نتایج جستجو برای: tampering

تعداد نتایج: 1480  

Journal: :J. Low Power Electronics 2012
Aswin Sreedhar Sandip Kundu Israel Koren

Hardware design houses are increasingly outsourcing designs to be manufactured by cheaper fabrication facilities due to economic factors and market forces. This raises the question of trustable manufactured products for highly sensitive applications. One such type of trust issue is the possible incorporation of Trojan circuits into the IC with the goal of tampering with IC reliability and haste...

2009
Wei Wang Jing Dong Tieniu Tan

Digital images can be easily tampered with image editing tools. The detection of tampering operations is of great importance. Passive digital image tampering detection aims at verifying the authenticity of digital images without any a prior knowledge on the original images. There are various methods proposed in this filed in recent years. In this paper, we present an overview of these methods i...

Journal: :Inf. Sci. 2016
Ronaldo Rigoni Pedro Garcia Freitas Mylène C. Q. Farias

This paper presents a framework for detecting tampered information in digital audio-visual content. The proposed framework uses a combination of temporal and spatial watermarks that do not decrease the quality of host videos. A modified version of the Quantization Index Modulation (QIM) algorithm is used to embed watermarks. The fragility of the QIM watermarking algorithm makes it possible to d...

2016
Choudhary Shyam Prakash Sushila Maheshkar

Today lots of software tools are available which are used to manipulate the images easily to change their originality. The technique which is usually used these days for tampering an image without leaving any microscopic evidence is copy-move forgery. There are many existing techniques to detect image tampering but their computational complexity is high. Here we propose a method in which we fin...

2017
Maria Johnson Resmi Cherian Xinpeng Zhang Shuozhong Wang Hongjie He Fan Chen Heng-Ming Tai Ton Kalker Jiashu Zhang Zhenxing Qian Yanli Ren Guorui Feng Mehmet Utku Celik Gaurav Sharma Murat Tekalp Dekun Zou Yun Q. Shi Zhicheng Ni Wei Su Adnan M. Alattar Pawel Korus Saeed Sarreshtedari Mohammad Ali Akhaee

The applications of digital images are increasing exponentially in the field of image processing. Many image editing tools and computer applications are available to manipulate the images. Hence image tampering has been increasingly easy to perform. It is very difficult to say whether an image is original or a manipulated version by just looking it. As a result of such modifications digital ima...

2007
Nessim Kisserli Jan Cappaert Bart Preneel

Despite current software protection techniques, applications are still analysed, tampered with, and abused on a large scale. Crackers compensate for each new protection technique by adapting their analysis and tampering tools. This paper presents a low-cost mechanism to effectively protect software against global tampering attacks. By introducing diversity per programme instance, we illustrate ...

2010
Girija Chetty Monica Singh

In this paper, we propose a novel fuzzy fusion of image residue features for detecting tampering or forgery in video sequences. We suggest use of feature selection techniques in conjunction with fuzzy fusion approach to enhance the robustness of tamper detection methods. We examine different feature selection techniques, the independent component analysis (ICA), and the canonical correlation an...

2012
Saurabh Upadhyay Sanjay Kumar Singh

Video authentication aims to ensure the trustworthiness of the video by verifying the integrity and source of video data. It has gained much attention in the recent years. In this paper we present the issues in the designing of a video authentication system. These issues include the classification of tampering attacks, levels of tampering attack and robustness. Further we present the categoriza...

Journal: :Intell. Data Anal. 2016
Anselmo Ferreira Jefersson Alex dos Santos Anderson Rocha

The forensic detection of median filtering has recently attracted the attention of the research community, mainly because of the median filtering potential uses for tampering and concealing image tampering traces in digital images. In this paper, we propose multi-scale and multi-perturbation solutions that build a highly discriminative feature space, which highlights the artifacts of median fil...

Journal: :J. Inf. Sci. Eng. 2006
Ching-Tang Hsieh Yeh-Kuang Wu Chyi-Jang Lee

In order to improve the detection of malicious tampering of images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been distorted incidentally. In this paper, we propose a new semi-fragile digital watermarking technique based on eigenvalues and eigenvectors of real symmetric matrix generated by the pair of four pixels. A signature bit for dete...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید