نتایج جستجو برای: tampering

تعداد نتایج: 1480  

Journal: :IACR Cryptology ePrint Archive 2017
Marshall Ball Dana Dachman-Soled Mukul Kulkarni Tal Malkin

We show a general framework for constructing non-malleable codes against tampering families with average-case hardness bounds. Our framework adapts ideas from the Naor-Yung double encryption paradigm such that to protect against tampering in a class F , it suffices to have average-case hard distributions for the class, and underlying primitives (encryption and non-interactive, simulatable proof...

2014
Yan WO Guoqiang HAN Bo ZHANG Jin HAN

Image hashing is an effective approach to image authentication. In this paper, a geometric distortioninvariant image hashing scheme, which can detect and locate the tampering, is proposed. The reported scheme performs Polar Complex Exponential Transform (PCET) on an image, and then the magnitudes and the phases of PCETs are combined to generate a set of rotation and scaling invariant features. ...

Journal: :IACR Cryptology ePrint Archive 2013
Per Austrin Kai-Min Chung Mohammad Mahmoody Rafael Pass Karn Seth

We initiate a study of the security of cryptographic primitives in the presence of efficient tampering attacks to the randomness of honest parties. More precisely, we consider p-tampering attackers that may tamper with each bit of the honest parties’ random tape with probability p, but have to do so in an “online” fashion. We present both positive and negative results: • Negative Results: Any s...

2018
Marshall Ball Dana Dachman-Soled Mukul Kulkarni Tal Malkin

We show a general framework for constructing non-malleable codes against tampering families with average-case hardness bounds. Our framework adapts ideas from the Naor-Yung double encryption paradigm such that to protect against tampering in a class F , it suffices to have average-case hard distributions for the class, and underlying primitives (encryption and non-interactive, simulatable proof...

2016
Kusam Sharma Pawanesh Abrol

Digital Image Authentication has become a very important research area. Digital images can be altered easily using freely available image editing softwares. Many a times, it becomes impossible to ascertain the authentic image from the tampered image. These tampered images can be created by using graphical softwares, or can be manipulated simply by changing the content and context of the image. ...

Journal: :IACR Cryptology ePrint Archive 2016
Amir S. Mortazavi Mahmoud Salmasizadeh Amir Daneshgar

A non-malleable encoding scheme is a keyless encoding scheme which is resilient to tampering attacks. Such a scheme is said to be continuously secure if the scheme is resilient to attacks containing more than one tampering procedure. Also, such a scheme is said to have tamper-detection property if any kind of tampering attack is detected. In [S. Faust, et al., Continuous nonmalleable codes, TCC...

2015
Adriano Gaibotti Claudio Marchisio Alexandro Sentinelli Giacomo Boracchi

A desirable feature in smart cameras is the ability to autonomously detect any tampering event/attack that would prevent a clear view over the monitored scene. No matter whether tampering is due to atmospheric phenomena (e.g., few rain drops over the camera lens) or to malicious attacks (e.g., occlusions or device displacements), these have to be promptly detected to possibly activate counterme...

Journal: :IJESDF 2015
Jonathan Goh Vrizlynn L. L. Thing

The detection of the presence of tampered images is of significant importance in digital forensics. The problem with image tampering detection is the vast number of features that are currently available in the literature. It is very challenging to determine the best features to correctly characterise these images. This paper proposes a hybrid evolutionary framework to perform a quantitative stu...

Journal: :Journal of Internet Computing and Services 2014

Journal: :JOURNAL OF CLINICAL AND DIAGNOSTIC RESEARCH 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید