Sciweavers

240 search results - page 27 / 48
» From fingerprint to writeprint
Sort
View
INFSOF
2010
113views more  INFSOF 2010»
13 years 8 months ago
Package Fingerprints: A visual summary of package interface usage
Context: Object-oriented languages such as Java, Smalltalk, and C++ structure their programs using packages. Maintainers of large systems need to understand how packages relate to...
Hani Abdeen, Stéphane Ducasse, Damien Polle...
TIFS
2010
144views more  TIFS 2010»
13 years 8 months ago
Forensic detection of image manipulation using statistical intrinsic fingerprints
—As the use of digital images has increased, so has the means and the incentive to create digital image forgeries. Accordingly, there is a great need for digital image forensic t...
Matthew C. Stamm, K. J. Ray Liu
TMM
2011
146views more  TMM 2011»
13 years 4 months ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
SIGCOMM
2012
ACM
12 years 10 days ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
TIP
2010
107views more  TIP 2010»
13 years 4 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu