نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

2013
Shinsaku Kiyomoto Yutaka Miyake

In this paper, we considere a simple, distributed remote attestation method for a WSN that does not require secret information, precise timing measurement, or a tamper-resistant device.

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

2007
Matthias Kirchner Rainer Böhme

This paper introduces novel hiding techniques to counter the detection of image manipulations through forensic analyses. The presented techniques allow to resize and rotate (parts of) bitmap images without leaving a periodic pattern in the local linear predictor coefficients, which has been exploited by prior art to detect traces of manipulation. A quantitative evaluation on a batch of test ima...

Journal: :CoRR 2017
Komal Batool Muaz A. Niazi

Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between indivi...

2005
Luc Bouganim François Dang Philippe Pucheral

The rapid growth of ubiquitous computing impels mobile users to store personal data on the Web in order to increase data availability and facilitate data sharing among partners. However, Database Service Providers (DSP) arouse user’s suspicion because DSP’s privacy policies have been frequently dishonored [AKS02]. In addition, no one can fully trust traditional server-based security mechanisms ...

1998
Jiri Fridrich

We propose an oblivious watermarking technique for tamper detection in digital images. By comparing correlation values from different portions of the image, the technique enables us to distinguish malicious changes, such as replacing / adding features from nonmalicious changes resulting from common image processing operations. The technique can be implemented with small memory and computational...

Journal: :Malaysian Journal of Computer Science 2021

Most of data over the Internet today is hosted on outsourced third-party servers which are not trusted. Sometimes to be distributed other organizations or individuals for pre-agreed use. In both these scenarios susceptible malicious tampering so there a need some mechanism verify database integrity. Moreover, authentication process should able differentiate between valid updates and modificatio...

Journal: : 2022

Recently, fake and fabricated images that have been manipulated for several purposes, including cosmetic some illegal spread on social media. And because this is not an easy matter, it has become necessary researchers in field to search investigate the types of images, verify their authenticity how manipulate them. Therefore, aim research serve as assistant researcher who wants enter field. In ...

Journal: :Internet of things 2021

We previously proposed a cross-referencing method for enabling multiple peer-to-peer network domains to manage their own public blockchains and periodically exchanging the state of latest fixed block in blockchain with hysteresis signatures among all via an upper layer. In this study, we evaluated effectiveness our from three theoretical viewpoints: decentralization, scalability, tamper resista...

2011
Sergei Skorobogatov

Many semiconductor chips used in a wide range of applications require protection against physical attacks or tamper resistance. These attacks assume that a direct access to the chip is possible with either establishing electrical connections to signal wires or at least doing some measurements. The importance of protection against physical attacks is dictated by the amount of valuable and sensit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید