Sciweavers

272 search results - page 10 / 55
» Detecting Altered Fingerprints
Sort
View
CCN
2006
278views Communications» more  CCN 2006»
15 years 1 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
109
Voted
TMM
2011
146views more  TMM 2011»
14 years 6 months ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICASSP
2007
IEEE
15 years 6 months ago
Known-Audio Detection using Waveprint: Spectrogram Fingerprinting by Wavelet Hashing
In this paper, we present a novel system for detecting known audio. We start with Waveprint, an audio identification system that, given a probe snippet, efficiently provides relia...
Michele Covell, Shumeet Baluja
ICEIS
2002
IEEE
15 years 4 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
HOST
2008
IEEE
15 years 6 months ago
Hardware Trojan Detection Using Path Delay Fingerprint
—Trusted IC design is a recently emerged topic since fabrication factories are moving worldwide in order to reduce cost. In order to get a low-cost but effective hardware Trojan ...
Yier Jin, Yiorgos Makris