نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

2013
Mandeep Kaur

Digital images have a very significant role in various fields like criminal and forensic investigations, medical imaging and journalism. But due to wide availability of powerful editing software, image forgery has become much easier. The aim of this paper is to detect the forgery on JPEG compressed images when splicing (copy-paste) will result in non alignment of JPEG grids. JPEG is widely used...

2005
Jeremy Thurgood Roger Peplow

An important element of a communications system is the trustworthiness of the data being received, especially where the data must travel through insecure channels or pass through several hands. Digital watermarking provides a partial solution to the problem of trustworthiness, especially with regard to image and video data. This paper describes a hybrid watermarking algorithm that combines robu...

2007
Mariusz H. Jakubowski Prasad Naldurg Vijay Patankar Ramarathnam Venkatesan

We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, probabilistic verification conditions (PVCs) and Fourier-learning approximations (FLAs), which can be computed for certain classes of programs,. We show that these predicates hold for any valid execution of the program, and fail ...

2016
T. T. Ng S. F. Chang J. Hsu L. Xie R. Neelamani R. D. Queiroz Z. Fang

In this paper a detailed study regarding Digital Image Forgery on Jpeg images is provided. Here, copy-paste block detection on a special case of double Jpeg compression Shifted Double Jpeg Compression, is identified based on the characteristics of Double Jpeg compression. In certain cases the tampered image will be cropped, the paper uses properties of Block Artifacting method to identify such ...

Journal: :Informatica, Lith. Acad. Sci. 2012
Romualdas Bausys Arturas Kriukovas

In this paper robust image authentication integrated with semi-fragile pixel-wise tamper localization is analyzed. A new pixel-wise transformation robust to blurring/sharpening while fragile to all other image processing operations is proposed. A new method featuring binary and percentage measures with novel ability to integrate human opinion for image authenticity evaluation is presented. Prot...

2008
O. FAROOQ

In this paper, we propose the use of ‘chirp coding’ for embedding a watermark in audio data without generating any perceptual degradation of audio quality. A binary sequence (the watermark) is derived using energy based features from the audio signal and chirp coding used to embed the watermark in audio data. The chirp coding technique is such that the same watermark can be derived from the ori...

2003
Henry D. Knowles Dominique A. Winne Cedric Nishan Canagarajah David R. Bull

In this paper, we present a novel wavelet-based double watermarking system for the detection and subsequent characterisation of the tampering ofimages. Most tamper detection techniques use fragile watermarks. However, our previous work showed that this type of watermark is frequently completely destroyed by compression, which in many cases is undesirable. In addition, it gives little or no info...

2002
Mike Jochen Lisa M. Marvel Lori L. Pollock

The benefits of distributed computation present complex security considerations beyond those associated with the traditional computing paradigm. This paper describes a bandwidth efficient approach to authenticate distributed Java code. Our system utilizes steganographic techniques to embed a cryptographic checksum as a tamper detection mark into Java class files. The properties of this mark mak...

2014
Yan WO Guoqiang HAN Bo ZHANG Jin HAN

Image hashing is an effective approach to image authentication. In this paper, a geometric distortioninvariant image hashing scheme, which can detect and locate the tampering, is proposed. The reported scheme performs Polar Complex Exponential Transform (PCET) on an image, and then the magnitudes and the phases of PCETs are combined to generate a set of rotation and scaling invariant features. ...

1999
Peter Mork Beitao Li Edward Chang Junghoo Cho Chen Li James Wang

In this paper we present the image copy detection service we have built. We call this service RIME, for Replicated IMage dEtector. Given an image registered by its creator or distributor, RIME checks if near-replicas of the image (i.e., copies of the image that may have gone through alterations) exist on the Internet and returns a list of suspect URLs. The core technologies that the RIME projec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید