Sorry, you need to enable JavaScript to visit this website.

facebooktwittermailshare

Content Fingerprinting and Security

Abstract: 

Over the last decade, baseline indexing techniques have been refurbished under the code name "content fingerprinting" when deployed in the context of security applications. In the first part of the talk, the speaker will detail the collection of security-related applications where content fingerprints have been exploited, including IP theft detection, audience measurement, traffic monitoring, forgery detection, etc. In the second part, he will discuss the unique technical challenges raised by the presence of a possibly hostile adversary in the ecosystem.

up
0 users have voted:

Paper Details

Authors:
Submitted On:
23 February 2016 - 1:43pm
Short Link:
Type:
Presentation Slides

Document Files

MMSP_overviewTalk.pdf

(393 downloads)

Subscribe

[1] , "Content Fingerprinting and Security", IEEE SigPort, 2015. [Online]. Available: http://sigport.org/231. Accessed: Jun. 18, 2018.
@article{231-15,
url = {http://sigport.org/231},
author = { },
publisher = {IEEE SigPort},
title = {Content Fingerprinting and Security},
year = {2015} }
TY - EJOUR
T1 - Content Fingerprinting and Security
AU -
PY - 2015
PB - IEEE SigPort
UR - http://sigport.org/231
ER -
. (2015). Content Fingerprinting and Security. IEEE SigPort. http://sigport.org/231
, 2015. Content Fingerprinting and Security. Available at: http://sigport.org/231.
. (2015). "Content Fingerprinting and Security." Web.
1. . Content Fingerprinting and Security [Internet]. IEEE SigPort; 2015. Available from : http://sigport.org/231