نتایج جستجو برای: fingerprinting properties

تعداد نتایج: 877840  

2003
Jonathan Goldstein John C. Platt Christopher J. C. Burges

This paper addresses the problem of quickly performing point queries against high-dimensional regions. Such queries are useful in the increasingly important problems of multimedia identification and retrieval, where different database entries have different metrics for similarity. While the database literature has focused on indexing for high-dimensional nearest neighbor and epsilon range queri...

Journal: :EURASIP J. Information Security 2008
Neil J. Hurley Félix Balado Guenole C. M. Silvestre

Multimedia fingerprinting, also known as robust or perceptual hashing, aims at representing multimedia signals through compact and perceptually significant descriptors (hash values). In this paper, we examine the probability of collision of a certain general class of robust hashing systems that, in its binary alphabet version, encompasses a number of existing robust audio hashing algorithms. Ou...

Journal: :Computer Communications 2013
Josep Domingo-Ferrer David Megías

Keywords: Co-utility Multicast fingerprinting Anonymous fingerprinting Game theory a b s t r a c t In conventional multicast transmission, one sender sends the same content to a set of receivers. This precludes fingerprinting the copy obtained by each receiver (in view of redistribution control and other applications). A straightforward alternative is for the sender to separately fingerprint an...

Journal: :EURASIP J. Adv. Sig. Proc. 2004
Z. Jane Wang Min Wu Wade Trappe K. J. Ray Liu

Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprinting is collusion, whereby a group of adversaries combine their individual copies in an attempt to remove the underlying fi...

2005
Shingo Okamura Maki Yoshida Toru Fujiwara

As the markets of digital contents over computer networks become more popular, illegal redistribution of contents by a buyer becomes the more serious problem. To deter illegal redistribution, various fingerprinting schemes have been proposed. The fingerprinting schemes enable merchants to embed information which identifies the original buyer to the purchased content. Identifying the original bu...

Journal: :CoRR 2016
Anupam Das Nikita Borisov Edward Chou Muhammad Haris Mughees

Advertisers are increasingly turning to fingerprinting techniques to track users across the web. As web browsing activity shifts to mobile platforms, traditional browser fingerprinting techniques become less effective; however, device fingerprinting using built-in sensors offers a new avenue for attack. We study the feasibility of using motion sensors to perform device fingerprinting at scale, ...

Journal: :research journal of pharmacognosy 0
a. hamedi medicinal plants processing research center, shiraz university of medical sciences, shiraz, iran. department of pharmacognosy, school of pharmacy, shiraz university of medical sciences, shiraz, iran. a. sakhteman department of medicinal chemistry, school of pharmacy, shiraz university of medical sciences, shiraz, iran. f. ahmadi department of pharmaceutics, school of pharmacy, shiraz university of medical sciences, shiraz, iran. m. sohrabpour student research committee, shiraz university of medical sciences, shiraz, iran. m.m. zarshenas medicinal plants processing research center, shiraz university of medical sciences, shiraz, iran. department of phytopharmaceuticals (traditional pharmacy), school of pharmacy, shiraz university of medical sciences, shiraz, iran.

background and objectives: traditional polyherbal oils are still in use in persian traditional medicine (ptm). most of these formulations are prepared via traditional procedures such as maceration of herbs in oils or evaporating aqueous herbal extracts in boiling or heating oils as the vehicle. thus, their quality control, standardization and authentication are real challenges due to the lack o...

Journal: :CoRR 2014
Jing Jiang Minquan Cheng Ying Miao Dianhua Wu

Binary multimedia identifiable parent property codes (binary t-MIPPCs) are used in multimedia fingerprinting schemes where the identification of users taking part in the averaging collusion attack to illegally redistribute content is required. In this paper, we first introduce a binary strong multimedia identifiable parent property code (binary t-SMIPPC) whose tracing algorithm is more efficien...

Journal: :CoRR 2014
Hristo Bojinov Yan Michalevsky Gabi Nakibly Dan Boneh

We demonstrate how the multitude of sensors on a smartphone can be used to construct a reliable hardware fingerprint of the phone. Such a fingerprint can be used to de-anonymize mobile devices as they connect to web sites, and as a second factor in identifying legitimate users to a remote server. We present two implementations: one based on analyzing the frequency response of the speakerphone-m...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده علوم پایه 1391

one of the applications of nanotechnology is use of carbon nanotubes for the targeted delivery of drug molecules. to demonstrate the physical and chemical properties of biomolecules and identify new material of drug properties, the interaction of carbon nanotubes (cnts) with biomolecules is a subject of many investigations. cnts is a synthetic compound with extraordinary mechanical, thermal, el...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید