نتایج جستجو برای: tamper detection

تعداد نتایج: 567946  

Journal: :E3S web of conferences 2023

Security is one of the important characteristics while transmitting data particularly medical images and patient information over cyberspace without any loss information. In proposed method LWT, DCT SHA-256 hashing techniques are used to provide security detect tampers in ROI images. this paper, image segmented into three regions, region interest (ROI), non (RONI) BORDER regions. an area that h...

2008
Balachander Krishnamurthy Saurabh Kumar Ashlesh Sharma Lakshminarayanan Subramanian

Recently enterprises and corporations have reported several incidents of leakage of sensitive data and plagiarism of copyrighted information on the Web. We address the Bulk Document Leakage (BDL) problem: Given a large set of sensitive or copyrighted documents in an enterprise, determine if a portion of the document set has leaked (or has been plagiarized) and been published on the Web. An adve...

Journal: :EAI Endorsed Transactions on Pervasive Health and Technology 2022

INTRODUCTION: A new telemedicine video tamper detection system based on wireless sensor network is proposed and designed in this paper. OBJECTIVES: This work to improve the performance of communication accurately detect area video. METHODS: The nodes sensing layer are responsible for collecting information transmitting data layer. completes storage transmits it processing module detects tampere...

2015
Reza Hajisheykhi Ali Ebnenasir Sandeep S. Kulkarni

We propose the notion of tamper-evident stabilization –that combines stabilization with the concept of tamper evidence– for computing systems. On the first glance, these notions are contradictory; stabilization requires that eventually the system functionality is fully restored whereas tamper evidence requires that the system functionality is permanently degraded in the event of tampering. Tamp...

Journal: :Physical Review Applied 2016

2017
Damanpreet Kaur Amanjot Kaur

Video stabilization is an important enhancement techniques used to remove undesired motion in a video. The sphere of photo forensics is expanding hastily. Many passive photograph tamper detection techniques were presented techniques have been presented. Some of those techniques use characteristic extraction methods for tamper detection and localization. This work is based totally on extracting ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید