نتایج جستجو برای: tamper
تعداد نتایج: 2422 فیلتر نتایج به سال:
We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational...
Most of data over the Internet today is hosted on outsourced third-party servers which are not trusted. Sometimes to be distributed other organizations or individuals for pre-agreed use. In both these scenarios susceptible malicious tampering so there a need some mechanism verify database integrity. Moreover, authentication process should able differentiate between valid updates and modificatio...
Recently, fake and fabricated images that have been manipulated for several purposes, including cosmetic some illegal spread on social media. And because this is not an easy matter, it has become necessary researchers in field to search investigate the types of images, verify their authenticity how manipulate them. Therefore, aim research serve as assistant researcher who wants enter field. In ...
We previously proposed a cross-referencing method for enabling multiple peer-to-peer network domains to manage their own public blockchains and periodically exchanging the state of latest fixed block in blockchain with hysteresis signatures among all via an upper layer. In this study, we evaluated effectiveness our from three theoretical viewpoints: decentralization, scalability, tamper resista...
Many semiconductor chips used in a wide range of applications require protection against physical attacks or tamper resistance. These attacks assume that a direct access to the chip is possible with either establishing electrical connections to signal wires or at least doing some measurements. The importance of protection against physical attacks is dictated by the amount of valuable and sensit...
We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...
Non-malleable codes are a natural relaxation of error correcting/detecting codes that have useful applications in the context of tamper resilient cryptography. Informally, a code is non-malleable if an adversary trying to tamper with an encoding of a given message can only leave it unchanged or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید