نتایج جستجو برای: forgery
تعداد نتایج: 1967 فیلتر نتایج به سال:
We present two practical attacks on the CAESAR candidate PAES. The rst attack is a universal forgery for any plaintext with at least 240 bytes. It works for the nonce-repeating variant of PAES and in a nutshell it is a state recovery based on solving di erential equations for the S-Box leaked through the ciphertext that arise when the plaintext has a certain di erence. We show that to produce t...
Abstract: Nowadays, digital images can be easily modified by using high-performance computers, sophisticated photo-editing, computer graphics software, etc. These modifications will affect the authenticity of images, from law, politics, the media, and business. Detecting forgery in digital images is one of the major research activities in the current time. In general, altering the digital image...
Digital images are extensively utilized as communication medium. Forgeries in digital images have grown to be an astringent concern with the availability of powerful image processing tools. Among various image forgery approaches, copy-move forgery is the commonly used technique in which a component of the image is facsimiled and pasted in order to hide extraneous portion of the image. Square bl...
Copy-move forgery is one of most frequently used types of image forgery. During copy-move process a fragment of the image is copied and pasted to another location of the same image to hide some important area of the image. The purpose of copy-move forgery detection algorithm is to identify duplicated areas in the image. This method is based on the calculating features in a sliding or an overlap...
Blind image forensics aims to assess image authenticity. One of the most popular families of methods from this category is the detection of copy-move forgeries. In the past years, more than 15 different algorithms have been proposed for copy-move forgery detection. So far, the efficacy of these approaches has barely been examined. In this paper, we: a) present a common pipeline for copy-move fo...
In 2009, Lin et al. proposed a digital multi-signature scheme based on the concepts of generalized conic curves over Zn. They claimed that the multi-signature scheme is well secured and the forgery attack is infeasible on it. Unfortunately, three weaknesses on their proposed multi-signature have been observed and it has been shown that an attacker can compute the secret pairs of all signers usi...
Recently, based on RSA and discrete logarithm with composite modulus, Huang and Chang proposed two multisignature schemes with distinguished signing authority and claimed that their scheme can resist forgery attack. Unfortunately, in this works, we show that their schemes have forgery attack by security analysis of Huang-Chang multi-signature schemes. Given a multisignature of certain a documen...
The main objective of this project is fake currency detection using the image processing. Fake currency detection is a process of finding the forgery currency. After choose the image apply preprocessing. In pre-processing the image to be crop, smooth and adjust. Convert the image into gray color. After conversion apply the image segmentation. The features are extracting and reduce. Finally comp...
With the mushroom growth of state-of-the-art digital image and video manipulations tools, establishing the authenticity of multimedia content has become a challenging issue. Digital image forensics is an increasingly growing research field that symbolises a never ending struggle against forgery and tampering. This survey attempts to cover the blind techniques that have been proposed for exposin...
In this era due to presence of low-cost and high-resolution digital cameras, there is wide amount of digital images all over the world. Digital images play a very important role in areas like forensic investigation, insurance processing, surveillance systems, intelligence services, medical imaging and journalism. But the basic requirement to believe what we see is that the images should be auth...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید