نتایج جستجو برای: tamper detection
تعداد نتایج: 567946 فیلتر نتایج به سال:
The provision of image tamper detection, localization and restoration forms an important requirement for modern multimedia and communication systems. A discrete wavelet transform (DWT)-based watermarking scheme for this purpose is proposed in this communication. In our scheme, the original image is first partitioned into blocks of size 2 9 2 in which a 1D DWT is applied to produce a watermark w...
An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card Applications
Smart cards are tamper resistant devices but vulnerabilities are sometimes discovered. We address in this paper the security and the functional testing of embedded applications in smart cards. We propose an original methodology for the evaluation of applications and we show its benefit by comparing it to a classical certification process. The proposed method is based on the observation of the A...
In this paper, we propose an efficient method for image tamper detection and recovery. We separate the image into several blocks, and share a block information to two other blocks. It means, there have two copies of one block information for each non-overlapping block. In implementing, we improve Lee's algorithm of watermark embedding, especially when the tampered area is a rounded region or a ...
Watermarking belongs to hide particular information, so that you can easily detect any tamper detection .It is used for confidenality, authentication and copy right protection. In this paper watermarking is done with the help of least significant bit technique (LSB).As LSB technique is used as it has less effect on image. This new algorithm is using LSB of original image and idoing ‘&&’ operati...
a non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. the main idea behind nonmalleable coding is that the adversary should not be able to obtain any valuable information about the message. non-malleablecodes are used in tamper-resilient cryptography and protecting memories against tampering attacks. many different types of nonmalleability have already...
In this paper we introduce a distortion free watermarking technique for relational databases based on the Abstract Interpretation framework. The watermarking technique is partition based. The partitioning can be seen as a virtual grouping, which does not change neither the value of the table’s elements nor their physical positions. Instead of inserting the watermark directly to the database par...
We study the problem of traffic aggregation in a network with some natural security constraints. Here each node i has traffic (number of packets) mi and they forward this information through the network to a server node which wishes compute ∑mi. The sever node should not be able to know any additional information about mi’s and an intermediate node should not be able to tamper (without detectio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید