نتایج جستجو برای: tampering

تعداد نتایج: 1480  

2012
Rachel A. Miller

Acknowledgments This thesis is based on joint work with Professor Mihir Bellare and David Cash. I'd like to express gratitude for the time that we explored ideas together; you were wonderful to work with! A very special thank you to my Advisor, Professor Shafi Goldwasser, for such caring mentorship – it has been such a pleasure to work and to learn under you for my time at MIT. Finally, I'd lik...

2014
Govindraj Chittapur

We are proposing forensic techniques that are capable of detecting traces of tampering in digital Video without specialized hardware. These techniques operate under The assumption that video contain naturally occurring properties which are disturbed by Tampering, and which can be quantifed, measured, and used to expose video fakes. In this context we are proposing techniques used in copy-paste ...

2012
Piyu Tsai Yu-Chen Hu Hsiu-Lien Yeh Wei-Kuan Shih

In this paper, a watermarking for multi-resolution image authentication is proposed. The most important image content with progressive characteristic is taken as the authentication code. The authentication code is then embedded/extracted according to multi-resolution image coding. The experimental results show the validity of the proposed scheme. The significant tampering can be detected firstl...

Journal: :Signal & Image Processing : An International Journal 2013

Journal: :Comput. J. 2012
Xiaofeng Wang Nanning Zheng Jianru Xue Zhenli Liu

We proposed an image signature method for content authentication, which applies a hierarchical approach to construct an image signature. In the first level, DWT and DCT are used to extract image features; then these features are encrypted by using sub-keys that are generated by a cryptographically hash function. In the second level, Karhunen–Loeve transformation is used to reduce the signature ...

2017
V. M. Thakare

A packet dropping and message tampering attack contains data which routed between source and destination. Packet dropping attack happens accidently or deliberately on network or packet switching network. Message tampering attack causes measure problem in message transmission activity, due to unauthorized party tampered message and can change message contains so it hard to detect that tampered m...

2003
Fangyong Hou Zhiying Wang Zhen Liu Yun Liu

This paper indicates a potential security threat which may do harm to distributed computing security. As the program is distributed to run in the remote nodes, adversary may use simulator to produce false results to do tampering. Some sophisticated simulator can give powerful tampering ability to adversary, with the reason explained in this paper. In order to solve this security problem, Real P...

Journal: :J. Visual Communication and Image Representation 2014
Deng-Yuan Huang Chao-Ho Chen Tsong-Yi Chen Wu-Chih Hu Bo-Cin Chen

Camera tampering may indicate that a criminal act is occurring. Common examples of camera tampering are turning the camera lens to point to a different direction (i.e., camera motion) and covering the lens by opaque objects or with paint (i.e., camera occlusion). Moreover, various abnormalities such as screen shaking, fogging, defocus, color cast, and screen flickering can strongly deteriorate ...

2007
Seongan Lim Ikkwon Yie

To assure the privacy of RFID Tags, symmetric challenge-response identification protocols have been considered. Due to the low cost requirements for tags, it has been assumed that the tampering of RFID tags is possible. In this paper, we estimate the privacy leakage of challenge-response RFID authentication protocols based on symmetric key using discrete probability under the assumption that ta...

2011
N. V. Narendra Kumar Harshit J. Shah R. K. Shyamasundar

Measuring integrity of software after deployment is important to ensure that software is not tampered with. Software tampering problem manifests itself in different ways: (i) done by an attacker to harm the user/system (e.g., infection by virus), and (ii) done by the user himself to use the software in ways that the creator of software did not intend/permit (e.g., tamper the software to bypass ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید