نتایج جستجو برای: authenticity protection

تعداد نتایج: 186339  

Journal: :Signal Processing 2003
Alexandre H. Paquet Rabab Kreidieh Ward Ioannis Pitas

In this paper, we present a novel watermarking scheme to ensure the authenticity of digital images. Our authentication technique is able to detect malicious tampering of images even if they have been incidentally distorted by basic image processing operations. The image protection is achieved by the insertion of a secret author’s identification key in the image wavelet coefficients by their sel...

Journal: :CoRR 2004
Rangarajan Vasudevan Ajith Abraham Sugata Sanyal Dharma P. Agrawal

In this paper, we present a novel encryptionless algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a “jigsaw puzzle” to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided t...

Journal: :I. J. Network Security 2016
Xiuxia Tian Lisha Li Jinguo Li Hongjiao Li Chunhua Gu

Varieties of data security protection technologies have been developed in smart metering. However, there are almost no researches focusing on the security of smart meter parameters. In fact, smart meter parameters, such as the total/sharp/peak/flat/valley period time, can be written locally or remotely by power companies or users through sending programming commands. Modifying smart meter param...

2006
Gerald DeJean Darko Kirovski

A certificate of authenticity (COA) is an inexpensive physical object that has a random unique structure with high cost of near-exact reproduction. An additional requirement is that the uniqueness of COA’s random structure can be verified using an inexpensive device. We propose a design for objects that behave as COAs in the electromagnetic field. The objective is to complement RFIDs so that th...

Journal: :The American journal of bioethics : AJOB 2002
Carolyn McLeod

2014
Sebastian Korb Stéphane With Paula Niedenthal Susanne Kaiser Didier Grandjean

The mechanisms through which people perceive different types of smiles and judge their authenticity remain unclear. Here, 19 different types of smiles were created based on the Facial Action Coding System (FACS), using highly controlled, dynamic avatar faces. Participants observed short videos of smiles while their facial mimicry was measured with electromyography (EMG) over four facial muscles...

2007
Mariella Guercio Jérôme Barthélemy Alain Bonardi

The CASPAR project is an European project devoted to the preservation of digitally encoded information. In the course of the project, the contemporary arts testbed aims at building a preservation framework for contemporary arts using electronic devices, and particularly for performing arts (music, dance, video installations...). The project addresses very specific issues as digital rights, or a...

2009
Michael Factor Ealan A. Henis Dalit Naor Simona Rabinovici-Cohen Petra Reshef Shahar Ronen Giovanni Michetti Maria Guercio

A growing amount of digital objects is designated for long term preservation a time scale during which technologies, formats and communities are very likely to change. Specialized approaches, models and technologies are needed to guarantee the long-term understandability of the preserved data. Maintaining the authenticity (trustworthiness) and provenance (history of creation, ownership, accesse...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید