نتایج جستجو برای: tampering
تعداد نتایج: 1480 فیلتر نتایج به سال:
The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical ...
The use of digital photography has increased over the past few years, a trend which opens the door for new and creative ways to forge images. The manipulation of images through forgery influences the perception an observer has of the depicted scene, potentially resulting in ill consequences if created with malicious intentions. This poses a need to verify the authenticity of images originating ...
Tampering resistance of a digital watermark scheme has recently drawn much attention of many researchers after various techniques against image manipulations have been presented and proved robust. In this paper, two digital watermark models for resolving rightful ownership are presented; the second one also authenticates the legitimate customer ± the user such as a webmaster that obtains an ima...
A significant web security issue facing Internet users and organizations is the securing of web content against unauthorised tampering. Users must be comfortable with the security offered by web applications that sensitive web-based services. Some progress has been made in addressing the verification of web server content integrity, but current solutions are restricted by the limitations of the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید