نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
Hardware design houses are increasingly outsourcing designs to be manufactured by cheaper fabrication facilities due to economic factors and market forces. This raises the question of trustable manufactured products for highly sensitive applications. One such type of trust issue is the possible incorporation of Trojan circuits into the IC with the goal of tampering with IC reliability and haste...
Digital images can be easily tampered with image editing tools. The detection of tampering operations is of great importance. Passive digital image tampering detection aims at verifying the authenticity of digital images without any a prior knowledge on the original images. There are various methods proposed in this filed in recent years. In this paper, we present an overview of these methods i...
This paper presents a framework for detecting tampered information in digital audio-visual content. The proposed framework uses a combination of temporal and spatial watermarks that do not decrease the quality of host videos. A modified version of the Quantization Index Modulation (QIM) algorithm is used to embed watermarks. The fragility of the QIM watermarking algorithm makes it possible to d...
Today lots of software tools are available which are used to manipulate the images easily to change their originality. The technique which is usually used these days for tampering an image without leaving any microscopic evidence is copy-move forgery. There are many existing techniques to detect image tampering but their computational complexity is high. Here we propose a method in which we fin...
The applications of digital images are increasing exponentially in the field of image processing. Many image editing tools and computer applications are available to manipulate the images. Hence image tampering has been increasingly easy to perform. It is very difficult to say whether an image is original or a manipulated version by just looking it. As a result of such modifications digital ima...
Despite current software protection techniques, applications are still analysed, tampered with, and abused on a large scale. Crackers compensate for each new protection technique by adapting their analysis and tampering tools. This paper presents a low-cost mechanism to effectively protect software against global tampering attacks. By introducing diversity per programme instance, we illustrate ...
In this paper, we propose a novel fuzzy fusion of image residue features for detecting tampering or forgery in video sequences. We suggest use of feature selection techniques in conjunction with fuzzy fusion approach to enhance the robustness of tamper detection methods. We examine different feature selection techniques, the independent component analysis (ICA), and the canonical correlation an...
Video authentication aims to ensure the trustworthiness of the video by verifying the integrity and source of video data. It has gained much attention in the recent years. In this paper we present the issues in the designing of a video authentication system. These issues include the classification of tampering attacks, levels of tampering attack and robustness. Further we present the categoriza...
The forensic detection of median filtering has recently attracted the attention of the research community, mainly because of the median filtering potential uses for tampering and concealing image tampering traces in digital images. In this paper, we propose multi-scale and multi-perturbation solutions that build a highly discriminative feature space, which highlights the artifacts of median fil...
In order to improve the detection of malicious tampering of images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been distorted incidentally. In this paper, we propose a new semi-fragile digital watermarking technique based on eigenvalues and eigenvectors of real symmetric matrix generated by the pair of four pixels. A signature bit for dete...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید