نتایج جستجو برای: forgery
تعداد نتایج: 1967 فیلتر نتایج به سال:
the fact that the researcher community recognizes the digital forgery detection need and currently available are very few publications. The mean proposed for fragile authentication, content authentication, tampering detection, localization changes, and original content recovery has been digital watermarks. The image integrity related useful information is provided by the digital watermarks and ...
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM str...
A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings
Recommendation systems are information-filtering systems that help users deal with information overload. Unfortunately, current recommendation systems prompt serious privacy concerns. In this work, we propose an architecture that protects user privacy in such collaborativefiltering systems, in which users are profiled on the basis of their ratings. Our approach capitalizes on the combination of...
In this chapter, we will review the research area of passive-blind image forensics, i.e., an form of image analysis for finding out the condition of an image without relying on pre-registration or pre-embedded information. We consider the two main functions of passive-blind image forensics as being image forgery detection and image source identification. In this vein, we provide a detailed revi...
Multimedia Forensics has become important in the last few years. There are two maininterests, namely source identification and forgery detection. Source identification focuses onidentifying the source digital devices (cameras, mobile phones, camcorders, etc) using themedia produced by them, while forgery detection attempts to discover evidence of tampering byassessing the authen...
In 2003, Wang et al.[1] proposed a (t, n) threshold signature scheme without a trusted party based on the discrete logarithm problem. In this paper, according to [5]’s attacking method, we show that there are still some security leaks in that scheme, and give some methods of forgery attack. Moreover, we point out this scheme is vulnerable to universal forgery by an insider attacker under reason...
This paper presents a model for generating a MAC tag with a stream cipher using the input message indirectly. Several recent proposals represent instances of this model with slightly different options. We investigate the security of this model for different options, and identify cases which permit forgery attacks. Based on this, we present a new forgery attack on version 1.4 of 128-EIA3. Design...
A (t, n) threshold proxy signature scheme allows t or more proxy signers out of a designated group of n proxy signers to sign messages on behalf of an original signer. Recently, Hwang et al. proposed a new (t, n) threshold proxy signature scheme based on the RSA cryptosystem. In this paper, we show that their scheme is insecure against the original signer’s forgery and the general forgery.
The effect of the din distribution on the error probability of the detection test is studied here that when a class of randomly rotated spherical Ridges is used. The detection test is performed by a focused correlation detector, and the spherical codes studied here form a randomized orthogonal constellation. The colluders create a din-free forgery by uniform averaging of their individual copies...
Region duplication forgery where a part of the image itself is copied and pasted onto a different part of the same image grid is becoming more popular in image manipulation. The forgers often apply geometric transformations such as rotation and scaling operations to make the forgery imperceptible. In this study, an image region duplication forgery detection algorithm is proposed based on the an...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید