Sorry, you need to enable JavaScript to visit this website.


Content Fingerprinting and Security


Over the last decade, baseline indexing techniques have been refurbished under the code name "content fingerprinting" when deployed in the context of security applications. In the first part of the talk, the speaker will detail the collection of security-related applications where content fingerprints have been exploited, including IP theft detection, audience measurement, traffic monitoring, forgery detection, etc. In the second part, he will discuss the unique technical challenges raised by the presence of a possibly hostile adversary in the ecosystem.

0 users have voted:

Paper Details

Submitted On:
23 February 2016 - 1:43pm
Short Link:
Presentation Slides

Document Files




[1] , "Content Fingerprinting and Security", IEEE SigPort, 2015. [Online]. Available: Accessed: Jun. 02, 2020.
url = {},
author = { },
publisher = {IEEE SigPort},
title = {Content Fingerprinting and Security},
year = {2015} }
T1 - Content Fingerprinting and Security
AU -
PY - 2015
PB - IEEE SigPort
UR -
ER -
. (2015). Content Fingerprinting and Security. IEEE SigPort.
, 2015. Content Fingerprinting and Security. Available at:
. (2015). "Content Fingerprinting and Security." Web.
1. . Content Fingerprinting and Security [Internet]. IEEE SigPort; 2015. Available from :