نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

2010
Gideon Myles Hongxia Jin

The increase use of software tamper resistance techniques to protect software against undesired attacks comes an increased need to understand more about the strength of these tamper resistance techniques. Currently the understanding is rather general. In this paper we propose a new software tamper resistance evaluation technique. Our main contribution is to identify a set of issues that a tampe...

Journal: :IACR transactions on cryptographic hardware and embedded systems 2023

The threat of chip-level tampering and its detection has been widely researched. Hardware Trojan insertions are prominent examples such tamper events. Altering the placement routing a design or removing part circuit for side-channel leakage/fault sensitivity amplification other instances attacks. While semi- fully-invasive physical verification methods can confidently detect stealthy events, th...

Journal: :IJDCF 2015
Fan Zhang Zhenghui Liu Hongxia Wang

Watermark schemes content-based provide one way to solve the veracity and integrity of speech content. Some existed content-based schemes are vulnerable to feature-analysed substitution attack. Aiming to solve the problems, a secure speech content authentication algorithm is proposed, on the basic of the undeterminate angle of discrete fractional fourier transform. In the paper, the definition ...

2012
Kanchan K. Doke S. M. Patil

Image authentication techniques have recently gained great attention due to its importance for a large number of multimedia applications. Digital images are increasingly transmitted over non-secure channels such as the Internet. Therefore, military, medical and quality control images must be protected against attempts to manipulate them; such manipulations could tamper the decisions based on th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید