We consider the problem of content identification and authentication based on digital content fingerprinting. Contrary to existing work in which the performance of these systems under blind attacks is analysed, we investigate the information-theoretic performance under informed attacks. In the case of binary content fingerprinting, in a blind attack, a probe is produced at random independently from the fingerprints of the original contents. Contrarily, informed attacks assume that the attacker might have some information about the original content and is thus able to produce a counterfeit probe that is related to an authentic fingerprint corresponding to an original item, thus leading to an increased probability of false acceptance. We demo...
Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in the...
Leakage of a document distributed among a set of authorized recipients may result in violation of co...
Fingerprinting of data is a method to embed a traceable marker into the data to identify which speci...
In recent years, content identification based on digital fingerprinting attracts a lot of attention ...
In recent years, content identification based on digital fingerprinting attracts a lot of attention ...
Privacy amplification of content identification based on fingerprint bit reliability VOLOSHYNOVSKYY,...
Digital content fingerprinting has emerged as a possible technique for fast, robust and privacy-pres...
International audienceDigital fingerprints are being used more and more to secure applications for l...
In this paper we consider the problem of document authentication in electronic and printed forms. We...
The growing availability of cheap and reliable fingerprint acquisition scanners is resulting in an i...
The widespread adoption of encrypted communications (e.g., the TLS protocol, the Tor anonymity netwo...
In this paper, we consider an item authentication using unclonable forensic features of item surface...
In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protec...
In many problems such as biometrics, multimedia search, retrieval, recommendation systems requiring ...
With the advent of the deep learning era, Fingerprint-based Authentication Systems (FAS) equipped wi...
Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in the...
Leakage of a document distributed among a set of authorized recipients may result in violation of co...
Fingerprinting of data is a method to embed a traceable marker into the data to identify which speci...
In recent years, content identification based on digital fingerprinting attracts a lot of attention ...
In recent years, content identification based on digital fingerprinting attracts a lot of attention ...
Privacy amplification of content identification based on fingerprint bit reliability VOLOSHYNOVSKYY,...
Digital content fingerprinting has emerged as a possible technique for fast, robust and privacy-pres...
International audienceDigital fingerprints are being used more and more to secure applications for l...
In this paper we consider the problem of document authentication in electronic and printed forms. We...
The growing availability of cheap and reliable fingerprint acquisition scanners is resulting in an i...
The widespread adoption of encrypted communications (e.g., the TLS protocol, the Tor anonymity netwo...
In this paper, we consider an item authentication using unclonable forensic features of item surface...
In this paper, we compare two methods that can be used by the anti-counterfeiting industry to protec...
In many problems such as biometrics, multimedia search, retrieval, recommendation systems requiring ...
With the advent of the deep learning era, Fingerprint-based Authentication Systems (FAS) equipped wi...
Digital fingerprinting is a technique that consists of inserting the ID of an authorized user in the...
Leakage of a document distributed among a set of authorized recipients may result in violation of co...
Fingerprinting of data is a method to embed a traceable marker into the data to identify which speci...