نتایج جستجو برای: tamper

تعداد نتایج: 2422  

2012
Paul Singh

This paper investigates and reviews literature regarding a range of topics important to the research question – the themes apply across all the topics. The topics include label and package warnings, including tamper-evident features, to review their effect on the consumer behaviour of changing usage or purchase decisions. This information was then applied to gain insight into anticounterfeit pr...

2011
Lamiaa M. El Bakrawy Neveen I. Ghali Tai-hoon Kim Aboul ella Hassanien

In this paper, we propose a fragile watermarking hybrid approach using rough set kmeans and exponential particle swarm optimization (EPSO) systems. It is based on a block-wise dependency mechanism which can detect any alterations made to the protected image. Initially, the input image is divided into blocks with equal size in order to improve image tamper localization precision. Then feature se...

1996
Wenbo Mao

Electronic cash should be revocable in order to nullify the effect of attacks mounted by a capable attacker (e.g., double spending by reverse-engineering tamper-resistant devices). For prudent engineering considerations, cash revocability forms a necessary complementary measure to using tamper-resistant devices, adding system security while lowering system cost by reducing the level of physical...

2009
Graham Steel

Security solutions for information systems are increasingly making use of tamper-resistant cryptographic devices, whether they are smartcards carried by commuters on a mass transit system, or high-throughput Hardware Security Modules in a bank ATM transaction processing processing facility. Over the last few years we have been analysing the key management APIs of such tamper-resistant devices. ...

2016
V. Pankajakshan C. Culnane J. C. Chuang Y. C. Hu

This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...

1999
Dimitrios Hatzinakos

In this paper, we consider the problem of digital watermarking to ensure the credibility of multimedia. We speci cally address the problem of fragile digital watermarking for the tamper-proo ng of still images. Applications of our problem include authentication for courtroom evidence, insurance claims and journalistic photography. We present a novel fragile watermarking approach which embeds a ...

1997
Eli Biham Adi Shamir

In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES) . In this pa...

2007
Haibo Chen Fengzhe Zhang Cheng Chen Ziye Yang Rong Chen Binyu Zang Wenbo Mao

Software applications today face constant threat of tampering because of the vulnerability in operating systems and their permissive interface. Unfortunately, existing tamper-resistance approaches often require non-trivial amount of changes to core CPU architectures, operating systems and/or applications. In this paper, we propose an approach that requires only minimal changes to existing commo...

Journal: :Signal Processing 2003
Frédéric Deguillaume Sviatoslav Voloshynovskiy Thierry Pun

Digital watermarking appears today as an e.cient mean of securing multimedia documents. Several application scenarios in the security of digital watermarking have been pointed out, each of them with di/erent requirements. The three main identi1ed scenarios are: copyright protection, i.e. protecting ownership and usage rights; tamper proo1ng, aiming at detecting malicious modi1cations; and authe...

Journal: :Sci. Ann. Comp. Sci. 2013
Ioana Boureanu Serge Vaudenay

Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. These commitments are weak in that it is legitimate that a party could cheat. Unlike in several similar lines of work, in our case, the party is not obliged to cheat, but he has ability to cheat if and when needed. The empowered party is the sende...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید