S He, M Wu - IEEE Transactions on Information Forensics and …, 2006 - ieeexplore.ieee.org
Digital fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. The collusion attack is a powerful …
Deep Neural Networks (DNNs) are revolutionizing various critical fields by providing an unprecedented leap in terms of accuracy and functionality. Due to the costly training …
X Lv, ZJ Wang - EURASIP Journal on Information Security, 2009 - Springer
Dimension reduction techniques, such as singular value decomposition (SVD) and nonnegative matrix factorization (NMF), have been successfully applied in image hashing by …
M Shen, Y Liu, L Zhu, X Du, J Hu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Encrypted web traffic can reveal sensitive information of users, such as their browsing behaviors. Existing studies on encrypted traffic analysis focus on website fingerprinting. We …
Digital fingerprinting is a technique to deter unauthorized redistribution of multimedia content by embedding a unique identifying signal in each legally distributed copy. The …
Device fingerprinting is a problem of identifying a network device using network traffic data to secure against cyber-attacks. Automated device classification from a large set of network …
AL Varna, M Wu - IEEE Transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
Multimedia identification via content fingerprints is used in many applications, such as content filtering on user-generated content websites, and automatic multimedia identification …
Digital imaging has experienced tremendous growth in recent decades, and digital camera images have been used in a growing number of applications. With such increasing …
HC Huang, YH Chen - Soft Computing, 2009 - Springer
Generally speaking, comparing to the unicast or broadcast methods, it is more efficient to transmit multimedia data via the multicast method to massive users. However, the ease of …