نتایج جستجو برای: tampering

تعداد نتایج: 1480  

Journal: :Computer systems science and engineering 2023

Digital picture forgery detection has recently become a popular and significant topic in image processing. Due to advancements processing the availability of sophisticated software, fabrication may hide evidence hinder such criminal cases. The practice modifying original photographic images generate forged is known as digital forging. A section an copied pasted into another part same item or du...

Journal: :IEEE transactions on systems, man, and cybernetics 2022

This work mainly addresses continuous-time multiagent consensus networks where an adverse attacker affects the convergence performances of said protocol. In particular, we develop a novel secure-by-design approach in which presence network manager monitors system and broadcasts encrypted tasks (i.e., hidden edge weight assignments) to agents involved. Each agent is then expected decode received...

2005
Scott Huang David MacCallum Kai Xing Manny Rivera Jiang Li Xiuzhen Cheng

2 Physical Layer 3 2.1 Attacks in the Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.1 Device Tampering . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.2 Eavesdropping . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Countermeasures in the Physical Layer . . . . . . . . . . . . ....

Journal: :Synthese 2021

Can humans get arbitrarily capable reinforcement learning (RL) agents to do their bidding? Or will sufficiently RL always find ways bypass intended objectives by shortcutting reward signal? This question impacts how far can be scaled, and whether alternative paradigms must developed in order build safe artificial general intelligence. In this paper, we study when an agent has instrumental goal ...

2014
Ivan Damgård Sebastian Faust Pratyay Mukherjee Daniele Venturi

We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called “chain” of random variables, defined by a source distribution X with high min-entropy and a number (say, t in total) of arbitrary functions (T1, . . . , Tt) which are applied in succession to that source to generate the chain X T1 −→ X T2 −→ X · · · Tt −→ X. Intuitively, the Chaining Lemma g...

Journal: :IEEE Access 2023

Text information is a natural language dependent, which enhances reliability and security of text data exchanged through Internet networks becoming main concern for researchers. Content authentication, Tampering detection, integrity verification digital content are considered challenges in the communication exchange area Internet. Watermarking algorithms emerge as potential method achieving thi...

2016
Nidhi Patel Narendra

In the last few years there is a tremendous development in the area of high quality digital camera technology. So our life is full of the use of these digital images. However now a days there are lot of software (for example Photoshop, Photoscape, Photoplus and Picasa etc.) that can be used to modify these digital image. Therefore we cannot use these images as a proof or evidence. Therefore det...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید