نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

2011
Nico Döttling Daniel Kraschewski Jörn Müller-Quade

Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even allow to create software...

Journal: :J. UCS 2010
Raju Halder Shantanu Pal Agostino Cortesi

Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, we survey the current state-of-theart and we classify them according to their intent, the way they ex...

2017

 Measures active, reactive, and apparent energies  Current, voltage RMS and instantaneous measurement  Frequency measurement  Ripple-free active energy pulsed output  Live and neutral monitoring for tamper detection  Fast and simple one-point digital calibration over the whole current range  Integrated linear voltage regulators for digital and analog supply  Selectable RC or crystal osc...

2002
Roger ŚWIERCZYŃSKI

The paper deals with a new technique of fragile image watermarking. Proposed technique exploits inter-subband dependencies in order to minimize the influence of inserted watermark on the host image quality. Using the unique watermark based on the low-frequency subband, proposed scheme is resistant against attacks based on series of images analysis. Tampering detection ability of the proposed te...

2013
Areej S. Alfraih Johann A. Briffa Stephan Wesemeyer

Many passive image tamper detection techniques have been presented in the expanding field of image forensics. Some of these techniques use a classifier for a final decision based on whole image statistics, resulting in a lack of forgery localization. The aim of this paper is to add localization to a previously published algorithm that uses grey-level co-occurrence matrix (GLCM) for extracting t...

2012
Shen Wang

This study presents a new image inpainting method based on affine transformation for security. In the traditional image inpainting process, removed object is filled by patches in other regions of the same image. The tamper of the image is easy to be found out by copy-move detection. Thus, the usage of image inpainting in image forgery or other image security field is limited. In this study, the...

Journal: :TIIS 2014
Thai Son Nguyen Chin-Chen Chang Ting-Feng Chung

This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user’s requirement, with each BTC-compressed image block being used to carry the authentication code using the data...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید