Affine transform resilient image fingerprinting

JS Seo, J Haitsma, T Kalker… - 2003 IEEE International …, 2003 - ieeexplore.ieee.org
Affine transformations are a well-known robustness issue in many multimedia fingerprinting
systems. Since it is quite easy with modem computers to apply affine transformations to …

Joint coding and embedding techniques for multimediafingerprinting

S He, M Wu - IEEE Transactions on Information Forensics and …, 2006 - ieeexplore.ieee.org
Digital fingerprinting protects multimedia content from illegal redistribution by uniquely
marking every copy of the content distributed to each user. The collusion attack is a powerful …

Deepmarks: A secure fingerprinting framework for digital rights management of deep learning models

H Chen, BD Rouhani, C Fu, J Zhao… - Proceedings of the 2019 …, 2019 - dl.acm.org
Deep Neural Networks (DNNs) are revolutionizing various critical fields by providing an
unprecedented leap in terms of accuracy and functionality. Due to the costly training …

[PDF][PDF] An extended image hashing concept: content-based fingerprinting using FJLT

X Lv, ZJ Wang - EURASIP Journal on Information Security, 2009 - Springer
Dimension reduction techniques, such as singular value decomposition (SVD) and
nonnegative matrix factorization (NMF), have been successfully applied in image hashing by …

Fine-grained webpage fingerprinting using only packet length information of encrypted traffic

M Shen, Y Liu, L Zhu, X Du, J Hu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Encrypted web traffic can reveal sensitive information of users, such as their browsing
behaviors. Existing studies on encrypted traffic analysis focus on website fingerprinting. We …

Fingerprinting compressed multimedia signals

AL Varna, S He, A Swaminathan… - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Digital fingerprinting is a technique to deter unauthorized redistribution of multimedia
content by embedding a unique identifying signal in each legally distributed copy. The …

Device fingerprinting using deep convolutional neural networks

S Aneja, N Aneja, B Bhargava… - International Journal …, 2022 - inderscienceonline.com
Device fingerprinting is a problem of identifying a network device using network traffic data
to secure against cyber-attacks. Automated device classification from a large set of network …

Modeling and analysis of correlated binary fingerprints for content identification

AL Varna, M Wu - IEEE Transactions on Information Forensics …, 2011 - ieeexplore.ieee.org
Multimedia identification via content fingerprints is used in many applications, such as
content filtering on user-generated content websites, and automatic multimedia identification …

Digital image forensics via intrinsic fingerprints

A Swaminathan, M Wu, KJR Liu - IEEE transactions on …, 2008 - ieeexplore.ieee.org
Digital imaging has experienced tremendous growth in recent decades, and digital camera
images have been used in a growing number of applications. With such increasing …

Genetic fingerprinting for copyright protection of multicast media

HC Huang, YH Chen - Soft Computing, 2009 - Springer
Generally speaking, comparing to the unicast or broadcast methods, it is more efficient to
transmit multimedia data via the multicast method to massive users. However, the ease of …