نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
In this paper, we present an improved approach for audio tampering detection and localization based on the Electrical Network Frequency (ENF) analysis, combining analysis of the ENF phase, and ENF temporal pattern matching: The proposed algorithm uses phase discontinuity checking to detect regions that might have been tampered, which are then matched against an ENF reference database to validat...
The Programmable Logic Controller (PLC) is located at the junction of virtual network and physical reality in Industrial Control System (ICS), which vulnerable to attacks due its weak security. Specifically, firmware tampering take under PLC operating system as primary attack target. provides bridge between PLC’s hardware software, means against can be more destructive harmful than other attack...
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as “never copy”. In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove...
We present a compiler that converts any circuit into one that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work of Ishai et al. (Eurocrypt 2006), we consider adversaries who may choose an arbitrary set of wires to corrupt, and may set each such wire to 0 or to 1, or may toggle with the wire. We prove that such adversaries, who continuously tam...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید