Performance issues of enterprise level web proxies
SIGMETRICS '97 Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Asymmetric fingerprinting for larger collusions
Proceedings of the 4th ACM conference on Computer and communications security
Fingerprinting intellectual property using constraint-addition
Proceedings of the 37th Annual Design Automation Conference
Efficient dynamic traitor tracing
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
Watermarking maps: hiding information in structured data
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
WHIM: watermarking multicast video with a hierarchy of intermediaries
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Illegal Copy Protection Using Hidden Agent
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Fingerprinting Long Forgiving Messages
CRYPTO '85 Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Secure Fingerprinting Using Public-Key Cryptography (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Tracing the Source of a Shredded Document
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Characteristics of Some Binary Codes for Fingerprinting
ISW '00 Proceedings of the Third International Workshop on Information Security
Oblivious Image Watermarking Robust against Scaling and Geometric Distortions
ISC '01 Proceedings of the 4th International Conference on Information Security
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Optimal probabilistic fingerprint codes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Print signatures for document authentication
Proceedings of the 10th ACM conference on Computer and communications security
Watermarking relational data: framework, algorithms and analysis
The VLDB Journal — The International Journal on Very Large Data Bases
Watermill: an optimized fingerprinting system for highly constrained data
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Optimal probabilistic fingerprint codes
Journal of the ACM (JACM)
Message hidden in 1st and 2nd bit plane
ICCOMP'05 Proceedings of the 9th WSEAS International Conference on Computers
New Considerations about the Correct Design of Turbo Fingerprinting Codes
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Attack Analysis for He & Wu's Joint Watermarking/Fingerprinting Scheme
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Saddle-point solution of the fingerprinting capacity game under the marking assumption
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Evolvement of DRM schema: from encryption to interoperability and monitoring
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
An efficient fingerprinting scheme with symmetric and commutative encryption
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Equidistant binary fingerprinting codes existence and identification algorithms
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
IH'04 Proceedings of the 6th international conference on Information Hiding
Flaws in generic watermarking protocols based on zero-knowledge proofs
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
A practical solution for distribution rights protection in multicast environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Hi-index | 0.00 |
This paper presents a generaldiscussion of the use of fingerprints, especiallyfingerprinted data, Fingerprinting is classifiedin four orthogonal ways, and some illustrativeexamples are given. The basis for a statisticalanalysis of altered fingerprints is presented,along with an example simulation. The possibilityof more subtle fingerprints is discussed.