نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

2004
Richard T. Snodgrass Shilong Yao Christian S. Collberg

Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable. It is not sufficient to say, “our data is correct, because we store all interactions in a...

2011
Ferdinando Di Martino Salvatore Sessa

An original image is compressed with fuzzy transforms and is divided in images of sizes 2×2 on which we apply a known fragile watermarking process. A preprocessing phase is considered to determine the better compression rate for the coding process. We test this scheme in tamper detection analysis on a sample of images. The results are good in terms of accuracy for tamper detection with compress...

Journal: :Malaysian Journal of Computer Science 2021

Most of data over the Internet today is hosted on outsourced third-party servers which are not trusted. Sometimes to be distributed other organizations or individuals for pre-agreed use. In both these scenarios susceptible malicious tampering so there a need some mechanism verify database integrity. Moreover, authentication process should able differentiate between valid updates and modificatio...

Journal: : 2022

Recently, fake and fabricated images that have been manipulated for several purposes, including cosmetic some illegal spread on social media. And because this is not an easy matter, it has become necessary researchers in field to search investigate the types of images, verify their authenticity how manipulate them. Therefore, aim research serve as assistant researcher who wants enter field. In ...

1998
Deepa Kundur Dimitrios Hatzinakos

In this paper we present a novel fragile watermarking scheme for the tamper-proofing of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modified. We call such a technique a telltale tamper-proofing method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quan...

1998
Deepa Kundur Dimitrios Hatzinakos

In this paper we present a novel fragile watermarking scheme for the tamper-proo ng of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modi ed. We call such a technique a telltale tamper-proo ng method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quantiz...

Journal: :I. J. Network Security 2018
Ahmed A. Elngar

Security of networks is the most important challenge of the Internet of Things (IoT) that need smarter security mechanisms. Therefore, a tamper detection (TD) is an efficient security mechanism based on networks of IoT for healthcare applications, which used to deal with security violations. In this paper, a new TD mechanism based IoT for real data of healthcare application called (IOTTD) model...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید