Sciweavers

126 search results - page 6 / 26
» Computational Forensic Techniques for Intellectual Property ...
Sort
View
CCS
2007
ACM
13 years 11 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
DAC
2001
ACM
14 years 8 months ago
Watermarking of SAT using Combinatorial Isolation Lemmas
Watermarking of hardware and software designs is an effective mechanism for intellectual property protection (IPP). Two important criteria for watermarking schemes are credibility...
Rupak Majumdar, Jennifer L. Wong
IH
1998
Springer
13 years 11 months ago
Fingerprinting Digital Circuits on Programmable Hardware
Advanced CAD tools and high-density VLSI technologies have combined to create a new market for reusable digital designs. The economic viability of the new core-based design paradig...
John Lach, William H. Mangione-Smith, Miodrag Potk...
WCE
2007
13 years 8 months ago
A VC-Based Copyright Protection Scheme for Digital Images of Multi-Authorship
—Digital watermarking is a technique for protecting intellectual property of digital information. However, when a work is created by multiple authors, digital watermarking may su...
Shu-Fen Tu, Ching-Sheng Hsu
MUE
2008
IEEE
143views Multimedia» more  MUE 2008»
14 years 1 months ago
A Robust Watermark Scheme for Copyright Protection
In this paper, we propose a robust watermark technology that can be used to protect copyright. We enhance robustness of the watermark such that it can be used to protect the intel...
Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Ya...