نتایج جستجو برای: tamper

تعداد نتایج: 2422  

1998
Jiri Fridrich

We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational...

Journal: :Malaysian Journal of Computer Science 2021

Most of data over the Internet today is hosted on outsourced third-party servers which are not trusted. Sometimes to be distributed other organizations or individuals for pre-agreed use. In both these scenarios susceptible malicious tampering so there a need some mechanism verify database integrity. Moreover, authentication process should able differentiate between valid updates and modificatio...

Journal: : 2022

Recently, fake and fabricated images that have been manipulated for several purposes, including cosmetic some illegal spread on social media. And because this is not an easy matter, it has become necessary researchers in field to search investigate the types of images, verify their authenticity how manipulate them. Therefore, aim research serve as assistant researcher who wants enter field. In ...

Journal: :Internet of things 2021

We previously proposed a cross-referencing method for enabling multiple peer-to-peer network domains to manage their own public blockchains and periodically exchanging the state of latest fixed block in blockchain with hysteresis signatures among all via an upper layer. In this study, we evaluated effectiveness our from three theoretical viewpoints: decentralization, scalability, tamper resista...

2011
Sergei Skorobogatov

Many semiconductor chips used in a wide range of applications require protection against physical attacks or tamper resistance. These attacks assume that a direct access to the chip is possible with either establishing electrical connections to signal wires or at least doing some measurements. The importance of protection against physical attacks is dictated by the amount of valuable and sensit...

2004
Clark D. Thomborson Jasvir Nagra Ram Somaraju Charles He

We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...

2014
Sebastian Faust Pratyay Mukherjee Jesper Buus Nielsen Daniele Venturi

Non-malleable codes are a natural relaxation of error correcting/detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the ...

Journal: :INTERNATIONAL JOURNAL OF RECENT TRENDS IN ENGINEERING & RESEARCH 2019

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید