نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2015

2015
Priyanka Patil

Digital image fragile watermarking is an information hiding technique which adds the watermark into the host image for authentication .while achieving the high integrity one should not compromise with quality distortion of images. numbers of watermarking schemes exist today for balancing between the tamper detection rate and quality of reconstructed images in propose scheme we aim at maintain h...

2006
Parag Agarwal Ketaki Adi B. Prabhakaran

Repositories of motion captured (MoCap) data can be reused for human motion analysis in physical medicine, biomechanics and animation related entertainment industry. MoCap data expressed as a matrix Mm x n can be subject to tampering from shuffling of its elements or change in element values due to motion editing operations. Tampering of archived motion data intentionally or due to machine/huma...

2009
Mariusz H. Jakubowski Chit Wei Saw Ramarathnam Venkatesan

Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produce a crash or gradual failure, rendering the application unusable or troublesome. Such a response is designed to complicate attacks, but has also caused problems for developers and end users, particularly when bugs or other prob...

2003
D. Taskovski D. K. Roberts

This paper describes the operation of a demonstrator of the authentication/tamper detection system proposed in [1] for surveillance systems. The demonstrator consists of three parts. The first captures images, calculates and embeds authentication data, then compresses and records the images to hard disk. The second provides means to tamper a selection of recorded images, and the third checks th...

2015
Jobin Abraham

The paper proposes a method for tamper proofing digital images using the technique of digital watermarking. Many a times the published images are subject to tampering to an extent that the facts conveyed in the original image are distorted. The mechanism presented here describes a method for detecting the regions in image that were subject to illegal modifications. The method also can detect th...

2016
Ashutosh Pandey

This paper proposes a novel pixel wise fragile watermarking scheme in spatial domain by which one can effectively locate the tamper in every pixel of the images accurately and scheme is also protected by user defined secret key which is given explicitly. Proposed watermarking algorithms has good PSNR value and have less complexity of algorithms. Proposed algorithms can also work on color images...

2014
Zahra Jafargholi Daniel Wichs

We consider a public and keyless code (Enc,Dec) which is used to encode a message m and derive a codeword c = Enc(m). The codeword can be adversarially tampered via a function f ∈ F from some “tampering function family” F , resulting in a tampered value c′ = f(c). We study the different types of security guarantees that can be achieved in this scenario for different families F of tampering atta...

Journal: :IEICE Transactions 2005
Guorui Feng Ling-ge Jiang Chen He

Tamper proofing is a crucial problem in the watermarking application. Aiming at the credibility of multimedia, we present a semi-fragile watermark based on the image permutation. Watermarking detection is performed without resorting to the host image and it is only controlled by secrete keys, thus the whole scheme does not have certain security gaps. The simulation experiments show that it can ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید