digital fingerprinting
Recently Published Documents


TOTAL DOCUMENTS

80
(FIVE YEARS 8)

H-INDEX

5
(FIVE YEARS 1)

Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7647
Author(s):  
Mehvish Fatima ◽  
Muhammad Wasif Nisar ◽  
Junaid Rashid ◽  
Jungeun Kim ◽  
Muhammad Kamran ◽  
...  

With the emerging growth of digital data in information systems, technology faces the challenge of knowledge prevention, ownership rights protection, security, and privacy measurement of valuable and sensitive data. On-demand availability of various data as services in a shared and automated environment has become a reality with the advent of cloud computing. The digital fingerprinting technique has been adopted as an effective solution to protect the copyright and privacy of digital properties from illegal distribution and identification of malicious traitors over the cloud. Furthermore, it is used to trace the unauthorized distribution and the user of multimedia content distributed through the cloud. In this paper, we propose a novel fingerprinting technique for the cloud environment to protect numeric attributes in relational databases for digital privacy management. The proposed solution with the novel fingerprinting scheme is robust and efficient. It can address challenges such as embedding secure data over the cloud, essential to secure relational databases. The proposed technique provides a decoding accuracy of 100%, 90%, and 40% for 10% to 30%, 40%, and 50% of deleted records.


2021 ◽  
Vol 58 (1) ◽  
pp. 2713-2718
Author(s):  
Abdullayev Rustam, Ganiyev Otabek

High technologies at the present stage of development of the world community have penetrated into all spheres of human activity. Considering the issue of digital methods of crime investigation, of course, forensic experts are faced with problems of their effectiveness. Today, most Western countries in the investigation of crimes use fingerprint examination, using technology, thereby reducing the time of investigation, ensuring efficiency. And yet, not all forensic specialists use these techniques when taking fingerprints, relying on the reliability and the usual proven practice of the classical method of fingerprinting. As you know, in the countries of the post-Soviet space, this method was used on the basis of scientific approaches developed by such scientists as E. Henry, A. Bertillon, G. Gross, E. Locard, etc. For example, the work of E. Henry formed the basis for fingerprint registration, since the scientific approach to the biological process of damage and restoration of the epidermis during the investigation of a crime, it is necessary to attach special importance, since papillary lines also have the property of recoverability. If the dermis is damaged, then the pattern is not restored in such an area. But the scars that appear at the same time, the scars themselves become the hallmarks of the pattern. For a century, forensic scientists have studied the sweat marks of handprints for identification, since each fingerprint is different. In this analytical article, the authors made an attempt to conduct an analytical review of the implementation practices of digital fingerprinting in different countries and study the extent to which the effectiveness of its application is possible.


Computers ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 26 ◽  
Author(s):  
David Megías ◽  
Minoru Kuribayashi ◽  
Amna Qureshi

Copyright protection is one of the most relevant challenges in the network society. This paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source of an illegal redistribution, making it possible for the copyright holder to take legal action in case of copyright violation. The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting. After analyzing those solutions, a discussion is carried out to highlight the properties and the limitations of those techniques. Finally, some directions for further research on this topic are suggested.


Author(s):  
Penying Rochanakul

Frameproof codes were first introduced by Boneh and Shaw in 1998 in the context of digital fingerprinting to protect copyrighted materials. These digital fingerprints are generally denoted as codewords in Qn, where Q is an alphabet of size q and n is a positive integer. A 2-frameproof code is a code C such that any 2 codewords in C cannot form a new codeword under a particular rule. Thus, no pair of users can frame a user who is not a member of the coalition. This paper concentrates on the upper bound for the size of a q-ary 2-frameproof code of length 4. Our new upper bound shows that C≤2q2−2q+1 when q is odd and q>10.


Sensors ◽  
2019 ◽  
Vol 19 (14) ◽  
pp. 3033 ◽  
Author(s):  
Claudia Pop ◽  
Marcel Antal ◽  
Tudor Cioara ◽  
Ionut Anghel ◽  
David Sera ◽  
...  

Nowadays, it has been recognized that blockchain can provide the technological infrastructure for developing decentralized, secure, and reliable smart energy grid management systems. However, an open issue that slows the adoption of blockchain technology in the energy sector is the low scalability and high processing overhead when dealing with the real-time energy data collected by smart energy meters. Thus, in this paper, we propose a scalable second tier solution which combines the blockchain ledger with distributed queuing systems and NoSQL (Not Only SQL database) databases to allow the registration of energy transactions less frequently on the chain without losing the tamper-evident benefits brought by the blockchain technology. At the same time, we propose a technique for tamper-evident registration of smart meters’ energy data and associated energy transactions using digital fingerprinting which allows the energy transaction to be linked hashed-back on-chain, while the sensors data is stored off-chain. A prototype was implemented using Ethereum and smart contracts for the on-chain components while for the off-chain components we used Cassandra database and RabbitMQ messaging broker. The prototype proved to be effective in managing a settlement of energy imbalances use-case and during the evaluation conducted in simulated environment shows promising results in terms of scalability, throughput, and tampering of energy data sampled by smart energy meters.


10.2196/11541 ◽  
2018 ◽  
Vol 20 (11) ◽  
pp. e11541 ◽  
Author(s):  
Elizabeth B White ◽  
Amanda J Meyer ◽  
Joseph M Ggita ◽  
Diana Babirye ◽  
David Mark ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document