Journal articles on the topic 'Fingerprinting codes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Fingerprinting codes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Löfvenberg, J. "Binary Fingerprinting Codes." Designs, Codes and Cryptography 36, no. 1 (July 2005): 69–81. http://dx.doi.org/10.1007/s10623-003-1163-5.
Full textZHU, Yan. "Convolutional Fingerprinting Information Codes for Collusion Security." Journal of Software 17, no. 7 (2006): 1617. http://dx.doi.org/10.1360/jos171617.
Full textNuida, Koji, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, and Hideki Imai. "An improvement of discrete Tardos fingerprinting codes." Designs, Codes and Cryptography 52, no. 3 (April 2, 2009): 339–62. http://dx.doi.org/10.1007/s10623-009-9285-z.
Full textFodor, Gabor, Peter Schelkens, and Ann Dooms. "Fingerprinting Codes Under the Weak Marking Assumption." IEEE Transactions on Information Forensics and Security 13, no. 6 (June 2018): 1495–508. http://dx.doi.org/10.1109/tifs.2017.2779112.
Full textMurala, Kranthi Kumar, Dr M. Kamaraju, and Dr K. Ramanjaneyulu. "Digital Fingerprinting In Encrypted Domain." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 1 (December 15, 2013): 3138–46. http://dx.doi.org/10.24297/ijct.v12i1.3360.
Full textYAGI, Hideki, Toshiyasu MATSUSHIMA, and Shigeichi HIRASAWA. "Fingerprinting Codes for Multimedia Data against Averaging Attack." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 207–16. http://dx.doi.org/10.1587/transfun.e92.a.207.
Full textWu, Ja-Ling. "Concatenated construction of traceability codes for multimedia fingerprinting." Optical Engineering 46, no. 10 (October 1, 2007): 107202. http://dx.doi.org/10.1117/1.2790911.
Full textSkoric, Boris, Stefan Katzenbeisser, Hans Georg Schaathun, and Mehmet Utku Celik. "Tardos Fingerprinting Codes in the Combined Digit Model." IEEE Transactions on Information Forensics and Security 6, no. 3 (September 2011): 906–19. http://dx.doi.org/10.1109/tifs.2011.2116783.
Full textGao, Fei, and Gennian Ge. "New Bounds on Separable Codes for Multimedia Fingerprinting." IEEE Transactions on Information Theory 60, no. 9 (September 2014): 5257–62. http://dx.doi.org/10.1109/tit.2014.2331989.
Full textCotrina-Navau, Josep, and Marcel Fernandez. "A Family of Asymptotically Good Binary Fingerprinting Codes." IEEE Transactions on Information Theory 56, no. 10 (October 2010): 5335–43. http://dx.doi.org/10.1109/tit.2010.2059470.
Full textŠkorić, Boris, Stefan Katzenbeisser, and Mehmet U. Celik. "Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes." Designs, Codes and Cryptography 46, no. 2 (November 1, 2007): 137–66. http://dx.doi.org/10.1007/s10623-007-9142-x.
Full textSCHAATHUN, H. G., and M. FERNANDEZ. "Soft Decision Decoding of Boneh-Shaw Fingerprinting Codes." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 10 (October 1, 2006): 2603–8. http://dx.doi.org/10.1093/ietfec/e89-a.10.2603.
Full textSchäfer, Marcel, Waldemar Berchtold, Teetje Stark, Nils Reimers, and Martin Steinebach. "A Novel Attack Model for Collusion Secure Fingerprinting Codes." Electronic Imaging 2016, no. 8 (February 14, 2016): 1–11. http://dx.doi.org/10.2352/issn.2470-1173.2016.8.mwsf-085.
Full textBarg, A., G. R. Blakley, and G. A. Kabatiansky. "Digital fingerprinting codes: problem statements, constructions, identification of traitors." IEEE Transactions on Information Theory 49, no. 4 (April 2003): 852–65. http://dx.doi.org/10.1109/tit.2003.809570.
Full textBun, Mark, Jonathan Ullman, and Salil Vadhan. "Fingerprinting Codes and the Price of Approximate Differential Privacy." SIAM Journal on Computing 47, no. 5 (January 2018): 1888–938. http://dx.doi.org/10.1137/15m1033587.
Full textKiyavash, N., and P. Moulin. "Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise." IEEE Transactions on Information Forensics and Security 4, no. 3 (September 2009): 293–301. http://dx.doi.org/10.1109/tifs.2009.2026462.
Full textMeerwald, Peter, and Teddy Furon. "Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes." IEEE Transactions on Information Forensics and Security 7, no. 4 (August 2012): 1168–80. http://dx.doi.org/10.1109/tifs.2012.2195655.
Full textSchaathun, Hans Georg. "On error-correcting fingerprinting codes for use with watermarking." Multimedia Systems 13, no. 5-6 (September 19, 2007): 331–44. http://dx.doi.org/10.1007/s00530-007-0096-7.
Full textCheng, Minquan, Hung-Lin Fu, Jing Jiang, Yuan-Hsun Lo, and Ying Miao. "Codes with the identifiable parent property for multimedia fingerprinting." Designs, Codes and Cryptography 83, no. 1 (April 7, 2016): 71–82. http://dx.doi.org/10.1007/s10623-016-0203-x.
Full textBassey, Joshua, Xiangfang Li, and Lijun Qian. "Device Authentication Codes based on RF Fingerprinting using Deep Learning." ICST Transactions on Security and Safety 8, no. 29 (November 30, 2021): 172305. http://dx.doi.org/10.4108/eai.30-11-2021.172305.
Full textBui, Thach V., Binh Q. Nguyen, Thuc D. Nguyen, Noboru Sonehara, and Isao Echizen. "Robust fingerprinting codes for database using non-adaptive group testing." International Journal of Big Data Intelligence 2, no. 2 (2015): 81. http://dx.doi.org/10.1504/ijbdi.2015.069095.
Full textFan, Jinping, Yujie Gu, Masahiro Hachimori, and Ying Miao. "Signature Codes for Weighted Binary Adder Channel and Multimedia Fingerprinting." IEEE Transactions on Information Theory 67, no. 1 (January 2021): 200–216. http://dx.doi.org/10.1109/tit.2020.3033445.
Full textCheng, Minquan, and Ying Miao. "On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting." IEEE Transactions on Information Theory 57, no. 7 (July 2011): 4843–51. http://dx.doi.org/10.1109/tit.2011.2146130.
Full textScott, A. J., J. Walgate, and B. C. Sanders. "Optimal fingerprinting strategies with one-sided error." Quantum Information and Computation 7, no. 3 (March 2007): 243–64. http://dx.doi.org/10.26421/qic7.3-5.
Full textFernandez, Marcel, Josep Cotrina‐Navau, and Miguel Soriano. "A class of non‐linear asymptotic fingerprinting codes with ε‐error." Online Information Review 31, no. 1 (February 27, 2007): 22–37. http://dx.doi.org/10.1108/14684520710731010.
Full textSebé, F., and J. Domingo-Ferrer. "Scattering codes to implement short 3-secure fingerprinting for copyright protection." Electronics Letters 38, no. 17 (2002): 958. http://dx.doi.org/10.1049/el:20020648.
Full textJourdas, J. F., and P. Moulin. "High-Rate Random-Like Spherical Fingerprinting Codes With Linear Decoding Complexity." IEEE Transactions on Information Forensics and Security 4, no. 4 (December 2009): 768–80. http://dx.doi.org/10.1109/tifs.2009.2034188.
Full textMoreira, José, Marcel Fernández, and Grigory Kabatiansky. "Constructions of almost secure frameproof codes with applications to fingerprinting schemes." Designs, Codes and Cryptography 86, no. 4 (April 20, 2017): 785–802. http://dx.doi.org/10.1007/s10623-017-0359-z.
Full textJiang, Yuzhou, Emre Yilmaz, and Erman Ayday. "Robust Fingerprint of Privacy-Preserving Location Trajectories." Proceedings on Privacy Enhancing Technologies 2023, no. 4 (October 2023): 5–20. http://dx.doi.org/10.56553/popets-2023-0095.
Full textRochanakul, Penying. "New Bounds on 2-Frameproof Codes of Length 4." International Journal of Mathematics and Mathematical Sciences 2020 (January 23, 2020): 1–5. http://dx.doi.org/10.1155/2020/4879108.
Full textKURIBAYASHI, Minoru, and Nobuo FUNABIKI. "Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, no. 1 (2018): 119–28. http://dx.doi.org/10.1587/transfun.e101.a.119.
Full textEgorova, Elena, Marcel Fernandez, Grigory Kabatiansky, and Moon Ho Lee. "Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing." Designs, Codes and Cryptography 87, no. 2-3 (September 21, 2018): 455–62. http://dx.doi.org/10.1007/s10623-018-0551-9.
Full textHOU, Shuhui, Tetsutaro UEHARA, Takashi SATOH, Yoshitaka MORIMURA, and Michihiko MINOH. "Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs." IEICE Transactions on Information and Systems E92-D, no. 5 (2009): 876–87. http://dx.doi.org/10.1587/transinf.e92.d.876.
Full textKorzhik, Valery, Guilermo Morales-Luna, Alexander Kochkarev, and Dmitriy Flaxman. "Concatenated digital watermarking system robust to different removal attacks." Computer Science and Information Systems 11, no. 4 (2014): 1581–94. http://dx.doi.org/10.2298/csis131218072k.
Full textCrawford, Brian H., AKM A. Hussain, and Nathan M. Jideama. "Evidence of a Genomic Biomarker in Normal Human Epithelial Mammary Cell Line, MCF-10A, That Is Absent in the Human Breast Cancer Cell Line, MCF-7." Journal of Biomedicine and Biotechnology 2006 (2006): 1–5. http://dx.doi.org/10.1155/jbb/2006/43181.
Full textHuser, Vojtech, Nick D. Williams, and Craig S. Mayer. "Linking Provider Specialty and Outpatient Diagnoses in Medicare Claims Data: Data Quality Implications." Applied Clinical Informatics 12, no. 04 (August 2021): 729–36. http://dx.doi.org/10.1055/s-0041-1732404.
Full textEgorova, E. E., M. Fernandez, G. A. Kabatiansky, and Y. Miao. "Existence and Construction of Complete Traceability Multimedia Fingerprinting Codes Resistant to Averaging Attack and Adversarial Noise." Problems of Information Transmission 56, no. 4 (December 2020): 388–98. http://dx.doi.org/10.1134/s0032946020040080.
Full textZhang, Hui, Pingping Lin, Yanming Liu, Chaohua Huang, Guoqiang Huang, Hongtao Jiang, Liangnian Xu, Muqing Zhang, Zuhu Deng, and Xinwang Zhao. "Development of SLAF-Sequence and Multiplex SNaPshot Panels for Population Genetic Diversity Analysis and Construction of DNA Fingerprints for Sugarcane." Genes 13, no. 8 (August 19, 2022): 1477. http://dx.doi.org/10.3390/genes13081477.
Full textJi, Tianxi, Erman Ayday, Emre Yilmaz, and Pan Li. "Privacy-Preserving Fingerprinting Against Collusion and Correlation Threats in Genomic Data." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (July 2024): 659–73. http://dx.doi.org/10.56553/popets-2024-0098.
Full textCai, Yong, Xiwen Li, Mei Li, Xiaojia Chen, Hao Hu, Jingyun Ni, and Yitao Wang. "Traceability and Quality Control in Traditional Chinese Medicine: From Chemical Fingerprint to Two-Dimensional Barcode." Evidence-Based Complementary and Alternative Medicine 2015 (2015): 1–6. http://dx.doi.org/10.1155/2015/251304.
Full textGrass, Gregor, Angelika Schierhorn, Eduard Sorkau, Helmut Müller, Peter Rücknagel, Dietrich H. Nies, and Beate Fricke. "Camelysin Is a Novel Surface Metalloproteinase from Bacillus cereus." Infection and Immunity 72, no. 1 (January 2004): 219–28. http://dx.doi.org/10.1128/iai.72.1.219-228.2004.
Full textYu, Yue, Yi Zhang, Liang Chen, and Ruizhi Chen. "Intelligent Fusion Structure for Wi-Fi/BLE/QR/MEMS Sensor-Based Indoor Localization." Remote Sensing 15, no. 5 (February 22, 2023): 1202. http://dx.doi.org/10.3390/rs15051202.
Full textSmirnova, Irina G., and Ekaterina V. Alekseeva. "Ensuring the Rights and Legal Interests of the Victim when Checking the Crime Report: A Comparative Legal Analysis of the Criminal Procedure Codes of the Russian Federation and the People’s Republic of China." Ugolovnaya yustitsiya, no. 17 (2021): 128–33. http://dx.doi.org/10.17223/23088451/17/25.
Full textMgode, G. F., R. S. Machang'u, M. G. Goris, M. Engelbert, S. Sondij, and R. A. Hartskeerl. "New Leptospira serovar Sokoine of serogroup Icterohaemorrhagiae from cattle in Tanzania." International Journal of Systematic and Evolutionary Microbiology 56, no. 3 (March 1, 2006): 593–97. http://dx.doi.org/10.1099/ijs.0.63278-0.
Full textKoolstra, Kirsten, Peter Börnert, Boudewijn P. F. Lelieveldt, Andrew Webb, and Oleh Dzyubachyk. "Stochastic neighbor embedding as a tool for visualizing the encoding capability of magnetic resonance fingerprinting dictionaries." Magnetic Resonance Materials in Physics, Biology and Medicine 35, no. 2 (October 23, 2021): 223–34. http://dx.doi.org/10.1007/s10334-021-00963-8.
Full textSić, Siniša, Norbert M. Maier, and Andreas M. Rizzi. "Quantitative fingerprinting of O-linked glycans released from proteins using isotopic coded labeling with deuterated 1-phenyl-3-methyl-5-pyrazolone." Journal of Chromatography A 1408 (August 2015): 93–100. http://dx.doi.org/10.1016/j.chroma.2015.06.065.
Full textGe, Yuan, Joshua P. Schimel, and Patricia A. Holden. "Identification of Soil Bacteria Susceptible to TiO2and ZnO Nanoparticles." Applied and Environmental Microbiology 78, no. 18 (July 13, 2012): 6749–58. http://dx.doi.org/10.1128/aem.00941-12.
Full textMichael, Claudia, and Andreas M. Rizzi. "Quantitative isomer-specific N-glycan fingerprinting using isotope coded labeling and high performance liquid chromatography–electrospray ionization-mass spectrometry with graphitic carbon stationary phase." Journal of Chromatography A 1383 (February 2015): 88–95. http://dx.doi.org/10.1016/j.chroma.2015.01.028.
Full textDekio, Itaru, Yuki Sugiura, Susumu Hamada-Tsutsumi, Yoshiyuki Murakami, Hiroto Tamura, and Makoto Suematsu. "What Do We See in Spectra?: Assignment of High-Intensity Peaks of Cutibacterium and Staphylococcus Spectra of MALDI-TOF Mass Spectrometry by Interspecies Comparative Proteogenomics." Microorganisms 9, no. 6 (June 8, 2021): 1243. http://dx.doi.org/10.3390/microorganisms9061243.
Full textKhan, MZI, and PK De. "DETERMINATION OF APHRODISIN GENE OF SYRIAN HAMSTER BY MOLECULAR TECHNIQUE." Bangladesh Journal of Veterinary Medicine 8, no. 2 (July 12, 2012): 175–84. http://dx.doi.org/10.3329/bjvm.v8i2.11202.
Full text