15,054 research outputs found

    Multimedia Protection using Content and Embedded Fingerprints

    Get PDF
    Improved digital connectivity has made the Internet an important medium for multimedia distribution and consumption in recent years. At the same time, this increased proliferation of multimedia has raised significant challenges in secure multimedia distribution and intellectual property protection. This dissertation examines two complementary aspects of the multimedia protection problem that utilize content fingerprints and embedded collusion-resistant fingerprints. The first aspect considered is the automated identification of multimedia using content fingerprints, which is emerging as an important tool for detecting copyright violations on user generated content websites. A content fingerprint is a compact identifier that captures robust and distinctive properties of multimedia content, which can be used for uniquely identifying the multimedia object. In this dissertation, we describe a modular framework for theoretical modeling and analysis of content fingerprinting techniques. Based on this framework, we analyze the impact of distortions in the features on the corresponding fingerprints and also consider the problem of designing a suitable quantizer for encoding the features in order to improve the identification accuracy. The interaction between the fingerprint designer and a malicious adversary seeking to evade detection is studied under a game-theoretic framework and optimal strategies for both parties are derived. We then focus on analyzing and understanding the matching process at the fingerprint level. Models for fingerprints with different types of correlations are developed and the identification accuracy under each model is examined. Through this analysis we obtain useful guidelines for designing practical systems and also uncover connections to other areas of research. A complementary problem considered in this dissertation concerns tracing the users responsible for unauthorized redistribution of multimedia. Collusion-resistant fingerprints, which are signals that uniquely identify the recipient, are proactively embedded in the multimedia before redistribution and can be used for identifying the malicious users. We study the problem of designing collusion resistant fingerprints for embedding in compressed multimedia. Our study indicates that directly adapting traditional fingerprinting techniques to this new setting of compressed multimedia results in low collusion resistance. To withstand attacks, we propose an anti-collusion dithering technique for embedding fingerprints that significantly improves the collusion resistance compared to traditional fingerprints

    Acquisition and retention of DNA and fingerprint data in Scotland

    Get PDF
    This review examines the current legislation and practices in relation to the acquisition and retention of fingerprint and DNA data in Scotland. Three main issues were under consideration: given that law and practice in relation to DNA and fingerprints differs, should these be brought into line? For those who have criminal proceedings initiated against them for relevant sexual or violent offences but are not convicted; is the current regime for temporary retention of samples appropriate and effective? In relation to individuals who are dealt with by Children's Hearings for relevant sexual or violent offences, is the current law (which does not provide for the sampling or retention of forensic data) appropriate

    China Employment Law Update - February 2017

    Get PDF
    In This Issue: China Makes Two Major Moves in Its Social Insurance System Government Announces Policy to Fingerprint Foreigners Entering China Government Signals Intent to Change Laws to Improve Workplace Safety Government Working on Various Measures to Further Develop Data Privacy Protections Guangdong, Tianjin and Jiangsu enhance protections for female employees Zhejiang Province high court provides guidance on numerous labor dispute issues Former Employee Ordered to Publicly Apologize and Pay Legal Costs for Defaming Employer Shanghai Court Upholds Termination of Senior Executive with Large Personal Debt Chongqing Court Holds Two Employees Partly Liable for Their Employer\u27s Losses from Sca

    Performing the Union: the Prüm Decision and the European dream

    Get PDF
    In 2005, seven European countries signed the so-called Prüm Treaty to increase transnational collaboration in combating international crime, terrorism and illegal immigration. Three years later, the Treaty was adopted into EU law. EU member countries are obliged to have systems in place to allow authorities of other member states access to nationally held data on DNA, fingerprints, and vehicles by August 2011. In this paper, we discuss the conditions of possibility for the Prüm network to emerge, and argue that rather than a linear story of technological and political convergence and harmonisation, the (hi)story of Prüm is heterogeneous and patchy. This is reflected also in the early stages of implementing the Prüm Decision which proves to be more difficult than it was hoped by the drivers of the Prüm process. In this sense, the Prüm network sits uncomfortably with success stories of forensic science (many of which served the goal of justifying the expansion of technological and surveillance systems). Instead of telling a story of heroic science, the story of Prüm articulates the European dream: One in which goods, services, and people live and travel freely and securely

    Biometric technologies in schools : draft guidance for education authorities

    Get PDF
    • …
    corecore