Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Fingerprinting codes“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Fingerprinting codes" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Fingerprinting codes"
Löfvenberg, J. „Binary Fingerprinting Codes“. Designs, Codes and Cryptography 36, Nr. 1 (Juli 2005): 69–81. http://dx.doi.org/10.1007/s10623-003-1163-5.
Der volle Inhalt der QuelleZHU, Yan. „Convolutional Fingerprinting Information Codes for Collusion Security“. Journal of Software 17, Nr. 7 (2006): 1617. http://dx.doi.org/10.1360/jos171617.
Der volle Inhalt der QuelleNuida, Koji, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa und Hideki Imai. „An improvement of discrete Tardos fingerprinting codes“. Designs, Codes and Cryptography 52, Nr. 3 (02.04.2009): 339–62. http://dx.doi.org/10.1007/s10623-009-9285-z.
Der volle Inhalt der QuelleFodor, Gabor, Peter Schelkens und Ann Dooms. „Fingerprinting Codes Under the Weak Marking Assumption“. IEEE Transactions on Information Forensics and Security 13, Nr. 6 (Juni 2018): 1495–508. http://dx.doi.org/10.1109/tifs.2017.2779112.
Der volle Inhalt der QuelleMurala, Kranthi Kumar, Dr M. Kamaraju und Dr K. Ramanjaneyulu. „Digital Fingerprinting In Encrypted Domain“. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, Nr. 1 (15.12.2013): 3138–46. http://dx.doi.org/10.24297/ijct.v12i1.3360.
Der volle Inhalt der QuelleYAGI, Hideki, Toshiyasu MATSUSHIMA und Shigeichi HIRASAWA. „Fingerprinting Codes for Multimedia Data against Averaging Attack“. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, Nr. 1 (2009): 207–16. http://dx.doi.org/10.1587/transfun.e92.a.207.
Der volle Inhalt der QuelleWu, Ja-Ling. „Concatenated construction of traceability codes for multimedia fingerprinting“. Optical Engineering 46, Nr. 10 (01.10.2007): 107202. http://dx.doi.org/10.1117/1.2790911.
Der volle Inhalt der QuelleSkoric, Boris, Stefan Katzenbeisser, Hans Georg Schaathun und Mehmet Utku Celik. „Tardos Fingerprinting Codes in the Combined Digit Model“. IEEE Transactions on Information Forensics and Security 6, Nr. 3 (September 2011): 906–19. http://dx.doi.org/10.1109/tifs.2011.2116783.
Der volle Inhalt der QuelleGao, Fei, und Gennian Ge. „New Bounds on Separable Codes for Multimedia Fingerprinting“. IEEE Transactions on Information Theory 60, Nr. 9 (September 2014): 5257–62. http://dx.doi.org/10.1109/tit.2014.2331989.
Der volle Inhalt der QuelleCotrina-Navau, Josep, und Marcel Fernandez. „A Family of Asymptotically Good Binary Fingerprinting Codes“. IEEE Transactions on Information Theory 56, Nr. 10 (Oktober 2010): 5335–43. http://dx.doi.org/10.1109/tit.2010.2059470.
Der volle Inhalt der QuelleDissertationen zum Thema "Fingerprinting codes"
Löfvenberg, Jacob. „Codes for digital fingerprinting /“. Linköping : Univ, 2001. http://www.bibl.liu.se/liupubl/disp/disp2001/tek722s.pdf.
Der volle Inhalt der QuelleRochanakul, Penying. „Fingerprinting codes and separating hash families“. Thesis, Royal Holloway, University of London, 2013. http://repository.royalholloway.ac.uk/items/464834d6-82c2-e1d2-e15f-92cf228d9704/7/.
Der volle Inhalt der QuellePanoui, Anastasia. „Wide-sense fingerprinting codes and honeycomb arrays“. Thesis, Royal Holloway, University of London, 2012. http://repository.royalholloway.ac.uk/items/0069d024-bc20-0d25-c1ab-ce87655766f0/8/.
Der volle Inhalt der QuelleDesoubeaux, Mathieu. „Codes de traçage de traîtres pour la protection de contenus numériques“. Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20228/document.
Der volle Inhalt der QuelleIn Traitor Tracing, preventing leaks of a digital content comes with the personalization of each delivered copy. For multimedia content distribution, such as video on demand applications, the personalization depends on a joint construction between a code of unique sequences and a data hiding tool. The major issue is to keep tracing properties even in case of collusion attacks proceed by a coalition of traitors. Collusion attacks have to be counteract both on the code layer with anti-collusion construction and on the data hiding layer with robust watermarking. For large scale multimedia content distribution, it is necessary to tackle the problem of the code generation in a probabilistic manner. The binary code of Gabor Tardos is actually the best approach of probabilistic traitor tracing codes. However, for real valued signals prone to distortion constraint, which is the context in multimedia digital watermarking, Tardos binary fingerprints are no longer optimal in term of decoding error. Our work concerns several aspects of probabilistic codes construction. Firstly, we gives new accusation functions in the Tardos tracing framework with a non informed MAP (Maximum A Posteriori) decoder leading to decrease errors probabilities. Secondly, we proposed a joint construction of binary and real values codes so as to improve collusion robustness. Finally we focus on a hierarchical two layers codes construction which reduces the Tardos decoding complexity
Shahmohammadi, Mohammad. „On fundamental limits and design of explicit schemes for multiuser networks“. The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1300721965.
Der volle Inhalt der QuelleRehman, Abdul. „Practical watermarking for multimedia traitor tracing“. Electronic Thesis or Diss., Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2024. http://www.theses.fr/2024IMTA0450.
Der volle Inhalt der QuelleThe popularity of mobile phones, digital cameras, and personal computers has changed multimedia content creation, consumption, and sharing. This raises the issues of endless duplication, unauthorized uploading, and unlawful redistribution. In this era of widespread digital information distribution, it is more important than ever to develop dependable and strong solutions to avoid illegal distribution. A multimedia fingerprinting scheme is an efficient means of protecting multimedia content and preventing illegal distribution. The goal of this thesis is to find individuals who were engaged in the production and illegal distribution of multimedia content. We proposed a Discrete Wavelet Transform blind video watermarking scheme tied with probabilistic fingerprinting codes to counter collusion attacks among higher-resolution videos. The robust and blind watermarking leads to a higher bit error rate, we need to add extra redundancy to fingerprinting codes to obtain greater tracing rates. For that, we propose a coding scheme, in which the random spreading is utilized with error-correcting codes. We utilized FFMpeg to embed the watermark image into the video, as well as to conduct a range of collusion attacks (e.g., average, darken, and lighten) on high-resolution video and compared the most often suggested fingerprinting code generator-decoders in the literature to find the colluder. The experimental investigation shows that our design has high performance in terms of colluder tracing, and time
Hassanein, Mohamed Sameh. „Secure digital documents using Steganography and QR Code“. Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/10619.
Der volle Inhalt der QuelleHaley, Stephen Mark. „The application of sediment source fingerprinting techniques to river floodplain cores, to examine recent changes in sediment sources in selected UK river basins“. Thesis, University of Exeter, 2010. http://hdl.handle.net/10036/3137.
Der volle Inhalt der QuelleBhatt, Manish. „Leveraging Relocations in ELF-binaries for Linux Kernel Version Identification“. ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2528.
Der volle Inhalt der QuelleAloui, Nadia. „Localisation sonore par retournement temporel“. Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENT079/document.
Der volle Inhalt der QuelleThe objective of this PhD is to propose a location solution that should be simple and robust to multipath that characterizes the indoor environments. First, a location system that exploits the time domain of channel parameters has been proposed. The system adopts the time of arrival of the path of maximum amplitude as a signature and estimates the target position through nonparametric kernel regression. The system was evaluated in experiments for two main configurations: a privacy-oriented configuration with code-division multiple-access operation and a centralized configuration with time-division multiple-access operation. A comparison between our privacy-oriented system and another acoustic location system based on code-division multiple-access operation and lateration method confirms the results found in radiofrequency-based localization. However, our experiments are the first to demonstrate the detrimental effect that reverberation has on acoustic localization approaches. Second, a location system based on time reversal technique and able to localize simultaneously sources with different location precisions has been tested through simulations for different values of the number of sources. The system has then been validated by experiments. Finally, we have been interested in reducing the audibility of the localization signal through psycho-acoustics. A filter, set from the absolute threshold of hearing, is then applied to the signal. Our results showed an improvement in precision, when compared to the location system without psychoacoustic model, thanks to the use of matched filter at the receiver. Moreover, we have noticed a significant reduction in the audibility of the filtered signal compared to that of the original signal
Bücher zum Thema "Fingerprinting codes"
Illinois State Police. Division of Foensic Services. DNA & CODIS. [Springfield, Ill.]: ISP Central Printing Section, 2005.
Den vollen Inhalt der Quelle findenBarcoding Nature: Shifting Cultures of Taxonomy in an Age of Biodiversity Loss. Taylor & Francis Group, 2013.
Den vollen Inhalt der Quelle findenEllis, Rebecca J. Bartlett. Barcoding Nature. 2013.
Den vollen Inhalt der Quelle findenBarcoding Nature: Shifting Cultures of Taxonomy in an Age of Biodiversity Loss. Routledge, 2013.
Den vollen Inhalt der Quelle findenEllis, Rebecca, Claire Waterton und Brian Wynne. Barcoding Nature: Shifting Cultures of Taxonomy in an Age of Biodiversity Loss. Taylor & Francis Group, 2013.
Den vollen Inhalt der Quelle findenBarcoding Nature: Shifting Cultures of Taxonomy in an Age of Biodiversity Loss. Taylor & Francis Group, 2013.
Den vollen Inhalt der Quelle findenBarcoding Nature. Taylor & Francis Group, 2013.
Den vollen Inhalt der Quelle findenBarcoding Nature. Routledge, 2014.
Den vollen Inhalt der Quelle findenKlein, Rebecca A. DNA backlog funding: Does money talk? 2008.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Fingerprinting codes"
Kiayias, Aggelos, und Serdar Pehlivanoglu. „Fingerprinting Codes“. In Advances in Information Security, 1–33. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-0044-9_1.
Der volle Inhalt der QuelleDumer, Ilya. „Equal-Weight Fingerprinting Codes“. In Lecture Notes in Computer Science, 43–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01877-0_5.
Der volle Inhalt der QuelleBui, Thach V., Binh Q. Nguyen, Thuc D. Nguyen, Noboru Sonehara und Isao Echizen. „Robust Fingerprinting Codes for Database“. In Algorithms and Architectures for Parallel Processing, 167–76. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03889-6_19.
Der volle Inhalt der QuelleVan Le, Tri, Mike Burmester und Jiangyi Hu. „Short c-Secure Fingerprinting Codes“. In Lecture Notes in Computer Science, 422–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10958513_32.
Der volle Inhalt der QuelleFernandez, M., und M. Soriano. „Fingerprinting Concatenated Codes with Efficient Identification“. In Lecture Notes in Computer Science, 459–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45811-5_36.
Der volle Inhalt der QuelleCohen, Gérard, Simon Litsyn und Gilles Zémor. „Binary Codes for Collusion-Secure Fingerprinting“. In Information Security and Cryptology — ICISC 2001, 178–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45861-1_14.
Der volle Inhalt der QuelleVeerubhotla, Ravi Sankar, Ashutosh Saxena und Ved Prakash Gulati. „Reed Solomon Codes for Digital Fingerprinting“. In Progress in Cryptology — INDOCRYPT 2002, 163–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-36231-2_14.
Der volle Inhalt der QuelleKatzenbeisser, Stefan, Boris Škorić, Mehmet U. Celik und Ahmad-Reza Sadeghi. „Combining Tardos Fingerprinting Codes and Fingercasting“. In Information Hiding, 294–310. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77370-2_20.
Der volle Inhalt der QuelleKuribayashi, Minoru. „Bias Equalizer for Binary Probabilistic Fingerprinting Codes“. In Information Hiding, 269–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36373-3_18.
Der volle Inhalt der QuelleLee, Jin-Heung, Tea-Hun Lim, Keon-Woo Kim und Sang-Uk Shin. „A New Fingerprinting Codes for Multimedia Contents“. In Lecture Notes in Computer Science, 510–19. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/978-3-540-69429-8_53.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Fingerprinting codes"
Wang, Canran, Jin Sima und Netanel Raviv. „Break-Resilient Codes for Forensic 3D Fingerprinting“. In 2024 IEEE International Symposium on Information Theory (ISIT), 3148–53. IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619135.
Der volle Inhalt der QuelleBoneh, Dan, Aggelos Kiayias und Hart William Montgomery. „Robust fingerprinting codes“. In the tenth annual ACM workshop. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1866870.1866873.
Der volle Inhalt der QuelleLi, Hongyuan, Guangjie Liu, Junwen Wang, Yuewei Dai und Zhiquan Wang. „Coded Fingerprinting Codes Based on Delay Embedding“. In 2009 International Conference on Multimedia Information Networking and Security. IEEE, 2009. http://dx.doi.org/10.1109/mines.2009.164.
Der volle Inhalt der QuelleAnthapadmanabhan, N. Prasanth, und Alexander Barg. „Two-level fingerprinting codes“. In 2009 IEEE International Symposium on Information Theory - ISIT. IEEE, 2009. http://dx.doi.org/10.1109/isit.2009.5205886.
Der volle Inhalt der QuelleMoulin, Pierre, und Negar Kiyavash. „Expurgated Gaussian Fingerprinting Codes“. In 2007 IEEE International Symposium on Information Theory. IEEE, 2007. http://dx.doi.org/10.1109/isit.2007.4557308.
Der volle Inhalt der QuelleAmiri, Ehsan, und Gábor Tardos. „High rate fingerprinting codes and the fingerprinting capacity“. In Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia, PA: Society for Industrial and Applied Mathematics, 2009. http://dx.doi.org/10.1137/1.9781611973068.38.
Der volle Inhalt der QuelleMixon, Dustin G., Christopher Quinn, Negar Kiyavash und Matthew Fickus. „Equiangular tight frame fingerprinting codes“. In ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2011. http://dx.doi.org/10.1109/icassp.2011.5946867.
Der volle Inhalt der QuelleKiayias, Aggelos. „Robust fingerprinting codes and applications“. In IS&T/SPIE Electronic Imaging, herausgegeben von Edward J. Delp III, Jana Dittmann, Nasir D. Memon und Ping Wah Wong. SPIE, 2009. http://dx.doi.org/10.1117/12.810749.
Der volle Inhalt der QuelleBui, Thach V., Binh Q. Nguyen, Thuc D. Nguyen, Noboru Sonehara und Isao Echizen. „Effective Fingerprinting Codes for Database“. In 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS). IEEE, 2013. http://dx.doi.org/10.1109/sitis.2013.107.
Der volle Inhalt der QuelleFernandez, Marcel, Grigory Kabatiansky und Jose Moreira. „Almost IPP-codes or provably secure digital fingerprinting codes“. In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282725.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Fingerprinting codes"
Butler, Bryan, Tom Barse, Nahla V. Bassil und Kim Lewers. How we came to have the 'Monocacy' hop. Yakima, WA: Hop Growers of America, August 2023. http://dx.doi.org/10.32747/2023.8127202.ars.
Der volle Inhalt der Quelle