• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 35,208
Next 10 →

Digital Fingerprinting of Virtual Components

by Edoardo Charbon, Ilhami Torunoglu , 1999
"... Fingerprinting is a technique extensively used by law enforcement to identify criminals when traces are left behind which uniquely match a suspect. Digital fingerprinting is a conceptually similar technique. It canbeused to trace intellectual property infringement on virtual components already on th ..."
Abstract - Add to MetaCart
Fingerprinting is a technique extensively used by law enforcement to identify criminals when traces are left behind which uniquely match a suspect. Digital fingerprinting is a conceptually similar technique. It canbeused to trace intellectual property infringement on virtual components already

Digital Fingerprinting Based on Keystroke Dynamics

by Ahmed Awad, E Ahmed, Issa Traore, Ahmad Almulhem
"... Digital fingerprinting is an important but still challenging aspect of network forensics. This paper introduces an effective way to identify an attacker based on a strong behavioral biometric. We introduce a new passive digital fingerprinting technique based on keystroke dynamics biometrics. The tec ..."
Abstract - Add to MetaCart
Digital fingerprinting is an important but still challenging aspect of network forensics. This paper introduces an effective way to identify an attacker based on a strong behavioral biometric. We introduce a new passive digital fingerprinting technique based on keystroke dynamics biometrics

ROBUST DIGITAL FINGERPRINTING FOR CURVES

by Hongmei Gou, Min Wu
"... Hiding data in curves can be achieved by parameterizing a curve using the B-spline model and adding spread spectrum sequences in B-spline control points. In this paper, we propose an iterative alignment-minimization algorithm to perform curve registration and deal with the non-uniqueness of B-spline ..."
Abstract - Cited by 2 (2 self) - Add to MetaCart
-spline control points. We demonstrate through experiments the robustness of our method against various attacks such as collusion, geometric transformation, and printingand-scanning. We also show the feasibility of our method for fingerprinting topographic maps and detecting fingerprints from printed copies. 1.

Codes for Digital Fingerprinting

by Jacob Löfvenberg , 2001
"... Unlicensed, or illegal, copying of data is a problem in many areas. Despite various efforts in copy protection and copyright enforcement (both legal and technical), the problem still exists, and with the growing use of digital means of storing and distributing data the problem seems to be getting wo ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
Unlicensed, or illegal, copying of data is a problem in many areas. Despite various efforts in copy protection and copyright enforcement (both legal and technical), the problem still exists, and with the growing use of digital means of storing and distributing data the problem seems to be getting

Collusion Resistance of Digital Fingerprinting Schemes

by T. U. Vladimirova
"... A digital fingerprint is user-specific information that is added in each copy of distributed digital data. The fingerprint should not be noticeable to the user. It is used to trace illegal distributing of data. Should the user illegally distribute his copy, the fingerprint in this copy will trace ba ..."
Abstract - Add to MetaCart
A digital fingerprint is user-specific information that is added in each copy of distributed digital data. The fingerprint should not be noticeable to the user. It is used to trace illegal distributing of data. Should the user illegally distribute his copy, the fingerprint in this copy will trace

Data hiding in curves for collusion-resistant digital fingerprinting

by Hongmei Gou, Min Wu - in Proc. IEEE International Conference on Image Processing (ICIP ’04 , 2004
"... ABSTRACT * This paper presents a new data hiding method for curves. The proposed algorithm parameterizes a curve using the B-spline model and adds a spread spectrum sequence in the coordinates of the B-spline control points. We demonstrate through experiments the robustness of the proposed data hidi ..."
Abstract - Cited by 7 (7 self) - Add to MetaCart
hiding algorithm against printing-andscanning and collusions, and show its feasibility for collusion-resistant fingerprinting of topographic maps as well as writings/drawings from pen-based input devices. 1.

Improved Collusion-Secure Codes for Digital Fingerprinting Based on Finite Geometries

by Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa
"... Abstract — Digital fingerprinting, a copyright protection technique for digital contents, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging att ..."
Abstract - Add to MetaCart
Abstract — Digital fingerprinting, a copyright protection technique for digital contents, is considered. Digital fingerprinting should deter collusion attacks, where several fingerprinted copies of the same content are mixed to disturb their fingerprints. In this paper, we consider the averaging

Collusion-Secure Fingerprinting for Digital Data

by Dan Boneh, James Shaw - IEEE Transactions on Information Theory , 1996
"... This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trac ..."
Abstract - Cited by 353 (1 self) - Add to MetaCart
This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy

A Multilevel Asymmetric Scheme for Digital Fingerprinting

by G. Boato, F. G. B. De Natale, C. Fontanari, G. Boato, F. G. B. De Natale, C. Fontanari , 2005
"... The present paper proposes an asymmetric watermarking scheme suitable for fingerprinting and precision-critical applications. The method is based on linear algebra and is proved to be secure under projection attack. The problem of anonymous fingerprinting is also addressed, by allowing a client to g ..."
Abstract - Add to MetaCart
The present paper proposes an asymmetric watermarking scheme suitable for fingerprinting and precision-critical applications. The method is based on linear algebra and is proved to be secure under projection attack. The problem of anonymous fingerprinting is also addressed, by allowing a client

Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding

by Brian Chen, Gregory W. Wornell - IEEE TRANS. ON INFORMATION THEORY , 1999
"... We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate, mini ..."
Abstract - Cited by 495 (15 self) - Add to MetaCart
We consider the problem of embedding one signal (e.g., a digital watermark), within another "host" signal to form a third, "composite" signal. The embedding is designed to achieve efficient tradeoffs among the three conflicting goals of maximizing information-embedding rate
Next 10 →
Results 1 - 10 of 35,208
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University