نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

Journal: :IEEE Wireless Communications Letters 2021

This letter proposes a deep learning approach to detect change in the antenna orientation of transmitter or receiver as physical tamper attack OFDM systems using channel state information. We treat problem semi-supervised anomaly detection and utilize convolutional autoencoder (DCAE) tackle it. The past observations estimated information (CSI) are used train DCAE. Then, post-processing is deplo...

2008
Huajian Liu

ii tampering detection is enabled in the authentication process by presetting the noise filter size. Second, we study the unique characteristics of synthetic images and develop a novel watermarking scheme for synthetic image authentication. The proposed watermarking algorithm is fully compatible with the characteristics of synthetic images. With less pixels modified, the authentication system c...

2000
Ryutarou Ohbuchi Hiroshi Masuda

Three-dimensional (3D) model, including 3D geometric CAD model, has come to be recognized as a “multimedia” data type, along with such data types as sound, text, still image, and movie. As a data type, each one of these data types has a set of operations associated with it. Representative of operations are input, output, editing, indexing, hyper-linking, compression, similarity-based search, an...

2016
Bihan Wen Ye Zhu Subramanian Ramanathan Tian-Tsong Ng Xuanjing Shen Stefan Winkler

We present COVERAGE – a novel database containing copymove forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged–original pairs are annotated with (i) the duplicated and forged region masks, and (ii) the tampering factor/...

Journal: :IACR Cryptology ePrint Archive 2004
Mahalingam Ramkumar Nasir D. Memon

Key pre-distribution (KPD) schemes, are inherently trade-offs between security and complexity, and are perhaps well suited for securing large-scale deployments of resource constrained nodes without persistent access to a trusted authority (TA). However, the need to offset their inherent security limitations, calls for some degree of tamper-resistance of nodes. Obviously, if absolute tamper-resi...

2012
Junghwan Rhee Dongyan Xu Eugene H. Spafford Xiangyu Zhang Sonia Fahmy

Rhee, Junghwan Ph.D., Purdue University, August 2011. Data-Centric Approaches to Kernel Malware Defense. Major Professor: Dongyan Xu. An operating system kernel is the core of system software which is responsible for the integrity and operations of a conventional computer system. Authors of malicious software (malware) have been continuously exploring various attack vectors to tamper with the k...

2012
Junghwan Rhee Dongyan Xu Eugene H. Spafford Xiangyu Zhang Sonia Fahmy

Rhee, Junghwan Ph.D., Purdue University, August 2011. Data-Centric Approaches to Kernel Malware Defense. Major Professor: Dongyan Xu. An operating system kernel is the core of system software which is responsible for the integrity and operations of a conventional computer system. Authors of malicious software (malware) have been continuously exploring various attack vectors to tamper with the k...

Journal: :Journal of Multimedia 2010
Shengbing Che Zuguo Che Xu Shu

Image compression operator based on discrete cosine transform was brought up. A securer scrambling locational operator was put forward based on the concept of anti-tamper radius. The basic idea of the algorithm is that it first combined image block compressed data with eigenvalue of image block and its offset block, then scrambled or encrypted and embeded them into least significant bit of corr...

2012
Ioana Boureanu Serge Vaudenay

Following both theoretical and practical arguments, we construct UC-secure bit-commitment protocols that place their strength on the sender’s side and are built using tamper-evident devices, e.g., a type of distinguishable, sealed envelopes. We show that by using a second formalisation of tamper-evident distinguishable envelopes we can attain better security guarantees, i.e., EUC-security. We s...

2004
Mahalingam Ramkumar Nasir Memon

Key pre-distribution (KPD) schemes, which are inherently trade-offs between security and complexity, are perhaps well suited for securing large-scale deployments of resource constrained nodes without persistent access to a trusted authority (TA). However, the need to offset their inherent security limitations, calls for some degree of tamper-resistance of nodes. Obviously, if absolute tamperres...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید