نتایج جستجو برای: tampering

تعداد نتایج: 1480  

2017
Thiagarajan Visvanathan

-Because of the strong and successfulness, tampering of digital images depends upon the flexible architecture for a derivative estimation has become an important method to a spectacle for a large number of approaches. Regulated on an inherent range, the tampering of digital image procedure is varied and carried out. The beginning of a bridging origination which dilutes into a simple procedure. ...

2006
Adam J. Rocke Ronald F. DeMara

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...

Journal: :IACR Cryptology ePrint Archive 2012
Feng-Hao Liu Anna Lysyanskaya

It is notoriously difficult to create hardware that is immune from side channel and tampering attacks. A lot of recent literature, therefore, has instead considered algorithmic defenses from such attacks. In this paper, we show how to algorithmically secure any cryptographic functionality from continual split-state leakage and tampering attacks. A split-state attack on cryptographic hardware is...

Journal: :IACR Cryptology ePrint Archive 2016
Ronald Cramer Ivan Damgård Nico Döttling Irene Giacomelli Chaoping Xing

Non-malleable codes were introduced by Dziembowski et al. (ICS 2010) as coding schemes that protect a message against tampering attacks. Roughly speaking, a code is non-malleable if decoding an adversarially tampered encoding of a message m produces the original message m or a value m ′ (possibly ⊥) completely unrelated to m . It is known that non-malleability is possible only for restricted cl...

2015
Shengbei Wang Ryota Miyauchi Masashi Unoki Nam Soo Kim

Unauthorized tampering in speech signals has brought serious problems when verifying their originality and integrity. Digital watermarking can effectively check if the original speech signals have been tampered by embedding digital data into them. To be effective, watermarking method should be implemented according to four requirements of (1) inaudibility to human auditory system, (2) blindness...

Journal: :IACR Cryptology ePrint Archive 2014
Shashank Agrawal Divya Gupta Hemanta K. Maji Omkant Pandey Manoj Prabhakaran

A non-malleable code protects messages against various classes of tampering. Informally, a code is non-malleable if the message contained in a tampered codeword is either the original message, or a completely unrelated one. Although existence of such codes for various rich classes of tampering functions is known, explicit constructions exist only for “compartmentalized” tampering functions: i.e...

Journal: :CoRR 2018
Saeed Mahloujifar Dimitrios I. Diochnos Mohammad Mahmoody

Recently, Mahloujifar and Mahmoody (TCC’17) studied attacks against learning algorithms using a special case of Valiant’s malicious noise, called p-tampering, in which the adversary gets to change any training example with independent probability p but is limited to only choose ‘adversarial’ examples with correct labels. They obtained p-tampering attacks that increase the error probability in t...

2011
Yael Tauman Kalai Bhavana Kanukurthi Amit Sahai

A large and growing body of research has sought to secure cryptographic systems against physical attacks. Motivated by a large variety of real-world physical attacks on memory, an important line of work was initiated by Akavia, Goldwasser, and Vaikuntanathan [1] where security is sought under the assumptions that: (1) all memory is leaky, and (2) leakage can be an arbitrarily chosen (efficient)...

2009
Siome Goldenstein Anderson Rocha

Amidst many different forms of image manipulation, how to convince a jury of a tampering? Is traditional expert opinions enough? In this paper, using a high-profile Brazilian case as a guideline, we explain how we can take advantage of important statistical methodologies and state-of-the-art techniques to verify evidences of digital tampering, beyond reasonable doubt.

Journal: :Nihon Chikusan Gakkaiho 1985

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید