نتایج جستجو برای: tamper detection
تعداد نتایج: 567946 فیلتر نتایج به سال:
Digital images have a very significant role in various fields like criminal and forensic investigations, medical imaging and journalism. But due to wide availability of powerful editing software, image forgery has become much easier. The aim of this paper is to detect the forgery on JPEG compressed images when splicing (copy-paste) will result in non alignment of JPEG grids. JPEG is widely used...
An important element of a communications system is the trustworthiness of the data being received, especially where the data must travel through insecure channels or pass through several hands. Digital watermarking provides a partial solution to the problem of trustworthiness, especially with regard to image and video data. This paper describes a hybrid watermarking algorithm that combines robu...
We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail ...
In this paper a detailed study regarding Digital Image Forgery on Jpeg images is provided. Here, copy-paste block detection on a special case of double Jpeg compression Shifted Double Jpeg Compression, is identified based on the characteristics of Double Jpeg compression. In certain cases the tampered image will be cropped, the paper uses properties of Block Artifacting method to identify such ...
In this paper robust image authentication integrated with semi-fragile pixel-wise tamper localization is analyzed. A new pixel-wise transformation robust to blurring/sharpening while fragile to all other image processing operations is proposed. A new method featuring binary and percentage measures with novel ability to integrate human opinion for image authenticity evaluation is presented. Prot...
In this paper, we propose the use of ‘chirp coding’ for embedding a watermark in audio data without generating any perceptual degradation of audio quality. A binary sequence (the watermark) is derived using energy based features from the audio signal and chirp coding used to embed the watermark in audio data. The chirp coding technique is such that the same watermark can be derived from the ori...
In this paper, we present a novel wavelet-based double watermarking system for the detection and subsequent characterisation of the tampering ofimages. Most tamper detection techniques use fragile watermarks. However, our previous work showed that this type of watermark is frequently completely destroyed by compression, which in many cases is undesirable. In addition, it gives little or no info...
The benefits of distributed computation present complex security considerations beyond those associated with the traditional computing paradigm. This paper describes a bandwidth efficient approach to authenticate distributed Java code. Our system utilizes steganographic techniques to embed a cryptographic checksum as a tamper detection mark into Java class files. The properties of this mark mak...
Image hashing is an effective approach to image authentication. In this paper, a geometric distortioninvariant image hashing scheme, which can detect and locate the tampering, is proposed. The reported scheme performs Polar Complex Exponential Transform (PCET) on an image, and then the magnitudes and the phases of PCETs are combined to generate a set of rotation and scaling invariant features. ...
In this paper we present the image copy detection service we have built. We call this service RIME, for Replicated IMage dEtector. Given an image registered by its creator or distributor, RIME checks if near-replicas of the image (i.e., copies of the image that may have gone through alterations) exist on the Internet and returns a list of suspect URLs. The core technologies that the RIME projec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید