نتایج جستجو برای: tampering

تعداد نتایج: 1480  

Journal: :JCM 2013
Roberto Magán-Carrión Fernando Pulido-Pulido José Camacho Pedro García-Teodoro

Wireless sensor networks (WSNs) are highly sensible to data integrity attacks, which have an important impact on a number of relevant deployments and services. This paper introduces a tolerance approach to fight against data modification attacks in WSNs, which is based on a missing data imputation scheme. The proposal relies on two principal contributions: (1) a multivariate statistical techniq...

2006
Ching-Tang Hsieh

In order to improve the detection of malicious tampering images, it is necessary to decrease the fragility of hidden watermarks, even for digital images which have been incidentally distorted. In this paper, we propose a new invariant semi-fragile digital watermarking technique based on eigenvalues and eigenvectors of real symmetric matrix generated by the four pixel pairs. A signature bit for ...

Journal: :Signal Processing 2011
Sergio Bravo-Solorio Asoke K. Nandi

In this paper, we present a new fragile watermarking method aimed at providing improved tampering localisation and self-recovery capabilities. First, a secure blockwise mechanism, resilient to cropping, is used to localise distorted blocks of pixels. Subsequently, the tampering localisation accuracy is refined by means of an iterative pixel-wise mechanism, which estimates the original watermark...

Journal: :Educational and Psychological Measurement 2015

2004
Alin C. Popescu Hany Farid

A digitally altered photograph, often leaving no visual clues of having been tampered with, can be indistinguishable from an authentic photograph. As a result, photographs no longer hold the unique stature as a definitive recording of events. We describe several statistical techniques for detecting traces of digital tampering in the absence of any digital watermark or signature. In particular, ...

2013
Jonny Karlsson Laurence Dooley Göran Pulkkis

Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a pa...

Journal: :Foundations and Trends in Databases 2011
Haowen Chan Hsu-Chun Hsiao Adrian Perrig Dawn Xiaodong Song

We present a survey of the various families of approaches to secure aggregation in distributed networks such as sensor networks. In our survey, we focus on the important algorithmic features of each approach, and provide an overview of a family of secure aggregation protocols which use resilient distributed estimation to retrieve an approximate query result that is guaranteed to be resistant ag...

2013
Aruni Singh Sanjay Kumar Singh

Modern face recognition systems are vulnerable to spoofing attack. Spoofing attack occurs when a person tries to cheat the system by presenting fake biometric data gaining unlawful access. A lot of researchers have originated novel techniques to fascinate these types of face tampering attack. It seems that no comparative studies of different face recognition algorithms on same protocols and fak...

2014
Zahra Jafargholi Daniel Wichs

We consider a public and keyless code (Enc,Dec) which is used to encode a message m and derive a codeword c = Enc(m). The codeword can be adversarially tampered via a function f ∈ F from some “tampering function family” F , resulting in a tampered value c′ = f(c). We study the different types of security guarantees that can be achieved in this scenario for different families F of tampering atta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید