- Applied mathematics
- >
- Theoretical computer science
- >
- Algorithms
- >
- Fingerprinting algorithms

- Fields of mathematics
- >
- Applied mathematics
- >
- Algorithms
- >
- Fingerprinting algorithms

- Fields of mathematics
- >
- Mathematical logic
- >
- Algorithms
- >
- Fingerprinting algorithms

- Philosophy of mathematics
- >
- Mathematical logic
- >
- Algorithms
- >
- Fingerprinting algorithms

Digital video fingerprinting

Video fingerprinting or video hashing are a class of dimension reduction techniques in which a system identifies, extracts, and then summarizes characteristic components of a video as a unique or a se

Public key fingerprint

In public-key cryptography, a public key fingerprint is a short sequence of bytes used to identify a longer public key. Fingerprints are created by applying a cryptographic hash function to a public k

TCP/IP stack fingerprinting

TCP/IP stack fingerprinting is the remote detection of the characteristics of a TCP/IP stack implementation. The combination of parameters may then be used to infer the remote machine's operating syst

Rabin fingerprint

The Rabin fingerprinting scheme is a method for implementing fingerprints using polynomials over a finite field. It was proposed by Michael O. Rabin.

Acoustic fingerprint

An acoustic fingerprint is a condensed digital summary, a fingerprint, deterministically generated from an audio signal, that can be used to identify an audio sample or quickly locate similar items in

Device fingerprint

A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimila

Canvas fingerprinting

Canvas fingerprinting is one of a number of browser fingerprinting techniques for tracking online users that allow websites to identify and track visitors using the HTML5 canvas element instead of bro

Fingerprint (computing)

In computer science, a fingerprinting algorithm is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its fingerprint, that uniquely identifie

© 2023 Useful Links.