Sciweavers

88 search results - page 4 / 18
» Altered Fingerprints: Analysis and Detection
Sort
View
ICMCS
2009
IEEE
106views Multimedia» more  ICMCS 2009»
13 years 3 months ago
Modeling and analysis of content identification
Content fingerprinting provides a compact content-based representation of a multimedia document. An important application of fingerprinting is the identification of modified copie...
Avinash L. Varna, Min Wu
TIP
2010
107views more  TIP 2010»
13 years 15 days ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
HASE
2008
IEEE
13 years 6 months ago
Randomization Based Probabilistic Approach to Detect Trojan Circuits
In this paper, we propose a randomization based technique to verify whether a manufactured chip conforms to its design or is infected by any trojan circuit. A trojan circuit can be...
Susmit Jha, Sumit Kumar Jha
HICSS
2003
IEEE
184views Biometrics» more  HICSS 2003»
13 years 11 months ago
Content Based File Type Detection Algorithms
Identifying the true type of a computer file can be a difficult problem. Previous methods of file type recognition include fixed file extensions, fixed “magic numbers” stored ...
Mason McDaniel, Mohammad Hossain Heydari
CEC
2007
IEEE
14 years 4 days ago
Fingerprint analysis of the noisy prisoner's dilemma
Abstract— Fingerprinting is a technique that permits automatic classification of strategies for playing a game. In this study the evolution of strategies for playing the iterate...
Daniel A. Ashlock, Eun-Youn Kim, Wendy Ashlock