نتایج جستجو برای: tamper
تعداد نتایج: 2422 فیلتر نتایج به سال:
In this paper, we present two tamper-detection techniques. The rst is a fragile technique that can detect the most minor changes in a marked image using a DCT-based data hiding method to embed a tamper-detection mark. The second is a semi-fragile technique that detects the locations of signiicant manipulations while disregarding the less important eeects of image compression and additive channe...
An increasing number of systems, from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems — some old, some new and some that are simply little known outside the chip testing community. We conclude that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device t...
Storing data on an external server with information-theoretic security, while using a key shorter than the itself, is impossible. As alternative, we propose scheme that achieves information-theoretically secure tamper evidence: The able to obtain information about stored data, but not staying undetected. Moreover, client only needs remember whose length much data. We provide security proof for ...
The combination of cryptographic tools and tamper-resistant mechanisms appeared first in military applications to secure communication links using tamper-resistant cipher machines. The spread of ATM networks brought the technology into the commercial mainstream. During the last years, the use of embedded cryptographic processors has spread from low-cost cryptoprocessors, such as smart cards use...
We describe how the compliance requirements for data retention from recent laws such as the US Sarbanes Oxley Act may be supported by a tamper-evident secure storage system based on probe storage with a patterned magnetic medium. This medium supports normal read/write operations by out-of-plane magnetisation of individual dots. We report on an experiment to show that in principle the medium als...
An original image is compressed with fuzzy transforms and is divided in images of sizes 2×2 on which we apply a known fragile watermarking process. A preprocessing phase is considered to determine the better compression rate for the coding process. We test this scheme in tamper detection analysis on a sample of images. The results are good in terms of accuracy for tamper detection with compress...
In some security-critical applications, a GPS satellite-navigation receiver is integrated with a tamper-resistant cryptographic module in order to provide remote attestation of location. Those in possession of the receiver may have an interest in it producing an incorrect output. Vehicle and container tracking, usage-based road charging, prisoner tagging, location-based access control are just ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید