نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

Journal: :International Journal of Image, Graphics and Signal Processing 2013

2003
Mike Jochen Lori L. Pollock Lisa M. Marvel

Much of present day computer software is highly mobile, with a great amount of software being delivered to a client host via a network shortly before execution begins. The integrity of mobile code is one important aspect for the secure execution of the code on the client host. We describe a cryptographic-steganographic approach to embedding authentication data within executable object files. Ou...

2015
M. A. Mohamed Abdelhameed Ibrahim

This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...

2011
Lamiaa M. El Bakrawy Neveen I. Ghali Tai-hoon Kim Aboul ella Hassanien

In this paper, we propose a fragile watermarking hybrid approach using rough set kmeans and exponential particle swarm optimization (EPSO) systems. It is based on a block-wise dependency mechanism which can detect any alterations made to the protected image. Initially, the input image is divided into blocks with equal size in order to improve image tamper localization precision. Then feature se...

2016
V. Pankajakshan C. Culnane J. C. Chuang Y. C. Hu

This paper presents two fragile watermarking schemes for digital image authentication with tamper detection and localization. We combine a proposed chaos-based encryption algorithm with the two schemes in order to improve the security, tamper detection sensitivity and tamper localization accuracy of the two schemes. The first proposed fragile watermarking scheme can be classified as a block-bas...

2014
Jason Reeves Sean Smith

Utilities are currently installing a number of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data Acquisition) networks as part of their smart grid rollout. These devices present a security risk for utilities: They are deployed in many different places and environments; they have very little physical security; and they have direct access b...

Journal: :IEICE Transactions 2007
Nozomi Ishihara Kôki Abe

This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید