The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Filters
Towards joint decoding of binary Tardos fingerprinting codes
[article]
2011
arXiv
pre-print
The class of joint decoder of probabilistic fingerprinting codes is of utmost importance in theoretical papers to establish the concept of fingerprint capacity. ...
Neither the code construction nor the decoder make precise assumptions about the collusion (size or strategy). ...
The same idea is possible with Tardos probabilistic fingerprinting code. ...
arXiv:1104.5616v2
fatcat:nqzrf7z2vvgm7i243szn4gshdy
Signature codes for weighted binary adder channel and multimedia fingerprinting
[article]
2019
arXiv
pre-print
In this paper, we study the signature codes for weighted binary adder channel (WbAC) and collusion-resistant multimedia fingerprinting. ...
Furthermore, we show from the geometric viewpoint that there does not exist any binary code with complete traceability for noisy WbAC and multimedia fingerprinting. ...
In Section 5, we show from the geometric viewpoint that there does not exist any binary code with complete traceability for noisy multimedia fingerprinting, and introduce a new type of signature codes ...
arXiv:1905.10180v1
fatcat:zegimeow6reg5pbfffmea7bud4
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes
2012
IEEE Transactions on Information Forensics and Security
Toward Practical Joint Decoding of Binary Tardos Fingerprinting Codes Peter Meerwald and Teddy Furon Abstract-The class of joint decoder in fingerprinting codes is of utmost importance in theoretical papers ...
The same idea is possible with Tardos fingerprinting code. ...
doi:10.1109/tifs.2012.2195655
fatcat:fgddyrirtbfg7p4hl2nsbypguq
Short collusion-secure fingerprints based on dual binary Hamming codes
2000
Electronics Letters
The properties of dual binary Hamming codes are exploited to obtain a fingerprinting scheme secure against collusion of two buyers. ...
This is due both to the simple motion characteristics of Tennis
Short collusion-secure fingerprints based on dual binary Hamming codes
J. Domingo-Ferrer and J. ...
doi:10.1049/el:20001231
fatcat:r7frcm44dvbz3iswhtwgqoag7a
Binary fingerprinting codes - can we prove that someone is guilty?!
2015
2015 IEEE International Workshop on Information Forensics and Security (WIFS)
We assume that each codeword of a fingerprinting code identifies an unique user IPP-codes over binary alphabet do not exist! ...
(F k ,Y k ) is said to be a t-collusion secure digital fingerprinting code with e codes (F k ,Y k ) is said to be a t-collusion secure digital fingerprinting code with e R is an e-achievable rate for ...
doi:10.1109/wifs.2015.7368558
dblp:conf/wifs/FernandezEK15
fatcat:zcuex2bbqfctzo34vofesdrw3a
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables
[chapter]
2017
IFIP Advances in Information and Communication Technology
BinSign: Fingerprinting Binary Functions to Support Automated Analysis of Code Executables Lina Nouh Software reverse engineering is a complex process that incorporates dierent techniques involving static ...
Binary code ngerprinting is a challenging problem that requires an in-depth analysis of internal binary code components for deriving identiable and expressive signatures. ...
semantics of a piece of binary code. ...
doi:10.1007/978-3-319-58469-0_23
fatcat:5pa75pxs2zau3fuimqn7o5cwi4
Coding of fingerprint images using binary subband decomposition and vector quantization
1998
Visual Communications and Image Processing '98
In our method, the fingerprint image is first processed by a binary nonlinear subband decomposition filter bank and the resulting subimages are coded using vector quantizers designed for quantizing binary ...
In this paper, compression of binary digital fingerprint images is considered. High compression ratios for fingerprint images is essential for handling huge amount of images in databases. ...
In this paper, algorithms for coding binary and 2-bit fingerprint images are presented. ...
doi:10.1117/12.298317
fatcat:fk4atq7fffauhde4xbysfnn5ky
Labeling library functions in stripped binaries
2011
Proceedings of the 10th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools - PASTE '11
Binary code presents unique analysis challenges, particularly when debugging information has been stripped from the executable. ...
We have extended a tool, unstrip, to apply this technique to fingerprint wrapper functions in the GNU C library. unstrip discovers functions in a stripped binary and outputs a new binary, with meaningful ...
the binary code. ...
doi:10.1145/2024569.2024571
dblp:conf/paste/JacobsonRM11
fatcat:lboainb4tnh7phsweewl6fjpsy
A Study on Fingerprint Hash Code Generation Using Euclidean Distance for Identifying a User
2017
International journal of management, technology, and social science
In this paper, we discuss fingerprint image Hash code generation based on the Euclidean distance calculated on the binary image. ...
To implement Hash code generation we use MATLAB2015a. This study shows how fingerprints Hash code uniquely identifies a user or acts as index-key or identity-key. ...
In this paper, we developed a Hash code based on an MD5 Hash function by making use of Euclidean distance of binary fingerprint image. ...
doi:10.47992/ijmts.2581.6012.0030
fatcat:t6ui47f2irfhdmpgsf7o7hpo64
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing
2018
Designs, Codes and Cryptography
We propose a new approach to construct noise-resistant multimedia fingerprinting codes. ...
The corresponding multimedia fingerprinting codes allow to trace the entire coalition of pirates. The codes provide significantly better rate than previously known multimedia fingerprinting schemes. ...
Consider the set of n-dimensional binary vectors h j = (h 1 j , . . . , h nj ) ∈ R n as a binary multimedia fingerprinting code of cardinality M. ...
doi:10.1007/s10623-018-0580-4
fatcat:36o4ehxebvcthpdsmbmaobcgxy
Digital fingerprinting codes: problem statements, constructions, identification of traitors
2003
IEEE Transactions on Information Theory
We present binary fingerprinting codes secure against size-coalitions which enable the distributor (decoder) to recover at least one of the users from the coalition with probability of error exp( ( )) ...
Each user is assigned a fingerprint which is a word in a fingerprinting code of size (the total number of users) and length . ...
Section IV is devoted to constructions of binary fingerprinting codes. ...
doi:10.1109/tit.2003.809570
fatcat:6sklxm2gv5fotps2ky6kb2c65m
Measuring memetic algorithm performance on image fingerprints dataset
2021
TELKOMNIKA (Telecommunication Computing Electronics and Control)
Fingerprint recognition could be grouped in two various forms, verification and identification. Verification compares one on one fingerprint data. ...
Identification is matching input fingerprint with data that saved in the database. In this paper, we measure the performance of the memetic algorithm to process the image fingerprints dataset. ...
In this step is convert fingerprints image data to string array then convert string array to binary code use Base64. ...
doi:10.12928/telkomnika.v19i1.16418
fatcat:tcgetxbj5fhbdlcowyxfxnjalu
Segmentation and Counting of WBCs and RBCs from Microscopic Blood Sample Images
2016
International Journal of Image Graphics and Signal Processing
During the first step the Principal Watermark i.e Hand written signature is embedded through 2-D Walsh coding and then the resultant watermark i.e Biometric fingerprint is embedded to the first Watermarked ...
image through 2-D Walsh coding. ...
Using fingerprint scanner, applied fingerprint is converted to its equivalent binary code. ...
doi:10.5815/ijigsp.2016.11.05
fatcat:s66u5mqlkra6jnomtmymqhddse
Segmentation and Counting of WBCs and RBCs from Microscopic Blood Sample Images
2016
International Journal of Image Graphics and Signal Processing
During the first step the Principal Watermark i.e Hand written signature is embedded through 2-D Walsh coding and then the resultant watermark i.e Biometric fingerprint is embedded to the first Watermarked ...
image through 2-D Walsh coding. ...
Using fingerprint scanner, applied fingerprint is converted to its equivalent binary code. ...
doi:10.5815/ijigsp.2015.11.05
fatcat:pp4pmtkjofck7nrjrpdcaq5taa
A Study On Fingerprint Hash Code Generation Using Euclidean Distance For Identifying A User
2017
Zenodo
In this paper, we discuss fingerprint image Hash code generation based on the Euclidean distance calculated on the binary image. ...
To implement Hash code generation we use MATLAB2015a. This study shows how fingerprints Hash code uniquely identifies a user or acts as index-key or identity-key. ...
In this paper, we developed a Hash code based on an MD5 Hash function by making use of Euclidean distance of binary fingerprint image. ...
doi:10.5281/zenodo.1133544
fatcat:ukmqkh4kcbemnoi4gekiew56cu
« Previous
Showing results 1 — 15 out of 23,517 results