The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei...The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.展开更多
In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some...In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some private files have been leaked. In this paper, we put forward a scheme for active image betrayal checking on the Intemet based on the digital fingerprint, which embeds fingerprints into privacy documents, extracts codes from the Intemet images, and then fmds out the divulged files by matching two groups of codes. Due to so many documents on the Internet, the number of times of code comparison is huge, which leads to a large running time. To overcome the deficiency in practical application, we optimized the process by accurate matching methods and approximate matching method. Then a method was proposed to group objects by locality sensitive hashing (LSH) process before code comparison, in order to eliminate the vast majority of unrelated pairs. Experiments prove that this method could operate with less running time and less memory.展开更多
Identification of victims following a mass fatality is conducted by collecting and analysing a series of scientific identifiers and contextual information of each decedent.Recently,there has been a paradigm shift dema...Identification of victims following a mass fatality is conducted by collecting and analysing a series of scientific identifiers and contextual information of each decedent.Recently,there has been a paradigm shift demanding that this complex identification process be accelerated to meet the needs of the surviving families,politicians and even the media.Postmortem fingerprint identification is a fast and efficient means of victim identification,and through the use of new advances in technology,the digital capture of fingerprints in a disaster victim identification(DVI)setting will play a strong role.This paper provides an overview of current technology and explains how this technology can adapt to current DVI procedures.The Malaysian Airlines Flight 17(MH17)incident is a recent example of a DVI event that utilized new digital fingerprint capture technology and further demonstrates why such technology is warranted in future mass fatality operations.展开更多
Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the ant...Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the anti-collusion code is used to represent a user's fingerprint. In real-world applications, the number of potential users can be very large and hence, the used anti- collusion code should be easy to construct and have as many codewords as possible. This paper proposes a simple coded fingerprinting scheme, where the anti- collusion code is constructed with an identity matrix. The main advantage of our scheme is its simplicity, as a large number of fingerprints can easily be generated to accommodate a large number of users. To improve collusion resistance, some transformations are performed on the original fingerprint in the embedding phase and the corresponding inverse transformations are performed on the extracted sequence in the detection phase.展开更多
This paper described the principle of digitized chromatographic fingerprint spectrum and established digitized chromatographic fingerprint spectra of ten brands of Chinese famous tea by the micellar electrokinetic chr...This paper described the principle of digitized chromatographic fingerprint spectrum and established digitized chromatographic fingerprint spectra of ten brands of Chinese famous tea by the micellar electrokinetic chromatography. This work was done using a 25 mmol·L -1 sodium dodecylsulfate in a 20 mmol·L -1 borate (pH 7 0) solution as running buffer, 20 kV applied potential and detection at 280 nm. The chromatographic fingerprint spectra were digitized by the relative retention value ( α ) and the relative area ( S r), and were analyzed to identify the tea samples. In the absence of the standard samples, the present method was easy setup and inexpensive, and provided the applicable information for the quality assessment of teas.展开更多
文摘The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.
基金National High-Tech Research and Development Program of China(863 Program)(No.2007AA01Z309)
文摘In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some private files have been leaked. In this paper, we put forward a scheme for active image betrayal checking on the Intemet based on the digital fingerprint, which embeds fingerprints into privacy documents, extracts codes from the Intemet images, and then fmds out the divulged files by matching two groups of codes. Due to so many documents on the Internet, the number of times of code comparison is huge, which leads to a large running time. To overcome the deficiency in practical application, we optimized the process by accurate matching methods and approximate matching method. Then a method was proposed to group objects by locality sensitive hashing (LSH) process before code comparison, in order to eliminate the vast majority of unrelated pairs. Experiments prove that this method could operate with less running time and less memory.
文摘Identification of victims following a mass fatality is conducted by collecting and analysing a series of scientific identifiers and contextual information of each decedent.Recently,there has been a paradigm shift demanding that this complex identification process be accelerated to meet the needs of the surviving families,politicians and even the media.Postmortem fingerprint identification is a fast and efficient means of victim identification,and through the use of new advances in technology,the digital capture of fingerprints in a disaster victim identification(DVI)setting will play a strong role.This paper provides an overview of current technology and explains how this technology can adapt to current DVI procedures.The Malaysian Airlines Flight 17(MH17)incident is a recent example of a DVI event that utilized new digital fingerprint capture technology and further demonstrates why such technology is warranted in future mass fatality operations.
文摘Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the anti-collusion code is used to represent a user's fingerprint. In real-world applications, the number of potential users can be very large and hence, the used anti- collusion code should be easy to construct and have as many codewords as possible. This paper proposes a simple coded fingerprinting scheme, where the anti- collusion code is constructed with an identity matrix. The main advantage of our scheme is its simplicity, as a large number of fingerprints can easily be generated to accommodate a large number of users. To improve collusion resistance, some transformations are performed on the original fingerprint in the embedding phase and the corresponding inverse transformations are performed on the extracted sequence in the detection phase.
文摘This paper described the principle of digitized chromatographic fingerprint spectrum and established digitized chromatographic fingerprint spectra of ten brands of Chinese famous tea by the micellar electrokinetic chromatography. This work was done using a 25 mmol·L -1 sodium dodecylsulfate in a 20 mmol·L -1 borate (pH 7 0) solution as running buffer, 20 kV applied potential and detection at 280 nm. The chromatographic fingerprint spectra were digitized by the relative retention value ( α ) and the relative area ( S r), and were analyzed to identify the tea samples. In the absence of the standard samples, the present method was easy setup and inexpensive, and provided the applicable information for the quality assessment of teas.