نتایج جستجو برای: tampering

تعداد نتایج: 1480  

2014
Kishor T. Patil Santosh K. Narayankhedkar

Tampering of RFID (Radio Frequency Identification) tag data results in misinterpretation of the object to which the tag is attached. Due to the advantages offered by RFID in the field of contactless auto identification, it is being used in the widespread range of applications. With growing adoption of RFID in industries, supply chain management, healthcare systems, security systems, government ...

2015
Mastropietro

Despite the development and approval of abuse deterrent medications aiming to decrease the misuse of prescription opioids, abuse remains prevalent in the United States (U.S.) and abroad. Additionally, abusers have refined their tampering methods in order to bypass the advanced deterrent mechanisms of these novel formulation technologies [1,2]. Tampering with a medication can be done to assist i...

2006
Parag Agarwal Ketaki Adi B. Prabhakaran

Repositories of motion captured (MoCap) data can be reused for human motion analysis in physical medicine, biomechanics and animation related entertainment industry. MoCap data expressed as a matrix Mm x n can be subject to tampering from shuffling of its elements or change in element values due to motion editing operations. Tampering of archived motion data intentionally or due to machine/huma...

2004
Ronald F. DeMara Adam J. Rocke

Detection of malicious activity by insiders, people with legitimate access to resources and services, is particularly difficult in a network environment. In this paper, a novel classification of tampering modes is identified that can be undertaken by insiders against network Intrusion Detection Systems (IDSs). Five categories of tampering modes are defined as spoofing, termination, sidetracking...

Journal: :Computers & Security 2010
Sven Ehlert Dimitris Geneiatakis Thomas Magedanz

Session Initiation Protocol is a core protocol for coming real time communication networks, including VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly susceptible to Denial-of-Service Attacks launched against SIP servers. More than 20 different research works have been published to address SIP-related DoS problems. In this survey we explain three different types of DoS a...

2015
Manoj Nagar Pinky Brahmbhatt Sarada Devi

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract In the last few years there is a tremendous development in the area of high quality digital camera technology. So our life is full of the use of these digital images. However now a days there are lot of software (for example Photoshop, Photoscape, ...

2014
Feng Liu Hao Feng

With the rapid development and popularization of Photoshop, ACDSee and other digital processing and editing software, the non-professionals can easily modify the image to achieve the purpose of beautification, spoof or malicious tampering. Digital tampering usually has ulterior motives, which would bring crisis of confidence to the credibility of media image, the authenticity of judicial eviden...

Journal: :Computers & Security 2004
Ronald F. DeMara Adam J. Rocke

Detection of malicious activity by insiders, people with legitimate access to resources and services, is particularly difficult in a network environment. In this paper, a novel classification of tampering modes is identified that can be undertaken by insiders against network Intrusion Detection Systems (IDSs). Five categories of tampering modes are defined as spoofing, termination, sidetracking...

2006
Yeh-Kuang Wu

In order to improve the detection of malicious tampering images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been incidentally distorted. In this paper, we propose a new invariant semi-fragile digital watermarking technique based on eigenvalues and eigenvectors of real symmetric matrix generated by the four pixel pairs. A signature bit for ...

2016
Gurleen Kaur Rupinder Kaur Kanwaljeet Kaur

In today’s digital age, powerful and low cost digital technology has made it possible to create effective photographic forgeries. Therefore it becomes very challenging for end users to distinguish whether the image is novel or tempered. In the fields such as forensics, medical imaging, e-commerce, authenticity and integrity of digital images is crucial. The usage of digital images in such field...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید