期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
WEIGHTED ALGORITHM FOR FINGERPRINTING RELATIONAL DATABASES 被引量:1
1
作者 崔新春 秦小麟 +1 位作者 管致锦 束瑜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期148-154,共7页
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei... The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm. 展开更多
关键词 digital fingerprinting relational database systems copyright protection attribute weight traitor tracing
下载PDF
Image Betrayal Checking Based on the Digital Fingerprint of Images on the Internet
2
作者 余永升 陈晓苏 《Journal of Southwest Jiaotong University(English Edition)》 2010年第2期149-159,共11页
In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some... In the Internet environment, documents are easily leaked, and divulged files spread rapidly. Therefore, it is important for privacy institutions to actively check the documents on the Internet to find out whether some private files have been leaked. In this paper, we put forward a scheme for active image betrayal checking on the Intemet based on the digital fingerprint, which embeds fingerprints into privacy documents, extracts codes from the Intemet images, and then fmds out the divulged files by matching two groups of codes. Due to so many documents on the Internet, the number of times of code comparison is huge, which leads to a large running time. To overcome the deficiency in practical application, we optimized the process by accurate matching methods and approximate matching method. Then a method was proposed to group objects by locality sensitive hashing (LSH) process before code comparison, in order to eliminate the vast majority of unrelated pairs. Experiments prove that this method could operate with less running time and less memory. 展开更多
关键词 Betrayal checking digital watermarking digital fingerprint Locality sensitive hashing (LSH)
下载PDF
Digital capture of fingerprints in a disaster victim identification setting:a review and case study 被引量:3
3
作者 Bryan T.Johnson John A.J.M.Riemen 《Forensic Sciences Research》 CSCD 2019年第4期293-302,共10页
Identification of victims following a mass fatality is conducted by collecting and analysing a series of scientific identifiers and contextual information of each decedent.Recently,there has been a paradigm shift dema... Identification of victims following a mass fatality is conducted by collecting and analysing a series of scientific identifiers and contextual information of each decedent.Recently,there has been a paradigm shift demanding that this complex identification process be accelerated to meet the needs of the surviving families,politicians and even the media.Postmortem fingerprint identification is a fast and efficient means of victim identification,and through the use of new advances in technology,the digital capture of fingerprints in a disaster victim identification(DVI)setting will play a strong role.This paper provides an overview of current technology and explains how this technology can adapt to current DVI procedures.The Malaysian Airlines Flight 17(MH17)incident is a recent example of a DVI event that utilized new digital fingerprint capture technology and further demonstrates why such technology is warranted in future mass fatality operations. 展开更多
关键词 Forensic sciences disaster victim identification postmortem fingerprints digital fingerprint capture INTERPOL DVI ridgeology
原文传递
A simple fingerprinting scheme for large user groups 被引量:2
4
作者 Defa HU Qiaoliang LI 《Frontiers of Computer Science》 SCIE EI CSCD 2011年第2期163-168,共6页
Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the ant... Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the anti-collusion code is used to represent a user's fingerprint. In real-world applications, the number of potential users can be very large and hence, the used anti- collusion code should be easy to construct and have as many codewords as possible. This paper proposes a simple coded fingerprinting scheme, where the anti- collusion code is constructed with an identity matrix. The main advantage of our scheme is its simplicity, as a large number of fingerprints can easily be generated to accommodate a large number of users. To improve collusion resistance, some transformations are performed on the original fingerprint in the embedding phase and the corresponding inverse transformations are performed on the extracted sequence in the detection phase. 展开更多
关键词 digital fingerprinting digital copyright pro-tection identity matrix collusion resistance
原文传递
Study of Tea Digitized Chromatographic Fingerprint Spectra Using Micellar Electrokinetic Chromatography 被引量:3
5
作者 宋冠群 林金明 +1 位作者 屈锋 董文举 《Chinese Journal of Chemistry》 SCIE CAS CSCD 2003年第10期1325-1329,共5页
This paper described the principle of digitized chromatographic fingerprint spectrum and established digitized chromatographic fingerprint spectra of ten brands of Chinese famous tea by the micellar electrokinetic chr... This paper described the principle of digitized chromatographic fingerprint spectrum and established digitized chromatographic fingerprint spectra of ten brands of Chinese famous tea by the micellar electrokinetic chromatography. This work was done using a 25 mmol·L -1 sodium dodecylsulfate in a 20 mmol·L -1 borate (pH 7 0) solution as running buffer, 20 kV applied potential and detection at 280 nm. The chromatographic fingerprint spectra were digitized by the relative retention value ( α ) and the relative area ( S r), and were analyzed to identify the tea samples. In the absence of the standard samples, the present method was easy setup and inexpensive, and provided the applicable information for the quality assessment of teas. 展开更多
关键词 tealeaves micellar electrokinetic chromatography digitized chromatographic fingerprint spectrum quality assessment
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部