نتایج جستجو برای: forgery

تعداد نتایج: 1967  

2006
Alisher Kholmatov Berrin Yanikoglu

Online signature verification is a challenging problem. It’s difficulty comes from the problem of separation between genuine variation of an individual’s signatures and that of forgery signatures. Different algorithms have been proposed by various researchers, however lack of the publically available signature databases hinders benchmarking their performances. In this paper we introduce a signa...

Journal: :IACR Cryptology ePrint Archive 2005
David A. McGrew Scott R. Fluhrer

Some message authentication codes (MACs) are vulnerable to multiple forgery attacks, in which an attacker can gain information that allows her to succeed in forging multiple message/tag pairs. This property was first noted in MACs based on universal hashing, such as the Galois/Counter Mode (GCM) of operation for block ciphers. However, we show that CBC-MAC and HMAC also have this property, and ...

2015
Ibrahim Waziri Ibrahim Waziri

Website Forgery is a type of web based attack where the phisher builds a website that is completely independent or a replica of a legitimate website, with the goal of deceiving a user by extracting information that could be used to defraud or launch other attacks upon the victim. In this paper we attempt to identify the different types of website forgery phishing attacks and non-technical count...

2013
Hae-Jung Kim Eun-Jun Yoon

In 2013, Thadvai et al. proposed a novel authenticated encryption scheme with convertibility. They claimed that the proposed scheme satisfies all the properties of an ideal authenticated encryption scheme (AES). However, this paper shows that Thadvai et al.’s AES scheme still suffers from a forgery converted signature attack, that is, any one Corresponding author: Ki-Dong Bu ([email protected]) 27...

2011
Sheldon Sensenig

This paper describes a method for locating regions of an image with noise levels that vary significantly from the rest of the image. These regions are highly suspected to be tampered regions, as noise is typically fairly uniform throughout an authentic image. The addition of random noise to a region, however is often used to conceal the tampered region because it can thwart common forgery detec...

Journal: :International Journal of Computer Applications 2016

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

In today’s scenario medical image forgery has turned out to be unsophisticated because of capable PCs, propelled editing softwares and high resolution capturing gadgets. Insurance fraud is a deliberate deception perpetrated against or by an insurance company agent for financial gain. The only downside that the health industry faced rise in number frauds. An endeavor prepared review current impr...

Journal: :IACR Cryptology ePrint Archive 2016
Damian Vizár

HANUMAN is a mode of operation of a keyless cryptographic permutation for nonce-based authenticated encryption with associated data, included among the modes bundled in the PRIMATEs candidate in the currently ongoing CAESAR competition. HANUMAN is a sponge-like mode whose design and security argument are inspired by the SpongeWrap construction. We identify a flaw in the domain separation of HAN...

Journal: :ACM Transactions on Storage 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید