نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

2009
Cataldo Basile

A major challenge in software protection is the problem of tampering where an adversary modifies a program and uses it in a way that was not intended or desired. Several ad hoc techniques for software tamper resistance have been proposed, some of which provide a significant level of resilience against tampering. However, the literature lacks a formal definition of tampering that takes into acco...

2010
Feng-Hao Liu Anna Lysyanskaya

Gennaro et al. initiated the study of algorithmic tamper proof (ATP) cryptography: cryptographic hardware that remains secure even in the presence of an adversary who can tamper with the memory content of a hardware device. In this paper, we solve an open problem stated in their paper, and also consider whether a device can be secured against an adversary who can both tamper with its memory and...

2012
Kyriacos E. Pavlou

Regulations and societal expectations have recently expressed the need to mediate access to valuable databases, even by insiders. At one end of the spectrum is the approach of restricting access to information and on the other that of information accountability. The focus of the proposed work is effecting information accountability of data stored in databases. One way to ensure appropriate use ...

2018
Seyyed Hossein Soleymani

This paper presents a new semi-fragile algorithm for image tamper detection and recovery, which is based on region attention and two-sided circular block dependency. This method categorizes the image blocks into three categories according to their texture. In this method, less information is extracted from areas with the smooth texture, and more information is extracted from areas with the roug...

Journal: :CoRR 2013
Zeng Jie

Image perceptual hashing finds applications in content indexing, large-scale image database management, certification and authentication and digital watermarking. We propose a Block-DCT and PCA based image perceptual hash in this article and explore the algorithm in the application of tamper detection. The main idea of the algorithm is to integrate color histogram and DCT coefficients of image ...

Journal: :Security and Communication Networks 2021

Health IoT deals with sensitive medical information of patients, therefore security concerns need to be addressed. Confidentiality Electronic Record (EHR) and privacy are two important requirements for based healthcare systems. Recently, watermarking algorithms as an efficient response these is in the spotlight. Further, smart city-based applications have react real-time situations, computation...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید