نتایج جستجو برای: tamper
تعداد نتایج: 2422 فیلتر نتایج به سال:
This paper describes the operation of a demonstrator of the authentication/tamper detection system proposed in [1] for surveillance systems. The demonstrator consists of three parts. The first captures images, calculates and embeds authentication data, then compresses and records the images to hard disk. The second provides means to tamper a selection of recorded images, and the third checks th...
In supply chains, it is important to preserve the integrity of a product as it is travels through the channel of distribution and is delivered to the final consumer. In absence of a secure mechanism, adversaries can manipulate supply chains to tamper with or introduce fake components. To mitigate this threat, we propose a novel architecture for preserving the integrity of the supply chain infor...
The paper proposes a method for tamper proofing digital images using the technique of digital watermarking. Many a times the published images are subject to tampering to an extent that the facts conveyed in the original image are distorted. The mechanism presented here describes a method for detecting the regions in image that were subject to illegal modifications. The method also can detect th...
We provide a theoretical notion of white-box security for protecting the integrity and privacy of mobile programs. We assume that protecting the program’s semantic privacy will improve the integrity protection of a program, thereby improving tamper resistance and the protection of secret algorithms. We introduce this notion using a Random Oracle Model and describe our important concept of a ran...
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, code obfuscation, and tamper detection. In this paper we present a novel dynamic software watermarking algorithm which incorporates ideas from code obfuscation and tamper detection. Our technique simultaneously provid...
We propose a tamper-evident storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by outof-plane magnetisation of individual magnetic dots. We report on measurements showing that in principle the medium also supports a separate class of write-once operation that destroys the out-of-plane magnetisation property of the dots irrev...
We present a tamper-proof and lightweight challenge-response authentication scheme based on 2-level noisy Physically Unclonable Functions (PUF). We present a security reduction, which shows the scheme to be secure against passive attacks provided that it is hard to learn a threshold of halfspaces under the uniform distribution. Furthermore, we provide an extensive analysis of PUFs. In particula...
This paper proposes a novel pixel wise fragile watermarking scheme in spatial domain by which one can effectively locate the tamper in every pixel of the images accurately and scheme is also protected by user defined secret key which is given explicitly. Proposed watermarking algorithms has good PSNR value and have less complexity of algorithms. Proposed algorithms can also work on color images...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید