نتایج جستجو برای: fingerprinting properties

تعداد نتایج: 877840  

2005
In Koo Kang Hae-Yeoun Lee Won-Young Yoo Heung-Kyu Lee

Digital fingerprinting is a technique to protect digital contents from illegal reproduction and redistribution by marking unique information for individual user. A powerful but simple attack to diminish fingerprint signals is averaging. While several fingerprinting schemes against collusion attacks were proposed, they often do not fully account for multimedia data. In this paper, we propose a z...

2004
Shan He Min Wu

Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Fingerprinting based on error correction coding (ECC) handle the important issue of how to embed the fingerprint into host data in an abstract way known as the marking assumptions, which often do not fully account for multimedia specific ...

2005
Hyun-Ho Kang Brian M. Kurkoski Young-Ran Park Hyejoo Lee Sanguk Shin Kazuhiko Yamaguchi Kingo Kobayashi

In this paper, we present a video fingerprinting system to identify the source of illegal copies. Content is distributed along a specified tree, with the seller as the root of the tree, the legitimate users as the leaves, and the internal nodes as content buyer or seller. Because there is a limited number of user areas available in each tree, we propose to build sub-trees, where each sub-tree h...

2014
Saeed ur Rehman Shafiq Alam Iman T. Ardekani

Radio Frequency (RF) fingerprinting is a security mechanism inspired by biological fingerprint identification systems. RF fingerprinting is proposed as a means of providing an additional layer of security for wireless devices. RF fingerprinting classification is performed by selecting an “unknown” signal from the pool, generating its RF fingerprint, and using a classifier to correlate the recei...

Journal: :Computers & Security 2022

Privacy protection and traitor tracing have always been two separate research subjects. Meanwhile, digital fingerprinting, which tracks illegally distributed media by creating a unique code for each user, has long regarded as one of the effective means tracking down illegal users. However, most existing fingerprinting schemes focus on how to design more robust or general fingerprint target user...

Journal: :Journal of Cloud Computing 2021

Abstract Edge computing has developed rapidly in recent years due to its advantages of low bandwidth overhead and delay, but it also brings challenges data security privacy. Website fingerprinting (WF) is a passive traffic analysis attack that threatens website privacy which poses great threat user’s web security. It collects network packets generated while user accesses website, then uses seri...

2005
Kozo Banno Shingo Orihara Takaaki Mizuki Takao Nishizeki

Digital watermarking used for fingerprinting may receive a collusion attack; two or more users collude, compare their data, find a part of embedded watermarks, and make an unauthorized copy by masking their identities. In this paper, assuming that at most c users collude, we give a characterization of the fingerprinting codes that have the best security index in a sense of “(c, p/q)-secureness”...

2004
Jonathan Irons Martin Schmucker

Publishers of sheet music are generally reluctant in distributing their content via the Internet. Although online sheet music distribution’s advantages are numerous the potential risk of Intellectual Property Rights (IPR) infringement, e.g. illegal online distributions, disables any innovation propensity. While active protection techniques only deter external risk factors, additional technology...

1996
Birgit Pfitzmann Matthias Schunter

Fingerprinting schemes deter people from illegal copying of digital data by enabling the merchant of the data to identify the original buyer of a copy that was redistributed illegally. All known fingerprinting schemes are symmetric in the following sense: Both the buyer and the merchant know the fingerprinted copy. Thus, when the merchant finds this copy somewhere, there is no proof that it was...

2005
Vafa D. Izadinia Jan H. P. Eloff Derrick G. Kourie

This paper addresses some of the discriminants that make IPSec tunnel fingerprinting possible. Fingerprinting of VPN-tunnel endpoints may be desirable for forensic purposes, but in the hands of individuals of ill-intent, it undermines an enterprise network’s perimeter security. Three ways of preventing the ill-use of this type of fingerprinting are presented. The first two, apply to enterprises...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید