A PROJECT ON BALUCHARI SARI

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New attacks on SARI image authentication system

The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been reported recently. In this paper, we propose two new attacks that can compromise the SARI system. The first attack is called a histogram attack which modifies DCT coefficients yet maintains the same relationship between an...

متن کامل

Sustainability Failures of Rural Telecenters: Challenges from the Sustainable Access in Rural India (SARI) Project

We have examined longitudinally an ICT for development project in rural India, closely watching activities and surveying users at as many as 100 Internet facilities in more than 50 different villages. The Sustainable Access in Rural India (SARI) project in Tamil Nadu, India, enjoyed many successes, including palpable—albeit localized—social and economic development impacts as well as the incuba...

متن کامل

A Simulation Based of Setting Policy in Project Acceptance Based on Experiences in Project-Driven SME's

The acceptance of the right project which leads to the realization of the set objectives is one of the most important issues in project-oriented companies. Therefore, corporate managers prefer to work on those projects which ensures the achievement of goals such as increasing financial profits or being the top brands in their rivals market. The present  research aimed at introducing  a systemat...

متن کامل

A Project Scheduling Method Based on Fuzzy Theory

In this paper a new method based on fuzzy theory is developed to solve the project scheduling problem under fuzzy environment. Assuming that the duration of activities are trapezoidal fuzzy numbers (TFN), in this method we compute several project characteristics such as earliest times, latest times, and, slack times in term of TFN. In this method, we introduce a new approach which we call modif...

متن کامل

On the security of the SARI image authentication system

In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In particular, we look at the image digest component of this system. We show that if multiple images have been authenticated with the same secret key and the digests of these images are known to an attacker, Oscar, then he ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research -GRANTHAALAYAH

سال: 2020

ISSN: 2350-0530,2394-3629

DOI: 10.29121/granthaalayah.v8.i8.2020.744