نتایج جستجو برای: tamper detection
تعداد نتایج: 567946 فیلتر نتایج به سال:
Dynamic compaction is a soil improvement method which has been widely used for the increase of bearing capacity through stress wave propagation during heavy tamping. The cost and time of project implementation can be effectively curtailed by developing a model that can be used in the design of dynamic compaction operations. The numerical models offered so far are mostly one or two-dimensional, ...
As the blueprint of vital activities of most living things on earth, DNA has important status and must be protected perfectly. And in current DNA databases, each sequence is stored with several notes that help to describe that sequence. However, these notes have no contribution to the protection of sequences. In this paper, the authors propose a reversible data hiding method for DNA sequences, ...
Abstract Face image manipulation detection (FIMD) is a research area of great interest, widely applicable in fields requiring data security and authentication. Existing FIMD schemes aim to identify manipulations digital face images, but they possess individual strengths limitations. Most can only detect specific under certain conditions, leading variable success rates across different images. T...
After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the order of software resource structure’s nodes, and hid the watermark information in the rearranged re...
Photographs are considered to be the most powerful and trustworthy media of expression. For a long time, those were accepted as proves of evidences in varied fields such as journalism, forensic investigations, military intelligence, scientific research and publications, crime detection and legal proceedings, investigation of insurance claims, medical imaging etc. Today, digital images have comp...
An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-detecting interpreter for a programming language – specifically Lisp 1.5 – combined with the use of a secure co-processor can address this problem. The term “tamper-detecting” means that any attempt to corrupt a computation carried o...
In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We speci cally address the problem of fragile digital watermarking for the tamper-proo ng of still images. Applications of our problem include authentication for courtroom evidence, insurance claims and journalistic photography. We present a novel fragile watermarking approach which embeds a ...
Laser-imploded targets, especially those imploded adiabatically, attain high temperatures in the compressed core. The imploded part of the surrounding tamper is considerably colder, especially if preheat is small. Under these conditions the continuous x-ray emission from the core undergoes absorption at wavelengths characteristic of atomic species in the tamper. The resulting absorption lines c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید