Filters








23,517 Hits in 5.1 sec

Towards joint decoding of binary Tardos fingerprinting codes [article]

Peter Meerwald, Teddy Furon
2011 arXiv   pre-print
The class of joint decoder of probabilistic fingerprinting codes is of utmost importance in theoretical papers to establish the concept of fingerprint capacity.  ...  Neither the code construction nor the decoder make precise assumptions about the collusion (size or strategy).  ...  The same idea is possible with Tardos probabilistic fingerprinting code.  ... 
arXiv:1104.5616v2 fatcat:nqzrf7z2vvgm7i243szn4gshdy

Signature codes for weighted binary adder channel and multimedia fingerprinting [article]

Jinping Fan, Yujie Gu, Masahiro Hachimori, Ying Miao
2019 arXiv   pre-print
In this paper, we study the signature codes for weighted binary adder channel (WbAC) and collusion-resistant multimedia fingerprinting.  ...  Furthermore, we show from the geometric viewpoint that there does not exist any binary code with complete traceability for noisy WbAC and multimedia fingerprinting.  ...  In Section 5, we show from the geometric viewpoint that there does not exist any binary code with complete traceability for noisy multimedia fingerprinting, and introduce a new type of signature codes  ... 
arXiv:1905.10180v1 fatcat:zegimeow6reg5pbfffmea7bud4

Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes

Peter Meerwald, Teddy Furon
2012 IEEE Transactions on Information Forensics and Security  
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes Peter Meerwald and Teddy Furon Abstract-The class of joint decoder in fingerprinting codes is of utmost importance in theoretical papers  ...  The same idea is possible with Tardos fingerprinting code.  ... 
doi:10.1109/tifs.2012.2195655 fatcat:fgddyrirtbfg7p4hl2nsbypguq

Short collusion-secure fingerprints based on dual binary Hamming codes

J. Domingo-Ferrer, J. Herrera-Joancomartí
2000 Electronics Letters  
The properties of dual binary Hamming codes are exploited to obtain a fingerprinting scheme secure against collusion of two buyers.  ...  This is due both to the simple motion characteristics of Tennis Short collusion-secure fingerprints based on dual binary Hamming codes J. Domingo-Ferrer and J.  ... 
doi:10.1049/el:20001231 fatcat:r7frcm44dvbz3iswhtwgqoag7a

Binary fingerprinting codes - can we prove that someone is guilty?!

Marcel Fernandez, Elena Egorova, Grigory Kabatiansky
2015 2015 IEEE International Workshop on Information Forensics and Security (WIFS)  
We assume that each codeword of a fingerprinting code identifies an unique user IPP-codes over binary alphabet do not exist!  ...  (F k ,Y k ) is said to be a t-collusion secure digital fingerprinting code with e codes (F k ,Y k ) is said to be a t-collusion secure digital fingerprinting code with e R is an e-achievable rate for  ... 
doi:10.1109/wifs.2015.7368558 dblp:conf/wifs/FernandezEK15 fatcat:zcuex2bbqfctzo34vofesdrw3a

BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables [chapter]

Lina Nouh, Ashkan Rahimian, Djedjiga Mouheb, Mourad Debbabi, Aiman Hanna
2017 IFIP Advances in Information and Communication Technology  
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables Lina Nouh Software reverse engineering is a complex process that incorporates dierent techniques involving static  ...  Binary code ngerprinting is a challenging problem that requires an in-depth analysis of internal binary code components for deriving identiable and expressive signatures.  ...  semantics of a piece of binary code.  ... 
doi:10.1007/978-3-319-58469-0_23 fatcat:5pa75pxs2zau3fuimqn7o5cwi4

Coding of fingerprint images using binary subband decomposition and vector quantization

Oemer N. Gerek, Enis A. Cetin, Sarah A. Rajala, Majid Rabbani
1998 Visual Communications and Image Processing '98  
In our method, the fingerprint image is first processed by a binary nonlinear subband decomposition filter bank and the resulting subimages are coded using vector quantizers designed for quantizing binary  ...  In this paper, compression of binary digital fingerprint images is considered. High compression ratios for fingerprint images is essential for handling huge amount of images in databases.  ...  In this paper, algorithms for coding binary and 2-bit fingerprint images are presented.  ... 
doi:10.1117/12.298317 fatcat:fk4atq7fffauhde4xbysfnn5ky

Labeling library functions in stripped binaries

Emily R. Jacobson, Nathan Rosenblum, Barton P. Miller
2011 Proceedings of the 10th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools - PASTE '11  
Binary code presents unique analysis challenges, particularly when debugging information has been stripped from the executable.  ...  We have extended a tool, unstrip, to apply this technique to fingerprint wrapper functions in the GNU C library. unstrip discovers functions in a stripped binary and outputs a new binary, with meaningful  ...  the binary code.  ... 
doi:10.1145/2024569.2024571 dblp:conf/paste/JacobsonRM11 fatcat:lboainb4tnh7phsweewl6fjpsy

A Study on Fingerprint Hash Code Generation Using Euclidean Distance for Identifying a User

Krishna Prasad K., P. S. Aithal
2017 International journal of management, technology, and social science  
In this paper, we discuss fingerprint image Hash code generation based on the Euclidean distance calculated on the binary image.  ...  To implement Hash code generation we use MATLAB2015a. This study shows how fingerprints Hash code uniquely identifies a user or acts as index-key or identity-key.  ...  In this paper, we developed a Hash code based on an MD5 Hash function by making use of Euclidean distance of binary fingerprint image.  ... 
doi:10.47992/ijmts.2581.6012.0030 fatcat:t6ui47f2irfhdmpgsf7o7hpo64

Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing

Elena Egorova, Marcel Fernandez, Grigory Kabatiansky, Moon Ho Lee
2018 Designs, Codes and Cryptography  
We propose a new approach to construct noise-resistant multimedia fingerprinting codes.  ...  The corresponding multimedia fingerprinting codes allow to trace the entire coalition of pirates. The codes provide significantly better rate than previously known multimedia fingerprinting schemes.  ...  Consider the set of n-dimensional binary vectors h j = (h 1 j , . . . , h nj ) ∈ R n as a binary multimedia fingerprinting code of cardinality M.  ... 
doi:10.1007/s10623-018-0580-4 fatcat:36o4ehxebvcthpdsmbmaobcgxy

Digital fingerprinting codes: problem statements, constructions, identification of traitors

A. Barg, G.R. Blakley, G.A. Kabatiansky
2003 IEEE Transactions on Information Theory  
We present binary fingerprinting codes secure against size-coalitions which enable the distributor (decoder) to recover at least one of the users from the coalition with probability of error exp( ( ))  ...  Each user is assigned a fingerprint which is a word in a fingerprinting code of size (the total number of users) and length .  ...  Section IV is devoted to constructions of binary fingerprinting codes.  ... 
doi:10.1109/tit.2003.809570 fatcat:6sklxm2gv5fotps2ky6kb2c65m

Measuring memetic algorithm performance on image fingerprints dataset

Priati Assiroj, H. L. H. S. Warnars, E. Abdurrachman, A. I. Kistijantoro, A. Doucet
2021 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
Fingerprint recognition could be grouped in two various forms, verification and identification. Verification compares one on one fingerprint data.  ...  Identification is matching input fingerprint with data that saved in the database. In this paper, we measure the performance of the memetic algorithm to process the image fingerprints dataset.  ...  In this step is convert fingerprints image data to string array then convert string array to binary code use Base64.  ... 
doi:10.12928/telkomnika.v19i1.16418 fatcat:tcgetxbj5fhbdlcowyxfxnjalu

Segmentation and Counting of WBCs and RBCs from Microscopic Blood Sample Images

Lata A. Bhavnani, Udesang K. Jaliya, Mahasweta J. Joshi
2016 International Journal of Image Graphics and Signal Processing  
During the first step the Principal Watermark i.e Hand written signature is embedded through 2-D Walsh coding and then the resultant watermark i.e Biometric fingerprint is embedded to the first Watermarked  ...  image through 2-D Walsh coding.  ...  Using fingerprint scanner, applied fingerprint is converted to its equivalent binary code.  ... 
doi:10.5815/ijigsp.2016.11.05 fatcat:s66u5mqlkra6jnomtmymqhddse

Segmentation and Counting of WBCs and RBCs from Microscopic Blood Sample Images

Lata A. Bhavnani, Udesang K. Jaliya, Mahasweta J. Joshi
2016 International Journal of Image Graphics and Signal Processing  
During the first step the Principal Watermark i.e Hand written signature is embedded through 2-D Walsh coding and then the resultant watermark i.e Biometric fingerprint is embedded to the first Watermarked  ...  image through 2-D Walsh coding.  ...  Using fingerprint scanner, applied fingerprint is converted to its equivalent binary code.  ... 
doi:10.5815/ijigsp.2015.11.05 fatcat:pp4pmtkjofck7nrjrpdcaq5taa

A Study On Fingerprint Hash Code Generation Using Euclidean Distance For Identifying A User

P. Sreeramana Aithal, Krishna Prasad, K.,
2017 Zenodo  
In this paper, we discuss fingerprint image Hash code generation based on the Euclidean distance calculated on the binary image.  ...  To implement Hash code generation we use MATLAB2015a. This study shows how fingerprints Hash code uniquely identifies a user or acts as index-key or identity-key.  ...  In this paper, we developed a Hash code based on an MD5 Hash function by making use of Euclidean distance of binary fingerprint image.  ... 
doi:10.5281/zenodo.1133544 fatcat:ukmqkh4kcbemnoi4gekiew56cu
« Previous Showing results 1 — 15 out of 23,517 results