نتایج جستجو برای: tamper detection
تعداد نتایج: 567946 فیلتر نتایج به سال:
In this paper, a novel camera tamper detection algorithm is proposed to detect three types of tamper attacks: covered, moved and defocused. The edge disappearance rate is defined in order to measure the amount of edge pixels that disappear in the current frame from the background frame while excluding edges in the foreground. Tamper attacks are detected if the difference between the edge disapp...
Tamper-resistant software (TRS) consists of two functional components: tamper detection and tamper response. Although both are equally critical to the effectiveness of a TRS system, past research has focused primarily on the former, while giving little thought to the latter. Not surprisingly, many successful breaks of commercial TRS systems found their first breaches at the relatively näıve tam...
Tamper detection 2 has an important role to play in domestic nuclear security and safeguards, as well as in international verification and treaty monitoring. Unfortunately, ideas about tamper detection often seem to be based on misconceptions, fuzzy goals, and wishful thinking. Current tamper detection programs are hampered by these problems, as well as by poor training, limited analysis, vague...
The authentications of digital images have become the center of attentions for certain group of companies since the number of doctored images increased. Tampering the digital images in a way that it’s impossible to be detected by naked eyes has become easier with development of image editing tools. Digital watermarking can preserve the authentication of digital images. In this paper we proposed...
An efficient fragile image watermarking technique for pixel level tamper detection and resistance is proposed. It uses five most significant bits of the pixels to generate watermark bits and embeds them in the three least significant bits. The proposed technique uses a logistic map and takes advantage of its sensitivity property to a small change in the initial condition. At the same time, it i...
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, software watermarking, and tamper detection. In this paper we propose a tamper resistance technique which provides both on and offline tamper detection. In our offline approach, the software dynamically detects tamperi...
In this paper, we propose novel algorithmic models based on information fusion and feature transformation in crossmodal subspace for different types of residue features extracted from several intra-frame and inter-frame pixel sub-blocks in video sequences for detecting digital video tampering or forgery. An evaluation of proposed residue features – the noise residue features and the quantizatio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید