Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("digital fingerprinting")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 18 of 18

  • Page / 1
Export

Selection :

  • and

Some Improved Bounds for Secure Frameproof Codes and Related Separating Hash FamiliesSTINSON, Douglas R; ZAVERUCHA, Gregory M.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2508-2514, issn 0018-9448, 7 p.Article

A Family of Asymptotically Good Binary Fingerprinting CodesCOTRINA-NAVAU, Josep; FERNANDEZ, Marcel.IEEE transactions on information theory. 2010, Vol 56, Num 10, pp 5335-5343, issn 0018-9448, 9 p.Article

A Multilevel Asymmetric Scheme for Digital FingerprintingBOATO, G; DE NATALE, F. G. B; FONTANARI, C et al.IEEE transactions on multimedia. 2008, Vol 10, Num 5, pp 758-766, issn 1520-9210, 9 p.Article

On the Fingerprinting Capacity Under the Marking AssumptionPRASANTH ANTHAPADMANABHAN, N; BARG, Alexander; DUMER, Ilya et al.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2678-2689, issn 0018-9448, 12 p.Article

Fingerprinting With Equiangular Tight FramesMIXON, Dustin G; QUINN, Christopher J; KIYAVASH, Negar et al.IEEE transactions on information theory. 2013, Vol 59, Num 3, pp 1855-1865, issn 0018-9448, 11 p.Article

Anti-collusion forensics of multimedia fingerprinting using orthogonal modulationWANG, Z. Jane; MIN WU; ZHAO, Hong Vicky et al.IEEE transactions on image processing. 2005, Vol 14, Num 6, pp 804-821, issn 1057-7149, 18 p.Article

Generating unique identifiers for smartphones using softwareHAMMOURI, G; SUNAR, B.Electronics letters. 2014, Vol 50, Num 13, pp 938-939, issn 0013-5194, 2 p.Article

Active Content FingerpritingFARHADZADEH, Farzad; VOLOSHYNOVSKIY, Sviatoslav.IEEE transactions on information forensics and security. 2014, Vol 9, Num 5-6, pp 905-920, issn 1556-6013, 16 p.Article

On the Workings and Current Practices of Web-Based Device FingerprintingNIKIFORAKIS, Nick; KAPRAVELOS, Alexandros; JOOSEN, Wouter et al.IEEE security & privacy. 2014, Vol 12, Num 3, pp 28-36, issn 1540-7993, 9 p.Conference Paper

Fingerprinting localisation with cruciate directional antennas for wireless sensor networksJIANG, Jehn-Ruey; LIN, Chih-Ming; CHENG, Kai-Chao et al.International journal of ad hoc and ubiquitous computing (Print). 2014, Vol 15, Num 1-3, pp 161-170, issn 1743-8225, 10 p.Article

Similar video detection using multiple direct-mapped cacheMURABAYASHI, Noboru; YOSHIDA, Kenichi.International journal of intelligent systems technologies and applications (Print). 2013, Vol 12, Num 3-4, pp 178-193, issn 1740-8865, 16 p.Article

Polyline curvatures based robust vector data hashingLEE, Suk-Hwan; HWANG, Won-Joo; KWON, Ki-Ryong et al.Multimedia tools and applications. 2014, Vol 73, Num 3, pp 1913-1942, issn 1380-7501, 30 p.Article

Collusion-Traceable Secure Multimedia Distribution Based on Controllable ModulationSHIGUO LIAN; ZHIQUAN WANG.IEEE transactions on circuits and systems for video technology. 2008, Vol 18, Num 10, pp 1462-1467, issn 1051-8215, 6 p.Article

Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern NoiseTOMIOKA, Yoichi; ITO, Yuya; KITAZAWA, Hitoshi et al.IEEE transactions on information forensics and security. 2013, Vol 8, Num 11-12, pp 1986-1995, issn 1556-6013, 10 p.Article

A fingerprint-based audio authentication scheme using frequency domain statistical characteristicFAN, Ming-Quan; WANG, Hong-Xia; LI, Heng-Jian et al.Multimedia tools and applications. 2014, Vol 70, Num 3, pp 2255-2270, issn 1380-7501, 16 p.Article

A Bayesian-MRF Approach for PRNU-Based Image Forgery DetectionCHIERCHIA, Giovanni; POGGI, Giovanni; SANSONE, Carlo et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 3-4, pp 554-567, issn 1556-6013, 14 p.Article

Compressed Binary Image Hashes Based on Semisupervised Spectral EmbeddingXUDONG LV; WANG, Z. Jane.IEEE transactions on information forensics and security. 2013, Vol 8, Num 11-12, pp 1838-1849, issn 1556-6013, 12 p.Article

Perceptual 3D model hashing using key-dependent shape featureLEE, Suk-Hwan; HWANG, Won-Joo; KWON, Ki-Ryong et al.Multimedia tools and applications. 2014, Vol 73, Num 3, pp 1723-1755, issn 1380-7501, 33 p.Article

  • Page / 1