Results 1 - 10
of
1,080
Collusion-Secure Fingerprinting for Digital Data
- IEEE Transactions on Information Theory
, 1996
"... This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trac ..."
Abstract
-
Cited by 353 (1 self)
- Add to MetaCart
and trace it back to the user. This threat of detection will hopefully deter users from releasing unauthorized copies. A problem arises when users collude: For digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude
Efficient randomized pattern-matching algorithms
, 1987
"... We present randomized algorithms to solve the
following string-matching problem and some of its generalizations: Given a string X of length n (the pattern) and a string Y (the text), find the first occurrence of X as a consecutive block within Y. The algorithms represent strings of length n by much ..."
Abstract
-
Cited by 397 (1 self)
- Add to MetaCart
We present randomized algorithms to solve the
following string-matching problem and some of its generalizations: Given a string X of length n (the pattern) and a string Y (the text), find the first occurrence of X as a consecutive block within Y. The algorithms represent strings of length n
On the Individuality of Fingerprints
- IEEE Transactions on Pattern Analysis and Machine Intelligence
, 2001
"... Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerprint is unique to an individual. The validity of the first premise has been established by the anatomy and morphogenesis o ..."
Abstract
-
Cited by 157 (15 self)
- Add to MetaCart
the problem of fingerprint individuality by quantifying the amount of information available in minutiae points to establish a correspondence between two fingerprint images. We derive an expression which estimates the probability of falsely associating minutiae-based representations from two arbitrary
FINGERPRINT
"... Abstract—The widespread deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has heightened the need for ensuring that these systems are not compromised. While several issues related to fingerprint system security have been investigated ..."
Abstract
- Add to MetaCart
investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his
Information fusion in biometrics
- Pattern Recognition Letters
, 2003
"... User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, non-universality of the biometric trait and unacceptable error rates. Attempting to improve the performance of individual matchers in such situations may not p ..."
Abstract
-
Cited by 292 (17 self)
- Add to MetaCart
not prove to be effective because of these inherent problems. Multibiometric systems seek to alleviate some of these drawbacks by providing multiple evidences of the same identity. These systems help achieve an increase in performance that may not be possible using a single biometric indicator. Further
A Multichannel Approach to Fingerprint Classification
- IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 1999
"... Fingerprint classification can provide an important indexing mechanism in a fingerprint database. An accurate and consistent classification can greatly reduce fingerprint matching time for large databases. In this paper, we present a fingerprint classification algorithm which is able to achieve an a ..."
Abstract
-
Cited by 155 (10 self)
- Add to MetaCart
Fingerprint classification can provide an important indexing mechanism in a fingerprint database. An accurate and consistent classification can greatly reduce fingerprint matching time for large databases. In this paper, we present a fingerprint classification algorithm which is able to achieve
Information-theoretic analysis of information hiding
- IEEE Transactions on Information Theory
, 2003
"... Abstract—An information-theoretic analysis of information hiding is presented in this paper, forming the theoretical basis for design of information-hiding systems. Information hiding is an emerging research area which encompasses applications such as copyright protection for digital media, watermar ..."
Abstract
-
Cited by 265 (19 self)
- Add to MetaCart
, watermarking, fingerprinting, steganography, and data embedding. In these applications, information is hidden within a host data set and is to be reliably communicated to a receiver. The host data set is intentionally corrupted, but in a covert way, designed to be imperceptible to a casual analysis. Next
Quantum Fingerprinting
, 2001
"... Classical ngerprinting associates with each string a shorter string (its ngerprint) , such that, with high probability, any two distinct strings can be distinguished by comparing their ngerprints alone. The ngerprints can be exponentially smaller than the original strings if the parties preparing ..."
Abstract
-
Cited by 73 (15 self)
- Add to MetaCart
. In our scheme, the ngerprints are exponentially shorter than the original strings and a measurement distinguishes between the ngerprints of any two distinct strings. Our scheme implies an exponential quantum/classical gap for the equality problem in the simultaneous message passing model
Anti-Collusion Fingerprinting for Multimedia
- IEEE Transactions on Signal Processing
, 2003
"... Digital fingerprinting is a technique for identifying users who might try to use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost ..."
Abstract
-
Cited by 106 (28 self)
- Add to MetaCart
cost-e#ective attack against such digital fingerprints is collusion, where several di#erently marked copies of the same content are combined to disrupt the underlying fingerprints. In this paper, we investigate the problem of designing fingerprints that can withstand collusion and allow
Scalable Document Fingerprinting
- IN PROC. USENIX WORKSHOP ON ELECTRONIC COMMERCE
, 1996
"... As more information becomes available electronically, document search based on textual similarity is becoming increasingly important, not only for locating documents online, but also for addressing internet variants of old problems such as plagiarism and copyright violation. This paper presents an ..."
Abstract
-
Cited by 90 (0 self)
- Add to MetaCart
As more information becomes available electronically, document search based on textual similarity is becoming increasingly important, not only for locating documents online, but also for addressing internet variants of old problems such as plagiarism and copyright violation. This paper presents
Results 1 - 10
of
1,080