Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[BOK][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
[BOK][B] Algebraic geometry in coding theory and cryptography
H Niederreiter, C **ng - 2009 - books.google.com
This textbook equips graduate students and advanced undergraduates with the necessary
theoretical tools for applying algebraic geometry to information theory, and it covers primary …
theoretical tools for applying algebraic geometry to information theory, and it covers primary …
On anti-collusion codes and detection algorithms for multimedia fingerprinting
Multimedia fingerprinting is an effective technique to trace the sources of pirate copies of
copyrighted multimedia information. AND anti-collusion codes can be used to construct …
copyrighted multimedia information. AND anti-collusion codes can be used to construct …
Towards a privacy protection-capable noise fingerprinting for numerically aggregated data
Y Hu, A Hu, C Li, P Li, C Zhang - Computers & Security, 2022 - Elsevier
Privacy protection and traitor tracing have always been two separate research subjects.
Meanwhile, digital fingerprinting, which tracks illegally distributed digital media by creating a …
Meanwhile, digital fingerprinting, which tracks illegally distributed digital media by creating a …
Signature codes for weighted binary adder channel and multimedia fingerprinting
In this paper, we study binary signature codes for the weighted binary adder channel
(WbAC) and collusion-resistant multimedia fingerprinting. Let A (n, t) denote the maximum …
(WbAC) and collusion-resistant multimedia fingerprinting. Let A (n, t) denote the maximum …
On generalized separating hash families
On generalized separating hash families Page 1 Journal of Combinatorial Theory, Series A 115
(2008) 105–120 www.elsevier.com/locate/jcta On generalized separating hash families DR …
(2008) 105–120 www.elsevier.com/locate/jcta On generalized separating hash families DR …
Algebraic geometry codes and some applications
A Couvreur… - Concise encyclopedia of …, 2021 - api.taylorfrancis.com
Concise Encyclopedia of Coding Theory Page 1 Chapter 15 Algebraic Geometry Codes
and Some Applications Alain Couvreur Inria and LIX, Ecole Polytechnique Hugues …
and Some Applications Alain Couvreur Inria and LIX, Ecole Polytechnique Hugues …
Separable codes
Multimedia fingerprinting is an effective technique to trace the sources of pirate copies of
copyrighted multimedia information. Separable codes can be used to construct fingerprints …
copyrighted multimedia information. Separable codes can be used to construct fingerprints …
Torsion limits and Riemann-Roch systems for function fields and applications
The Ihara limit (or constant) has been a central problem of study in the asymptotic theory of
global function fields (or equivalently, algebraic curves over finite fields). It addresses global …
global function fields (or equivalently, algebraic curves over finite fields). It addresses global …
Probabilistic existence results for separable codes
SR Blackburn - IEEE Transactions on Information Theory, 2015 - ieeexplore.ieee.org
Separable codes were defined by Cheng and Miao in 2011, motivated by applications to the
identification of pirates in a multimedia setting. Combinatorially, t̅-separable codes lie …
identification of pirates in a multimedia setting. Combinatorially, t̅-separable codes lie …