نتایج جستجو برای: forgery

تعداد نتایج: 1967  

ژورنال: محاسبات نرم 2018

Copy-move forgery is a particular type of distortion where a part or portions of one image is/are copied to other parts of the same image. This type of manipulation is done to hide a particular part of the image or to copy one or more objects into the same image. There are several methods for detecting copy-move forgery, including block-based and key point-based methods. In this paper, a method...

Journal: :The Modern Law Review 1994

2001
Jinhong Katherine Guo

Signatures may be stylish or unconventional and have many personal characteristics that are challenging to reproduce by anyone other then the original author For this reason signatures are used and accepted as proof of authorship or consent on personal checks credit purchases and legal documents Currently signatures are veri ed only informally in many environments but the rapid development of c...

2017
Rekha Devi Deepti Chauhan

Today, the characterization of the technological age is done by the digital images spread. They are the most common form of conveying information whether through internet, newspapers, magazines, or scientific journals. They are used as a strong proof of various crimes and as evidence used for various purposes. The modification, capturing or creating of the image has become easier and available ...

2014
Dijana Tralic Paul L. Rosin Xianfang Sun Sonja Grgic

Thanks to the availability of many sophisticated image processing tools, digital image forgery is prevalent nowadays. One of the common methods is copymove forgery (CMF), where part of an image is copied to another location in the same image. Detection of copy-move forgery has been widely researched recently, and many different solutions have been proposed. This chapter introduces a different a...

Journal: :Inf. Process. Lett. 2015
Thomas Eisenbarth Aaron Meyerowitz Rainer Steinwandt

MAC striping has been suggested as a technique to authenticate encrypted payloads using short tags. For an idealized MAC scheme, the probability of a selective forgery has been estimated as ( `+m m )−1 ·2−m, when utilizing MAC striping with `-bit payloads and m-bit tags. We show that this estimate is too optimistic. For m ≤ ` and any payload, we achieve a selective forgery with probability ≥ ( ...

Journal: :I. J. Network Security 2013
Kitae Kim Hyung-Don Kim Seungho Kim Ikkwon Yie

We first give an analysis on Zhang et al.’s attack on a short signature scheme so called ZCSM scheme and point out their forgery attack is not correct one. Furthermore, we present a forgery attack under the chosen message and public key attacks on ZCSM scheme, in the sense of Zhang et al.’s attack. We also analyze Zhang et al.’s improved signature scheme suggested to resist their attacks and po...

Journal: :IACR Cryptology ePrint Archive 2006
Chunbo Ma Jun Ao Jianhua Li

As a useful means of safeguarding privacy of communications, deniable authentication has received much attention. A Chameleon-based deniable authenticated key agreement protocol is presented in this paper. The protocol has following properties. Any one of the two participants can’t present a digital proof to convince a third party that a claimed agreement has really taken place. Once a forgery ...

2014
Anupama K. Abraham Rosna P. Haroon

Detection of image forgery is always a crucial factor in image forensic and security applications. Usually this detection is possible with the help of local or global features of an image. We can ensure the credibility of an image with a hashing method by fusing local and global features together. So that it is possible to detect even sensitive image forgeries. Here, we are proposing an improve...

Journal: :IACR Cryptology ePrint Archive 2002
Jung Hee Cheon

In this paper we propose a universal forgery attack of Hess’s second IDbased signature scheme against the known-message attack.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید