نتایج جستجو برای: fingerprinting properties

تعداد نتایج: 877840  

2010
Avinash L. Varna

Multimedia identification via content fingerprints is used in many applications, such as content filtering on usergenerated content websites, automatic multimedia identification and tagging. A compact “fingerprint” is computed for each multimedia signal that captures robust and unique properties of the perceptual content, which is used for identifying the multimedia. Several different multimedi...

2003
Antoni Martínez-Ballesté Francesc Sebé Josep Domingo-Ferrer Miguel Soriano

Fingerprinting schemes allow tracing of illegally redistributed multimedia contents. When using asymmetric fingerprinting, the merchant does not know the marked copy nor the embedded mark, so fraudulent distribution of the content by the merchant –which could lead to framing honest customers– is not possible. A problem with the deployment of classical asymmetric fingerprinting protocols is that...

2014
Dominik Herrmann Karl-Peter Fuchs Hannes Federrath

Fingerprinting techniques are receiving widespread attention in the field of information security. In this paper we argue that they may be of specific interest for the field of network forensics. In three case studies, we explore the use of fingerprinting techniques to improve and extend current investigative methods and showcase why fingerprinting allows for more target-oriented investigations...

Journal: :Physica B: Condensed Matter 2004

Journal: :Nature Immunology 2013

2004
Z. Jane Wang Min Wu Wade Trappe Ray Liu

Digital fingerprinting of multimedia data involves embedding information in the content, and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be identified by authorized parties. One potential threat to fingerprints is collusion, whereby a group of adversaries combine their in&vidual copies in an attempt to remove the underlying fingerprint...

2017
Min-Seok Choi Beakcheol Jang

Recently, many studies of indoor positioning system using wireless signals such as WiFi, Bluetooth, have been researched actively. There are three types of indoor positioning system, triangulation method, fingerprinting technique and Cell-ID technique. Triangulation method has advantages in searching locations in wide environment, but its accuracy deteriorates in narrow indoor environment due t...

Journal: :IEICE Transactions 2005
JaeGwi Choi Goichiro Hanaoka KyungHyune Rhee Hideki Imai

Digital fingerprinting schemes are cryptographic methods deterring buyers from illegally redistributing digital contents. It enables sellers to identify the traitor by providing each buyer with a slight different version. What is important in designing fingerprinting scheme is to make it more practical and efficient. Recently, two oblivious transfer protocolbased schemes to consider practicalit...

Journal: :iranian journal of microbiology 0
rashid ramazanzadeh cellular & molecular research center and microbiology department, faculty of medicine, kurdistan university of medical sciences, sanandaj, iran. serveh zamani student research committee of medicine, kurdistan university of medical sciences, sanandaj, iran. saman zamani student research committee of medicine, kurdistan university of medical sciences, sanandaj, iran.

background and objectives: the escherichia coli strains are greatly important in nosocomial and community acquired infections. the aim of this study was to determine the transmission of bacterial infections using genetic analysis. materials and methods: two hundred and thirty escherichia coli strains, isolated from different clinical samples, were characterized by enterobacterial repetitive int...

Journal: :IACR Cryptology ePrint Archive 2012
Murat Ak Aggelos Kiayias Serdar Pehlivanoglu Ali Aydin Selçuk

Broadcast encryption (BE) is a cryptographic primitive that allows a broadcaster to encrypt digital content to a privileged set of users and in this way prevent revoked users from accessing the content. In BE schemes, a group of users, called traitors may leak their keys and enable an adversary to receive the content. Such malicious users can be detected through traitor tracing (TT) schemes. Th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید