Spelling suggestions: "subject:"fingerprint.""
11 |
Degradability of both a physical latent fingerprint and its associated extracted DNADean, Kristina. January 2009 (has links) (PDF)
Thesis (M.S.)--Southern Utah University, 2009. / Title from PDF title page. "Masters of science in Forensic Science." Includes bibliographical references (p. 31-34).
|
12 |
Isolation and characterization of repetitive DNA sequences and their use in DNA fingerprinting and the population genetics of Perna viridis (L.) (Bivalvia : Mytilidae) /Chan, May-ngor. January 1997 (has links)
Thesis (M. Phil.)--University of Hong Kong, 1998. / Includes bibliographical references (leaves 78-92).
|
13 |
Isolation and characterization of Panax Ginseng repetitive DNA sequences for DNA fingerprinting /Ho, Siu-hong. January 1998 (has links)
Thesis (M. Phil.)--University of Hong Kong, 1998. / Includes bibliographical references (leaves 93-105).
|
14 |
Statistical evaluation of mixed DNA stainsChoy, Yan-tsun. January 2009 (has links)
Thesis (M. Phil.)--University of Hong Kong, 2009. / Includes bibliographical references (leaves 80-82). Also available in print.
|
15 |
Molecular techniques for rhizobium identificationDooley, John J. January 1997 (has links)
No description available.
|
16 |
Molecular analysis of genetic variation in Irish Moiled cattleHarland, Mark January 1994 (has links)
No description available.
|
17 |
Fingerprinting Skills on Smart Speakers using Machine LearningNaraparaju, Shriti 15 June 2020 (has links)
No description available.
|
18 |
Collusion-resistant fingerprinting for multimedia in a broadcast channel environmentLuh, William 17 February 2005 (has links)
Digital fingerprinting is a method by which a copyright owner can uniquely
embed a buyer-dependent, inconspicuous serial number (representing the fingerprint)
into every copy of digital data that is legally sold. The buyer of a legal copy is
then deterred from distributing further copies, because the unique fingerprint can be
used to trace back the origin of the piracy. The major challenge in fingerprinting is
collusion, an attack in which a coalition of pirates compare several of their uniquely
fingerprinted copies for the purpose of detecting and removing the fingerprints.
The objectives of this work are two-fold. First, we investigate the need for robustness
against large coalitions of pirates by introducing the concept of a malicious
distributor that has been overlooked in prior work. A novel fingerprinting code that
has superior codeword length in comparison to existing work under this novel malicious
distributor scenario is developed. In addition, ideas presented in the proposed
fingerprinting design can easily be applied to existing fingerprinting schemes, making
them more robust to collusion attacks.
Second, a new framework termed Joint Source Fingerprinting that integrates the
processes of watermarking and codebook design is introduced. The need for this new
paradigm is motivated by the fact that existing fingerprinting methods result in a
perceptually undistorted multimedia after collusion is applied. In contrast, the new
paradigm equates the process of collusion amongst a coalition of pirates, to degrading
the perceptual characteristics, and hence commercial value of the multimedia in question.
Thus by enforcing that the process of collusion diminishes the commercial value
of the content, the pirates are deterred from attacking the fingerprints. A fingerprinting
algorithm for video as well as an efficient means of broadcasting or distributing
fingerprinted video is also presented. Simulation results are provided to verify our
theoretical and empirical observations.
|
19 |
Epidemiological typing of Listeria monocytogenesRidley, Anne McAlpine January 1996 (has links)
No description available.
|
20 |
A molecular examination of some enigmatic birdsDawson, Robert J. G. January 1992 (has links)
No description available.
|
Page generated in 0.0708 seconds