نتایج جستجو برای: tamper detection
تعداد نتایج: 567946 فیلتر نتایج به سال:
Cryptographic assumptions regarding tamper proof hardware tokens have gained increasing attention. Even if the tamper-proof hardware is issued by one of the parties, and hence not necessarily trusted by the other, many tasks become possible: Tamper proof hardware is sufficient for universally composable protocols, for information-theoretically secure protocols, and even allow to create software...
Digital watermarking for relational databases emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. In this paper, we survey the current state-of-theart and we classify them according to their intent, the way they ex...
Measures active, reactive, and apparent energies Current, voltage RMS and instantaneous measurement Frequency measurement Ripple-free active energy pulsed output Live and neutral monitoring for tamper detection Fast and simple one-point digital calibration over the whole current range Integrated linear voltage regulators for digital and analog supply Selectable RC or crystal osc...
The paper deals with a new technique of fragile image watermarking. Proposed technique exploits inter-subband dependencies in order to minimize the influence of inserted watermark on the host image quality. Using the unique watermark based on the low-frequency subband, proposed scheme is resistant against attacks based on series of images analysis. Tampering detection ability of the proposed te...
Many passive image tamper detection techniques have been presented in the expanding field of image forensics. Some of these techniques use a classifier for a final decision based on whole image statistics, resulting in a lack of forgery localization. The aim of this paper is to add localization to a previously published algorithm that uses grey-level co-occurrence matrix (GLCM) for extracting t...
This study presents a new image inpainting method based on affine transformation for security. In the traditional image inpainting process, removed object is filled by patches in other regions of the same image. The tamper of the image is easy to be found out by copy-move detection. Thus, the usage of image inpainting in image forgery or other image security field is limited. In this study, the...
This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user’s requirement, with each BTC-compressed image block being used to carry the authentication code using the data...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید