Suasana Mendung di Cempaka Sari
نویسندگان
چکیده
منابع مشابه
New attacks on SARI image authentication system
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations. Some vulnerabilities of the system have been reported recently. In this paper, we propose two new attacks that can compromise the SARI system. The first attack is called a histogram attack which modifies DCT coefficients yet maintains the same relationship between an...
متن کاملSurvey of Suicide Attempts in Sari
OBJECTIVE Studying suicide can be of assistance to prepare the ground for the adoption of effective preventative measures. In the present study, our aim was an in-depth review of suicide epidemiology in the city of Sari, in the northern part of Iran. Our focus was on geo-demographic and other risk factors affecting the frequency of suicide in order to demonstrate populations with greater risk o...
متن کاملIl Birraio di Preston di Andrea Camilleri
Nella letteratura italiana degli ultimi decenni lo scrittore Andrea Camilleri rappresenta un caso raro di successo editoriale e di pubblico, con centinaia di migliaia di copie vendute, traduzioni in molte lingue, riconoscimenti e convegni in suo onore. Uno dei suoi titoli più noti è il romanzo storico Il Birraio di Preston. Lo scrittore è diventato famoso presso il grande pubblico inizialmente ...
متن کاملDI SALERNO Dipartimento di Informatica
Despite modern technology provide new tools to measure the world around us, we are quickly generating massive amounts of high-dimensional, spatialtemporal data. In this work, I deal with two types of datasets: one in which the spatial characteristics are relatively dynamic and the data are sampled at different periods of time, and the other where many dimensions prevail, although the spatial ch...
متن کاملOn the security of the SARI image authentication system
In this paper we investigate the image authentication system SARI, proposed by C.Y. Lin and S.F. Chang [1], that distinguishes JPEG compression from malicious manipulations. In particular, we look at the image digest component of this system. We show that if multiple images have been authenticated with the same secret key and the digests of these images are known to an attacker, Oscar, then he ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wacana Seni Journal of Arts Discourse
سال: 2020
ISSN: 1675-3410,2180-4311
DOI: 10.21315/ws2020.19.6