Detecting tampering in a random hypercube

نویسنده

  • Ross Pinsky
چکیده

Consider the random hypercube H 2 (pn) obtained from the hypercube H n 2 by deleting any given edge with probabilty 1− pn, independently of all the other edges. A diameter path in H 2 is a longest geodesic path in H n 2 . Consider the following two ways of tampering with the random graph H 2 (pn): (i) choose a diameter path at random and adjoin all of its edges to H 2 (pn); (ii) choose a diameter path at random from among those that start at 0 = (0, · · · , 0), and adjoin all of its edges to H 2 (pn). We study the question of whether these tamperings are detectable asymptotically as n→∞.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dropping and Tampering Detection in Sensor Networks : Enhancing Data Reliability

Achieving communication dependability in Sensor networks is difficult due to limitations on node power and wireless channel unreliability. This problem is further compounded by hard-to-detect attacks such as data-report tampering by malicious Cluster Heads, and dropping of data-reports by intermediate nodes en route from the CH to the Base Station (BS). Detecting these attacks coupled with node...

متن کامل

A New Parallel Matrix Multiplication Method Adapted on Fibonacci Hypercube Structure

The objective of this study was to develop a new optimal parallel algorithm for matrix multiplication which could run on a Fibonacci Hypercube structure. Most of the popular algorithms for parallel matrix multiplication can not run on Fibonacci Hypercube structure, therefore giving a method that can be run on all structures especially Fibonacci Hypercube structure is necessary for parallel matr...

متن کامل

Detecting tampering in audio-visual content using QIM watermarking

This paper presents a framework for detecting tampered information in digital audio-visual content. The proposed framework uses a combination of temporal and spatial watermarks that do not decrease the quality of host videos. A modified version of the Quantization Index Modulation (QIM) algorithm is used to embed watermarks. The fragility of the QIM watermarking algorithm makes it possible to d...

متن کامل

Using noise inconsistencies for blind image forensics

A commonly used tool to conceal the traces of tampering is the addition of locally random noise to the altered image regions. The noise degradation is the main cause of failure of many active or passive image forgery detection methods. Typically, the amount of noise is uniform across the entire authentic image. Adding locally random noise may cause inconsistencies in the image’s noise. Therefor...

متن کامل

Detecting General Algebraic Manipulation Attacks

Algebraic manipulation detection codes are a class of error detecting codes which have found numerous applications in cryptography. In this paper we extend these codes to defeat general algebraic attacks we call such codes general algebraic manipulation detection (GAMD) codes. Positive results are shown for the existence of GAMDs for the families of tampering functions corresponding to point ad...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013