نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
− As Internet Telephony and Voice over IP (VoIP) are considered advanced Internet applications/services, they are vulnerable to attacks existing in Internet applications/services. For instance HTTP digest authentication attacks, malformed messages, message tampering with malicious code, SQL injection and more, can be launched against any Internet application/service. In this paper, we describe,...
Chun-Shien Lu Hong-Yuan Mark Liao Academia Sinica Institute of Information Science Taipei, Taiwan E-mail: [email protected] Abstract. The authors propose an image authentication scheme, which is able to detect malicious tampering while tolerating some incidental distortions. By modeling the magnitude changes caused by incidental distortion and malicious tampering as Gaussian distributions ...
By using existing mechanisms, especially for SBGP, IP prefix hijacking and AS-PATH tampering can be prevented despite some unsatisfied inherent factors. However, except IP prefix hijacking and AS-PATH tampering, there are some other traffic attraction attacks, which are currently not considered and prevented in existing mechanisms. Attracting more by announcing long paths, which is typical one ...
Recently watermarking algorithm plays an important role in image forensics. One of the main applications is protect—ion of images against tampering. An algorithm that full-fills two purposes has to be designed that includes: 1) detection of tampered area of received image and 2) information recovery in the tampered zones. These tasks using watermarking are accomplished by state-of-the-art techn...
Sunil Kumar , J.V. Desai , S. Mukherjee , P. K. Das # # Faculty of Engineering & Technology Mody Institute of Technology & Science Lakshmangarh, India * Department of Electrical Engineering Indian Institute of Technology Roorkee, India 1 [email protected] 2 [email protected] 3 [email protected] Abstract— Digital image forgery detection is one of the hot research area in the rec...
Additive Manufacturing (AM, or 3D printing) is a novel manufacturing technology that is being adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper we address sabotage via tampering with the 3D printing process. We present an object verification system using side-channel emanations: sound gene...
Non-malleable codes are randomized codes that protect coded messages against modification by functions in a tampering function class. These codes are motivated by providing tamper resilience in applications where a cryptographic secret is stored in a tamperable storage device and the protection goal is to ensure that the adversary cannot benefit from their tamperings with the device. In this pa...
In a recent result, Dachman-Soled et al. (TCC ’15) proposed a new notion called locally decodable and updatable non-malleable codes, which informally, provides the security guarantees of a non-malleable code while also allowing for efficient random access. They also considered locally decodable and updatable non-malleable codes that are leakage-resilient, allowing for adversaries who continuall...
With the rapid development of multimedia signal processing and digital communication technology, a number information security issues have also emerged correspondingly, such as content tampering...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید