people from illegal copying of digital data by enabling the merchant of the data to identify the original buyer of a copy that was redistributed illegally. All known fingerprinting schemes are symmetric in the following sense: Both the buyer and the merchant know the fingerprinted copy. Thus, when the merchant finds this copy somewhere, there is no proof that it was...

2005
Vafa D. Izadinia Jan H. P. Eloff Derrick G. Kourie

This paper addresses some of the discriminants that make IPSec tunnel fingerprinting possible. Fingerprinting of VPN-tunnel endpoints may be desirable for forensic purposes, but in the hands of individuals of ill-intent, it undermines an enterprise network’s perimeter security. Three ways of preventing the ill-use of this type of fingerprinting are presented. The first two, apply to enterprises...

Bo-Chu Wang Qi-Yi He Shui-Ping Yang xian yang, Xiao-Dong Yu Xue Zhang

The aim of this paper is to develop a rapid, and highly sensitive quantitative HPLC fingerprint method with multiple indicators by using the Compound Chinese Medicine Wuwei Changyanning granule and 5 herbs in the prescription. The quantitative fingerprint chromatogram with multiple indicators was investigated. ⅰ)6 compositions included rutin, gallic acid, chlorogenic acid, atractylenolideⅠ, pac...

2014
Ira Ray Jenkins Rebecca Shapiro Sergey Bratus Ryan Speers Travis Goodspeed

We present a reliable method of PHY-layer fingerprinting of IEEE 802.15.4-conformant nodes with commodity digital radio chips widely used in building inexpensive IEEE 802.15.4-conformant devices. Typically, PHY-layer fingerprinting requires software-defined radios that cost orders of magnitude more than the chips they can fingerprint; our method does not require a software-defined radio and use...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید