نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

Dynamic compaction is a soil improvement method which has been widely used for the increase of bearing capacity through stress wave propagation during heavy tamping. The cost and time of project implementation can be effectively curtailed by developing a model that can be used in the design of dynamic compaction operations. The numerical models offered so far are mostly one or two-dimensional, ...

Journal: :IJDCF 2014
Qi Tang Guoli Ma Weiming Zhang Nenghai Yu

As the blueprint of vital activities of most living things on earth, DNA has important status and must be protected perfectly. And in current DNA databases, each sequence is stored with several notes that help to describe that sequence. However, these notes have no contribution to the protection of sequences. In this paper, the authors propose a reversible data hiding method for DNA sequences, ...

Journal: :IEICE Electronics Express 2017

Journal: :Canadian Pharmacists Journal / Revue des Pharmaciens du Canada 2013

Journal: :Iet Image Processing 2023

Abstract Face image manipulation detection (FIMD) is a research area of great interest, widely applicable in fields requiring data security and authentication. Existing FIMD schemes aim to identify manipulations digital face images, but they possess individual strengths limitations. Most can only detect specific under certain conditions, leading variable success rates across different images. T...

2013
Shengbing Che Yemao Wang

After embedding the watermark based on the algorithm of PE file resources section, the data of resource section was still easy to be rearranged, so this paper put forward a new watermark algorithm with the function of anti-tamper. The new algorithm still used watermark information to control the order of software resource structure’s nodes, and hid the watermark information in the rearranged re...

Journal: :CoRR 2013
Minati Mishra M. C. Adhikary

Photographs are considered to be the most powerful and trustworthy media of expression. For a long time, those were accepted as proves of evidences in varied fields such as journalism, forensic investigations, military intelligence, scientific research and publications, crime detection and legal proceedings, investigation of insurance claims, medical imaging etc. Today, digital images have comp...

2003
Dennis Heimbigner

An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-detecting interpreter for a programming language – specifically Lisp 1.5 – combined with the use of a secure co-processor can address this problem. The term “tamper-detecting” means that any attempt to corrupt a computation carried o...

1999
Dimitrios Hatzinakos

In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We speci cally address the problem of fragile digital watermarking for the tamper-proo ng of still images. Applications of our problem include authentication for courtroom evidence, insurance claims and journalistic photography. We present a novel fragile watermarking approach which embeds a ...

2008

Laser-imploded targets, especially those imploded adiabatically, attain high temperatures in the compressed core. The imploded part of the surrounding tamper is considerably colder, especially if preheat is small. Under these conditions the continuous x-ray emission from the core undergoes absorption at wavelengths characteristic of atomic species in the tamper. The resulting absorption lines c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید