نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

2014
Sukalyan Som Sarbani Palit Kashinath Dey Dipabali Sarkar Jayeeta Sarkar Kheyali Sarkar

The provision of image tamper detection, localization and restoration forms an important requirement for modern multimedia and communication systems. A discrete wavelet transform (DWT)-based watermarking scheme for this purpose is proposed in this communication. In our scheme, the original image is first partitioned into blocks of size 2 9 2 in which a 1D DWT is applied to produce a watermark w...

2016
Germain Jolly Sylvain Vernois Christophe Rosenberger

Smart cards are tamper resistant devices but vulnerabilities are sometimes discovered. We address in this paper the security and the functional testing of embedded applications in smart cards. We propose an original methodology for the evaluation of applications and we show its benefit by comparing it to a classical certification process. The proposed method is based on the observation of the A...

2015
Hao-Chun Wang Wei-Ming Chen Ping-Yi Lee

In this paper, we propose an efficient method for image tamper detection and recovery. We separate the image into several blocks, and share a block information to two other blocks. It means, there have two copies of one block information for each non-overlapping block. In implementing, we improve Lee's algorithm of watermark embedding, especially when the tampered area is a rounded region or a ...

2014
Anum Javeed Zargar

Watermarking belongs to hide particular information, so that you can easily detect any tamper detection .It is used for confidenality, authentication and copy right protection. In this paper watermarking is done with the help of least significant bit technique (LSB).As LSB technique is used as it has less effect on image. This new algorithm is using LSB of original image and idoing ‘&&’ operati...

Journal: :isecure, the isc international journal of information security 0
a. mortazavi sharif university of technology m. salmasizadeh sharif university of technology a. daneshgar sharif university of technology

a non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. the main idea behind nonmalleable coding is that the adversary should not be able to obtain any valuable information about the message. non-malleablecodes are used in tamper-resilient cryptography and protecting memories against tampering attacks. many different types of nonmalleability have already...

2009
Sukriti Bhattacharya Agostino Cortesi

In this paper we introduce a distortion free watermarking technique for relational databases based on the Abstract Interpretation framework. The watermarking technique is partition based. The partitioning can be seen as a virtual grouping, which does not change neither the value of the table’s elements nor their physical positions. Instead of inserting the watermark directly to the database par...

Journal: :JoWUA 2012
S. Sree Vivek S. Sharmila Deva Selvi Ramarathnam Venkatesan C. Pandu Rangan

We study the problem of traffic aggregation in a network with some natural security constraints. Here each node i has traffic (number of packets) mi and they forward this information through the network to a server node which wishes compute ∑mi. The sever node should not be able to know any additional information about mi’s and an intermediate node should not be able to tamper (without detectio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید