نتایج جستجو برای: authenticity protection
تعداد نتایج: 186339 فیلتر نتایج به سال:
We present the analysis of a protocol for private authentication in the applied pi calculus. We treat authenticity and secrecy properties of the protocol. Although such properties are fairly standard, their formulation in the applied pi calculus makes an original use of process equivalences. In addition, we treat identity-protection properties, which are a delicate concern in several recent pro...
The contribution discusses oral sources, their use for historical and social research, authenticity reliability, considering the relevant perspective of legal protection.
Nowadays, money is one of the familiar talks worldwide, and also money is inseparable among the people in tradition. But money suffers from lack of security through money laundering, counterfeits, privacy protection and speediness in currency counts. Thus, to have these securities in money an application of RFID is a banknote attached a tag to determine the authenticity of money and to stop cou...
Along with the extensive prevalence of the network and the portable equipments, people can access network resources conveniently. The protection of participants’ privacy and data confidentiality is significant. Authentication mechanism is essential to assure the authenticity of all participants and forbid the illegal accessing. In this paper, we propose a robust remote authentication scheme wit...
Three major aspects in the protection of digital documents have been pointed out, each of them with di erent requirements: rst copyright protection, protecting ownership and usage rights; secondly tamper-proo ng, aiming at checking document integrity; and thirdly authentication, the purpose of which is to check the authenticity of a document. While robust watermarks are typically used for copyr...
In this paper robust image authentication integrated with semi-fragile pixel-wise tamper localization is analyzed. A new pixel-wise transformation robust to blurring/sharpening while fragile to all other image processing operations is proposed. A new method featuring binary and percentage measures with novel ability to integrate human opinion for image authenticity evaluation is presented. Prot...
In this article, we focus on the complementary role of watermarking with respect to medical information security (integrity, authenticity ...) and management. We review sample cases where watermarking has been deployed. We conclude that watermarking has found a niche role in healthcare systems, as an instrument for protection of medical information, for secure sharing and handling of medical im...
Abstractwith the advent of digital media copyright protection is main concern. To protect copyright of images DWT DCT image watermarking is used. In this CDMA approach of embedding watermark is taken so that maximum number of watermarks can be embedded in original image to increase its authenticity. After embedding PSNR values are calculated at each watermark embedding and a table is constructe...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید