A PROJECT ON BALUCHARI SARI
نویسندگان
چکیده
منابع مشابه
New attacks on SARI image authentication system
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been reported recently. In this paper, we propose two new attacks that can compromise the SARI system. The first attack is called a histogram attack which modifies DCT coefficients yet maintains the same relationship between an...
متن کاملSustainability Failures of Rural Telecenters: Challenges from the Sustainable Access in Rural India (SARI) Project
We have examined longitudinally an ICT for development project in rural India, closely watching activities and surveying users at as many as 100 Internet facilities in more than 50 different villages. The Sustainable Access in Rural India (SARI) project in Tamil Nadu, India, enjoyed many successes, including palpable—albeit localized—social and economic development impacts as well as the incuba...
متن کاملA Simulation Based of Setting Policy in Project Acceptance Based on Experiences in Project-Driven SME's
The acceptance of the right project which leads to the realization of the set objectives is one of the most important issues in project-oriented companies. Therefore, corporate managers prefer to work on those projects which ensures the achievement of goals such as increasing financial profits or being the top brands in their rivals market. The present research aimed at introducing a systemat...
متن کاملA Project Scheduling Method Based on Fuzzy Theory
In this paper a new method based on fuzzy theory is developed to solve the project scheduling problem under fuzzy environment. Assuming that the duration of activities are trapezoidal fuzzy numbers (TFN), in this method we compute several project characteristics such as earliest times, latest times, and, slack times in term of TFN. In this method, we introduce a new approach which we call modif...
متن کاملOn the security of the SARI image authentication system
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In particular, we look at the image digest component of this system. We show that if multiple images have been authenticated with the same secret key and the digests of these images are known to an attacker, Oscar, then he ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research -GRANTHAALAYAH
سال: 2020
ISSN: 2350-0530,2394-3629
DOI: 10.29121/granthaalayah.v8.i8.2020.744