نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

2010
Girija Chetty Monica Singh

In this paper, we propose a novel fuzzy fusion of image residue features for detecting tampering or forgery in video sequences. We suggest use of feature selection techniques in conjunction with fuzzy fusion approach to enhance the robustness of tamper detection methods. We examine different feature selection techniques, the independent component analysis (ICA), and the canonical correlation an...

Journal: :Journal of Artificial Intelligence 2017

2010
Girija Chetty

In this paper, we propose novel algorithmic models based on feature transformation in cross-modal subspace and their multimodal fusion for different types of residue features extracted from several intra-frame and inter-frame pixel sub-blocks in video sequences for detecting digital video tampering or forgery. An evaluation of proposed residue features – the noise residue features and the quant...

Journal: :J. Information Security 2012
Shweta Tripathi Bandu Baburao Meshram

Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing w...

Journal: :journal of ai and data mining 2015
r. davarzani s. mozaffari kh. yaghmaie

feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of local binary pattern features. in this paper, we investigate the use of local binary patterns for percep...

2015
Ibrahim Ethem Bagci Utz Roedig Ivan Martinovic Matthias Schulz Matthias Hollick

The Internet of Things (IoT) is increasingly used for critical applications and securing the IoT has become a major concern. Among other issues it is important to ensure that tampering with IoT devices is detected. Many IoT devices use WiFi for communication and Channel State Information (CSI) based tamper detection is a valid option. Each 802.11n WiFi frame contains a preamble which allows a r...

2016
Bhargavi Nisarga Eric Peeters

Security in embedded systems is a topic that is gaining prominence as embedded systems and products are being deployed everywhere to be used in our everyday routines. Security concerns for embedded system developers and its users scales from adversaries having remote to physical access of the system. Increasing security for remote access includes incorporating secure data communication and secu...

2013
Mandeep Kaur

Image authentication and image tamper detection. Double JPEG compression might occur when a portion is cut from an image which may or may not be: Image tamper detection using passive-blind techniques has become a hot research field. It uses non-intrusive methods which uses image functions to detect tampering. The tampering operation changes the inherent statistical properties of an image which ...

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2014

Journal: :TELKOMNIKA (Telecommunication Computing Electronics and Control) 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید