نتایج جستجو برای: tamper

تعداد نتایج: 2422  

Journal: :IEICE Transactions 2005
Guorui Feng Ling-ge Jiang Chen He

Tamper proofing is a crucial problem in the watermarking application. Aiming at the credibility of multimedia, we present a semi-fragile watermark based on the image permutation. Watermarking detection is performed without resorting to the host image and it is only controlled by secrete keys, thus the whole scheme does not have certain security gaps. The simulation experiments show that it can ...

2012
Jasni Mohamad Zain

Digital watermarking in medical images can ensure the authenticity and integrity of the image. This design paper reviews some existing watermarking schemes and proposes a reversible tamper detection and recovery watermarking scheme. Watermark data from ROI (Region Of Interest) are stored in RONI (Region Of Non Interest). The embedded watermark allows tampering detection and tampered image recov...

2005
Tsutomu Matsumoto Shigeru Nakajima Tadashi Shibata Atsuhiro Yamagishi

Abstract: Tamper resistance of LSI chips against physical attacks is studied from the viewpoint of LSI failure analysis. Laying stress on the basic physical phenomena generated in LSI chips under operating conditions, we outline today’s failure analysis techniques with application to evaluating or testing tamper resistance of LSI chips. We give some results from our case study on inactivation o...

2006
Jong Youl Choi Philippe Golle Markus Jakobsson

We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers. This is achieved by letting observers (which need not be trusted) verify the absence of covert channels by means of techniques we introduce herein. Our tamper-evident mix network is a type of re-encryption mixnet in which a se...

Journal: :Electronics 2021

A tachograph in a vehicle records the operating conditions, such as speed, distance, brake operation acceleration, GPS information, etc., intervals of one second. For accidents, acceleration and direction traveling 1/100 s for 10 before after accident occurs collision data. equipped with is obliged to upload data administrative organizations periodically via other auxiliary storage devices like...

2013
Shinsaku Kiyomoto Yutaka Miyake

In this paper, we considere a simple, distributed remote attestation method for a WSN that does not require secret information, precise timing measurement, or a tamper-resistant device.

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

2007
Matthias Kirchner Rainer Böhme

This paper introduces novel hiding techniques to counter the detection of image manipulations through forensic analyses. The presented techniques allow to resize and rotate (parts of) bitmap images without leaving a periodic pattern in the local linear predictor coefficients, which has been exploited by prior art to detect traces of manipulation. A quantitative evaluation on a batch of test ima...

Journal: :CoRR 2017
Komal Batool Muaz A. Niazi

Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between indivi...

2005
Luc Bouganim François Dang Philippe Pucheral

The rapid growth of ubiquitous computing impels mobile users to store personal data on the Web in order to increase data availability and facilitate data sharing among partners. However, Database Service Providers (DSP) arouse user’s suspicion because DSP’s privacy policies have been frequently dishonored [AKS02]. In addition, no one can fully trust traditional server-based security mechanisms ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید