An Improved Statistic for the Pooled Triangle Test Against PRNU-Copy Attack

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anti-Forensics of Camera Identification and the Triangle Test by Improved Fingerprint-Copy Attack

The fingerprint-copy attack aims to confuse camera identification based on sensor pattern noise. However, the triangle test shows that the forged images undergone fingerprint-copy attack would share a non-PRNU (Photo-response nonuniformity) component with every stolen image, and thus can detect fingerprint-copy attack. In this paper, we propose an improved fingerprint-copy attack scheme. Our ma...

متن کامل

Poset-based Triangle: An Improved Alternative for Bilattice-based Triangle

Bilattice-based triangle provides elegant algebraic structure for reasoning with vague and uncertain information. But the truth and knowledge ordering of intervals in bilattice-based triangle can not deal with nonmonotonic reasoning and are not always intuitive. In this work, we construct an alternative algebraic structure, namely poset-based triangle and we provide with proper logical connecti...

متن کامل

An Improved Power Analysis Attack Against Camellia's Key Schedule

This paper presents an improved simple power analysis attack against the key schedule of Camellia. While the original attack required an exact determination of the Hamming weight of intermediate data values based on power measurements, in this paper, two variants of the simple power analysis attack are presented and shown to be tolerant of errors that might occur in the Hamming weight determina...

متن کامل

The Watermark Copy Attack

Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy the embedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. ...

متن کامل

Improved Fault Attack Against Eta Pairing

In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been developed. With the enhancement of implementation efficiency, the algorithms of pairings are usually embedded in identity aware devices such as smartcards. Although many fault attacks and countermeasures for public key and elliptic curve cryptographic systems are known, the security of pairing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Signal Processing Letters

سال: 2018

ISSN: 1070-9908,1558-2361

DOI: 10.1109/lsp.2018.2863045