نتایج جستجو برای: fingerprinting properties

تعداد نتایج: 877840  

2003
Christian Collberg Stephen Kobourov Edward Carter

In this paper, we discuss graph-theoretic approaches to software watermarking and fingerprinting. Software watermarking is used to discourage intellectual property theft and software fingerprinting is used to trace intellectual property copyright violations. We focus on two algorithms that encode information in software through the use of graph structures. We then consider the different attack ...

2007
Jeroen P. Prins

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content, so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is e...

Journal: :EURASIP J. Information Security 2007
Jeroen P. Prins Zekeriya Erkin Reginald L. Lagendijk

Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer’s identity as a watermark into the content so that the merchant can retrieve the buyer’s identity when he encounters a redistributed copy. To prevent the merchant from dishonestly embedding the buyer’s identity multiple times, it is es...

2008
Xin Li Tian Liu Han Peng Hongtao Sun Jiaqi Zhu

This paper discusses properties of quantum fingerprinting with shared entanglement. Under certain restriction of final measurement, a relation is given between unitary operations of two parties. Then, by reducing to spherical coding problem, this paper gives a lower bound of worst case error probability for quantum fingerprinting with shared entanglement, showing a relation between worst case e...

Journal: :IEICE Transactions 2005
Katsunari Yoshioka Junji Shikata Tsutomu Matsumoto

Fingerprinting is a technique to add identifying marks to each copy of digital contents in order to enhance traceability to a distribution system. Collusion attacks, in which the attackers collect two or more fingerprinted copies and try to generate an untraceable copy, are considered to be a threat for the fingerprinting system. With the aim of enhancing collusion security to the fingerprintin...

2012
Jiwei Li Valentin Radu Lito Kriara Arsham Farshad Noelia Hernández Saravana Manickam

Wireless LAN (WLAN) location fingerprinting is an important approach for local positioning system, a complementary and alternative technology to the global positioning system (GPS). Fingerprinting is a method of localization that associates individual positions with distinct features and uses them to infer absolute locations of targets. The widespread presence of WLANs (based on IEEE 802.11 sta...

2014
Daehyeok Kim

I. MOTIVATION Web tracking is a set of technologies that allows websites to create profiles of their visitors. While a website owner might utilize such profile to provide its users with personalized advertisements or anti-fraud feature, tracking of users is generally considered a problem that brings user privacy under attack. According to a recent survey by Mayer et al. [1], web tracking techno...

2016
B. Lemasson N. Pannetier N. Coquery Ligia S. B. Boisserand Nora Collomb N. Schuff M. Moseley G. Zaharchuk E. L. Barbier T. Christen

In this study, we evaluated an MRI fingerprinting approach (MRvF) designed to provide high-resolution parametric maps of the microvascular architecture (i.e., blood volume fraction, vessel diameter) and function (blood oxygenation) simultaneously. The method was tested in rats (n = 115), divided in 3 models: brain tumors (9 L, C6, F98), permanent stroke, and a control group of healthy animals. ...

Journal: :Journal of Communications Software and Systems 2010

2001
Daniel White Kenji Yoshikawa D. Sarah Garland

Pyrolysis-gas chromatography/mass spectrometry (py-GC/MS) is an analytical tool used to produce a ‘‘fingerprint’’ of dissolved organic matter (DOM) in water. Py-GC/MS fingerprinting was used in this research to lend insight into the complex subsurface hydrology of a permafrost-dominated watershed near Fairbanks, AK. Fingerprinting analysis was conducted on groundwater, artesian spring, and stre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید