نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
We show a general framework for constructing non-malleable codes against tampering families with average-case hardness bounds. Our framework adapts ideas from the Naor-Yung double encryption paradigm such that to protect against tampering in a class F , it suffices to have average-case hard distributions for the class, and underlying primitives (encryption and non-interactive, simulatable proof...
Image hashing is an effective approach to image authentication. In this paper, a geometric distortioninvariant image hashing scheme, which can detect and locate the tampering, is proposed. The reported scheme performs Polar Complex Exponential Transform (PCET) on an image, and then the magnitudes and the phases of PCETs are combined to generate a set of rotation and scaling invariant features. ...
We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers that may tamper with each bit of the honest parties’ random tape with probability p, but have to do so in an “online” fashion. We present both positive and negative results: • Negative Results: Any s...
We show a general framework for constructing non-malleable codes against tampering families with average-case hardness bounds. Our framework adapts ideas from the Naor-Yung double encryption paradigm such that to protect against tampering in a class F , it suffices to have average-case hard distributions for the class, and underlying primitives (encryption and non-interactive, simulatable proof...
Digital Image Authentication has become a very important research area. Digital images can be altered easily using freely available image editing softwares. Many a times, it becomes impossible to ascertain the authentic image from the tampered image. These tampered images can be created by using graphical softwares, or can be manipulated simply by changing the content and context of the image. ...
A non-malleable encoding scheme is a keyless encoding scheme which is resilient to tampering attacks. Such a scheme is said to be continuously secure if the scheme is resilient to attacks containing more than one tampering procedure. Also, such a scheme is said to have tamper-detection property if any kind of tampering attack is detected. In [S. Faust, et al., Continuous nonmalleable codes, TCC...
A desirable feature in smart cameras is the ability to autonomously detect any tampering event/attack that would prevent a clear view over the monitored scene. No matter whether tampering is due to atmospheric phenomena (e.g., few rain drops over the camera lens) or to malicious attacks (e.g., occlusions or device displacements), these have to be promptly detected to possibly activate counterme...
The detection of the presence of tampered images is of significant importance in digital forensics. The problem with image tampering detection is the vast number of features that are currently available in the literature. It is very challenging to determine the best features to correctly characterise these images. This paper proposes a hybrid evolutionary framework to perform a quantitative stu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید