Detecting tampering in a random hypercube
نویسنده
چکیده
Consider the random hypercube H 2 (pn) obtained from the hypercube H n 2 by deleting any given edge with probabilty 1− pn, independently of all the other edges. A diameter path in H 2 is a longest geodesic path in H n 2 . Consider the following two ways of tampering with the random graph H 2 (pn): (i) choose a diameter path at random and adjoin all of its edges to H 2 (pn); (ii) choose a diameter path at random from among those that start at 0 = (0, · · · , 0), and adjoin all of its edges to H 2 (pn). We study the question of whether these tamperings are detectable asymptotically as n→∞.
منابع مشابه
Dropping and Tampering Detection in Sensor Networks : Enhancing Data Reliability
Achieving communication dependability in Sensor networks is difficult due to limitations on node power and wireless channel unreliability. This problem is further compounded by hard-to-detect attacks such as data-report tampering by malicious Cluster Heads, and dropping of data-reports by intermediate nodes en route from the CH to the Base Station (BS). Detecting these attacks coupled with node...
متن کاملA New Parallel Matrix Multiplication Method Adapted on Fibonacci Hypercube Structure
The objective of this study was to develop a new optimal parallel algorithm for matrix multiplication which could run on a Fibonacci Hypercube structure. Most of the popular algorithms for parallel matrix multiplication can not run on Fibonacci Hypercube structure, therefore giving a method that can be run on all structures especially Fibonacci Hypercube structure is necessary for parallel matr...
متن کاملDetecting tampering in audio-visual content using QIM watermarking
This paper presents a framework for detecting tampered information in digital audio-visual content. The proposed framework uses a combination of temporal and spatial watermarks that do not decrease the quality of host videos. A modified version of the Quantization Index Modulation (QIM) algorithm is used to embed watermarks. The fragility of the QIM watermarking algorithm makes it possible to d...
متن کاملUsing noise inconsistencies for blind image forensics
A commonly used tool to conceal the traces of tampering is the addition of locally random noise to the altered image regions. The noise degradation is the main cause of failure of many active or passive image forgery detection methods. Typically, the amount of noise is uniform across the entire authentic image. Adding locally random noise may cause inconsistencies in the image’s noise. Therefor...
متن کاملDetecting General Algebraic Manipulation Attacks
Algebraic manipulation detection codes are a class of error detecting codes which have found numerous applications in cryptography. In this paper we extend these codes to defeat general algebraic attacks we call such codes general algebraic manipulation detection (GAMD) codes. Positive results are shown for the existence of GAMDs for the families of tampering functions corresponding to point ad...
متن کامل