Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Fingerprint hash function

This scheme is introduced in [4, 8], and also used in [7]. It differs from the basic scheme in the preprocessing and hiding operations. A secure hash function is applied to the signature before embedding, in order to reduce its size. The locations of the embedded CLBs are also fingerprinted with the identity of the user in order to trace back the origin of mis-appropriation. Additional hiding operations are also put in. [Pg.9]

Mathematical hashing function to create a fixed-length fingerprint Encrypt the fingerprint with signer s public key... [Pg.350]


See other pages where Fingerprint hash function is mentioned: [Pg.82]    [Pg.901]    [Pg.378]    [Pg.577]    [Pg.349]    [Pg.529]    [Pg.104]    [Pg.82]    [Pg.141]    [Pg.348]    [Pg.144]    [Pg.235]    [Pg.96]    [Pg.739]    [Pg.253]    [Pg.676]    [Pg.174]    [Pg.253]    [Pg.753]    [Pg.73]   
See also in sourсe #XX -- [ Pg.95 ]




SEARCH



Fingerprint

Fingerprint hashed

Fingerprinting

Hash function

Hashing

Hashing function

© 2024 chempedia.info