نتایج جستجو برای: tamper

تعداد نتایج: 2422  

2006
Parag Agarwal Ketaki Adi B. Prabhakaran

Repositories of motion captured (MoCap) data can be reused for human motion analysis in physical medicine, biomechanics and animation related entertainment industry. MoCap data expressed as a matrix Mm x n can be subject to tampering from shuffling of its elements or change in element values due to motion editing operations. Tampering of archived motion data intentionally or due to machine/huma...

Journal: :CoRR 2010
Malik Sikandar Hayat Khiyal Aihab Khan Sehrish Amjad M. Shahid Khalil

For enhancing the protection level of dynamic graph software watermarks and for the purpose of conducting the analysis which evaluates the effect of integrating two software protection techniques such as software watermarking and tamper-proofing, constant encoding technique along with the enhancement through the idea of constant splitting is proposed. In this paper Thomborson technique has been...

2004
Ping Wang Kwangjo Kim

Code modification is the main method for software piracy. Making software tamper resistant is the challenge for software protection. In this paper, we present and explore a methodology that we believe can protect program integrity in a more tamper-resilient and flexible manner. we describe a dynamic integrity verification mechanism designed to prevent modification of software. The mechanism mak...

2009
Mariusz H. Jakubowski Chit Wei Saw Ramarathnam Venkatesan

Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produce a crash or gradual failure, rendering the application unusable or troublesome. Such a response is designed to complicate attacks, but has also caused problems for developers and end users, particularly when bugs or other prob...

2008
Jin Li Kwangjo Kim

Fuzzy identity-based encryption (FIBE) has found many applications, such as biometric-based encryption, since its notion was firstly proposed by Sahai and Waters [15]. In this paper, we show how to minimize the damage of secret key exposure in FIBE. We introduce a new notion which we call fuzzy identity-based key-insulated encryption (FIBKIE). In FIB-KIE, the secret key associated with an ident...

2015
Dennis Heimbigner

An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-resistant interpreter for a programming language – currently Lisp 1.5 – combined with the use of a secure co-processor can address this problem. This solution executes the interpreter on the secure coprocessor while the code and data...

Journal: :Communications in computer and information science 2022

Abstract Since its introduction in Bitcoin, the blockchain has proven to be a versatile data structure. In role as an immutable ledger, it grown beyond initial use financial transactions used recording wide variety of other useful information. this paper, we explore application outside traditional decentralized, domain. We show how, even with only single “mining” node, proof-of-work can corners...

2013
Chan-Il Woo Seung-Dae Lee

Fragile watermarking has the characteristics where the inserted watermark should be easily breakable for a trivial tampering of the image. So, fragile watermarking technique is proposed for the purpose of authentication or tamper detection. In this paper, we propose an efficient image tamper detection method using block-wise technique which is able to detect the tamper locations. In the propose...

2000
Masayuki Terada Hiroshi Kuno Masayuki Hanadate

This paper proposes FlexToken, a new copy prevention scheme for digital rights such as tickets or coupons, which are circulated as pieces of paper in the real world. The important feature of this scheme is that digital rights are represented using two separate types of information: the contents and the token of the rights. The token represents the \genuineness" of the contents and distinguishes...

Journal: :J. Information Security 2012
Shweta Tripathi Bandu Baburao Meshram

Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید