نتایج جستجو برای: forgery

تعداد نتایج: 1967  

2017
Rajnish Kansal

the fact that the researcher community recognizes the digital forgery detection need and currently available are very few publications. The mean proposed for fragile authentication, content authentication, tampering detection, localization changes, and original content recovery has been digital watermarks. The image integrity related useful information is provided by the digital watermarks and ...

Journal: :IACR Cryptology ePrint Archive 2017
Nilanjan Datta Atul Luykx Bart Mennink Mridul Nandi

The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM str...

2011
Javier Parra-Arnau David Rebollo-Monedero Jordi Forné

Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture that protects user privacy in such collaborativefiltering systems, in which users are profiled on the basis of their ratings. Our approach capitalizes on the combination of...

2006
Tian-Tsong Ng Shih-Fu Chang Ching-Yung Lin Qibin Sun Jane Fonda

In this chapter, we will review the research area of passive-blind image forensics, i.e., an form of image analysis for finding out the condition of an image without relying on pre-registration or pre-embedded information. We consider the two main functions of passive-blind image forensics as being image forgery detection and image source identification. In this vein, we provide a detailed revi...

2012
G. R. Talmale R. W. Jasutkar

Multimedia Forensics has become important in the last few years. There are two maininterests, namely source identification and forgery detection. Source identification focuses onidentifying the source digital devices (cameras, mobile phones, camcorders, etc) using themedia produced by them, while forgery detection attempts to discover evidence of tampering byassessing the authen...

Journal: :IACR Cryptology ePrint Archive 2004
Lifeng Guo

In 2003, Wang et al.[1] proposed a (t, n) threshold signature scheme without a trusted party based on the discrete logarithm problem. In this paper, according to [5]’s attacking method, we show that there are still some security leaks in that scheme, and give some methods of forgery attack. Moreover, we point out this scheme is vulnerable to universal forgery by an insider attacker under reason...

2012
Mufeed Juma AlMashrafi Harry Bartlett Leonie Ruth Simpson Ed Dawson Kenneth Koon-Ho Wong

This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design...

2004
Hung-Min Sun Cheng-Ta Yang Bin-Tsan Hsieh

A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group of n proxy signers to sign messages on behalf of an original signer. Recently, Hwang et al. proposed a new (t, n) threshold proxy signature scheme based on the RSA cryptosystem. In this paper, we show that their scheme is insecure against the original signer’s forgery and the general forgery.

2010
N R. Sankar

The effect of the din distribution on the error probability of the detection test is studied here that when a class of randomly rotated spherical Ridges is used. The detection test is performed by a focused correlation detector, and the spherical codes studied here form a randomized orthogonal constellation. The colluders create a din-free forgery by uniform averaging of their individual copies...

Journal: :Symmetry 2016
Diaa M. Uliyan Hamid A. Jalab Ainuddin Wahid Abdul Wahab Somayeh Sadeghi

Region duplication forgery where a part of the image itself is copied and pasted onto a different part of the same image grid is becoming more popular in image manipulation. The forgers often apply geometric transformations such as rotation and scaling operations to make the forgery imperceptible. In this study, an image region duplication forgery detection algorithm is proposed based on the an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید