نتایج جستجو برای: tamper detection
تعداد نتایج: 567946 فیلتر نتایج به سال:
The increase use of software tamper resistance techniques to protect software against undesired attacks comes an increased need to understand more about the strength of these tamper resistance techniques. Currently the understanding is rather general. In this paper we propose a new software tamper resistance evaluation technique. Our main contribution is to identify a set of issues that a tampe...
The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan insertions are prominent examples such tamper events. Altering the placement routing a design or removing part circuit for side-channel leakage/fault sensitivity amplification other instances attacks. While semi- fully-invasive physical verification methods can confidently detect stealthy events, th...
Watermark schemes content-based provide one way to solve the veracity and integrity of speech content. Some existed content-based schemes are vulnerable to feature-analysed substitution attack. Aiming to solve the problems, a secure speech content authentication algorithm is proposed, on the basic of the undeterminate angle of discrete fractional fourier transform. In the paper, the definition ...
Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on th...
High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید