نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
In today’s modern communication society, the authenticity of digital media has never been such importance as it is now. this aspect, reliability images paramount because can be easily manipulated by means sophisticated software, Photoshop. Splicing tampering a commonly used photographic manipulation for modifying images. Detecting splicing remains challenging task in area image forensics. A new...
The complex unfolding of the US opioid epidemic in last 20 years has been subject a large body medical and pharmacological research, it sparked multidisciplinary discussion on how to implement interventions policies effectively control its impact public health. This study leverages Reddit as primary data source investigate crisis. We aimed find cohort users interested discussing use opioids, tr...
In July 2003, computer scientists from Johns Hopkins and Rice Universities released a security analysis of software purportedly from a direct recording electronic (DRE) touchscreen voting machine of a major voting-system vendor. The study drew public attention to a long-simmering controversy about whether current DREs are vulnerable to tampering that could influence the outcome of an election. ...
In July 2003, computer scientists from Johns Hopkins and Rice Universities released a security analysis of software purportedly from a direct recording electronic (DRE) touchscreen voting machine of a major voting-system vendor. The study drew public attention to a long-simmering controversy about whether current DREs are vulnerable to tampering that could influence the outcome of an election. ...
As three-dimensional (3D) printing technology is widely used, security issues have arisen, especially in the terminal parts of automobiles, aircraft, and 3D-printed military equipment. If original design models or STL (stereolithography) files are hacked tampered, severe consequences can be anticipated. In this paper, we propose a demonstration to use high-throughput blockchain store “fingerpri...
A major challenge in software protection is the problem of tampering where an adversary modifies a program and uses it in a way that was not intended or desired. Several ad hoc techniques for software tamper resistance have been proposed, some of which provide a significant level of resilience against tampering. However, the literature lacks a formal definition of tampering that takes into acco...
Non-malleable codes, introduced as a relaxation of error-correcting codes by Dziembowski, Pietrzak and Wichs (ICS ’10), provide the security guarantee that the message contained in a tampered codeword is either the same as the original message or is set to an unrelated value. Various applications of non-malleable codes have been discovered, and one of the most significant applications among the...
Semi-fragile watermarks are used to detect unauthorised changes to an image, whereas tolerating allowed changes such as compression. Most semi-fragile algorithms that tolerate compression assume that because compression only removes the less visually significant data from an image, tampering with any data that would normally be removed by compression cannot affect a meaningful change to the ima...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید