• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,080
Next 10 →

Collusion-Secure Fingerprinting for Digital Data

by Dan Boneh, James Shaw - IEEE Transactions on Information Theory , 1996
"... This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trac ..."
Abstract - Cited by 353 (1 self) - Add to MetaCart
and trace it back to the user. This threat of detection will hopefully deter users from releasing unauthorized copies. A problem arises when users collude: For digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude

Efficient randomized pattern-matching algorithms

by Richard M. Karp, Michael O. Rabin , 1987
"... We present randomized algorithms to solve the following string-matching problem and some of its generalizations: Given a string X of length n (the pattern) and a string Y (the text), find the first occurrence of X as a consecutive block within Y. The algorithms represent strings of length n by much ..."
Abstract - Cited by 397 (1 self) - Add to MetaCart
We present randomized algorithms to solve the following string-matching problem and some of its generalizations: Given a string X of length n (the pattern) and a string Y (the text), find the first occurrence of X as a consecutive block within Y. The algorithms represent strings of length n

On the Individuality of Fingerprints

by Sharath Pankanti, Salil Prabhakar, Anil K. Jain - IEEE Transactions on Pattern Analysis and Machine Intelligence , 2001
"... Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerprint is unique to an individual. The validity of the first premise has been established by the anatomy and morphogenesis o ..."
Abstract - Cited by 157 (15 self) - Add to MetaCart
the problem of fingerprint individuality by quantifying the amount of information available in minutiae points to establish a correspondence between two fingerprint images. We derive an expression which estimates the probability of falsely associating minutiae-based representations from two arbitrary

FINGERPRINT

by Soweon Yoon, Student Member, Jianjiang Feng, Anil K. Jain
"... Abstract—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that these systems are not compromised. While several issues related to fingerprint system security have been investigated ..."
Abstract - Add to MetaCart
investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his

Information fusion in biometrics

by Arun Ross, Anil Jain - Pattern Recognition Letters , 2003
"... User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric trait and unacceptable error rates. Attempting to improve the performance of individual matchers in such situations may not p ..."
Abstract - Cited by 292 (17 self) - Add to MetaCart
not prove to be effective because of these inherent problems. Multibiometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. These systems help achieve an increase in performance that may not be possible using a single biometric indicator. Further

A Multichannel Approach to Fingerprint Classification

by Anil Jain, Salil Prabhakar, Lin Hong - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 1999
"... Fingerprint classification can provide an important indexing mechanism in a fingerprint database. An accurate and consistent classification can greatly reduce fingerprint matching time for large databases. In this paper, we present a fingerprint classification algorithm which is able to achieve an a ..."
Abstract - Cited by 155 (10 self) - Add to MetaCart
Fingerprint classification can provide an important indexing mechanism in a fingerprint database. An accurate and consistent classification can greatly reduce fingerprint matching time for large databases. In this paper, we present a fingerprint classification algorithm which is able to achieve

Information-theoretic analysis of information hiding

by Pierre Moulin, Joseph A. O’sullivan - IEEE Transactions on Information Theory , 2003
"... Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermar ..."
Abstract - Cited by 265 (19 self) - Add to MetaCart
, watermarking, fingerprinting, steganography, and data embedding. In these applications, information is hidden within a host data set and is to be reliably communicated to a receiver. The host data set is intentionally corrupted, but in a covert way, designed to be imperceptible to a casual analysis. Next

Quantum Fingerprinting

by Harry Buhrman, Richard Cleve, John Watrous, Ronald De Wolf , 2001
"... Classical ngerprinting associates with each string a shorter string (its ngerprint) , such that, with high probability, any two distinct strings can be distinguished by comparing their ngerprints alone. The ngerprints can be exponentially smaller than the original strings if the parties preparing ..."
Abstract - Cited by 73 (15 self) - Add to MetaCart
. In our scheme, the ngerprints are exponentially shorter than the original strings and a measurement distinguishes between the ngerprints of any two distinct strings. Our scheme implies an exponential quantum/classical gap for the equality problem in the simultaneous message passing model

Anti-Collusion Fingerprinting for Multimedia

by Wade Trappe, Min Wu, Z.Jane Wang, Zhen Wang, K. J. Ray Liu - IEEE Transactions on Signal Processing , 2003
"... Digital fingerprinting is a technique for identifying users who might try to use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost ..."
Abstract - Cited by 106 (28 self) - Add to MetaCart
cost-e#ective attack against such digital fingerprints is collusion, where several di#erently marked copies of the same content are combined to disrupt the underlying fingerprints. In this paper, we investigate the problem of designing fingerprints that can withstand collusion and allow

Scalable Document Fingerprinting

by Nevin Heintze - IN PROC. USENIX WORKSHOP ON ELECTRONIC COMMERCE , 1996
"... As more information becomes available electronically, document search based on textual similarity is becoming increasingly important, not only for locating documents online, but also for addressing internet variants of old problems such as plagiarism and copyright violation. This paper presents an ..."
Abstract - Cited by 90 (0 self) - Add to MetaCart
As more information becomes available electronically, document search based on textual similarity is becoming increasingly important, not only for locating documents online, but also for addressing internet variants of old problems such as plagiarism and copyright violation. This paper presents
Next 10 →
Results 1 - 10 of 1,080
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University