نتایج جستجو برای: forgery
تعداد نتایج: 1967 فیلتر نتایج به سال:
Online signature verification is a challenging problem. It’s difficulty comes from the problem of separation between genuine variation of an individual’s signatures and that of forgery signatures. Different algorithms have been proposed by various researchers, however lack of the publically available signature databases hinders benchmarking their performances. In this paper we introduce a signa...
Some message authentication codes (MACs) are vulnerable to multiple forgery attacks, in which an attacker can gain information that allows her to succeed in forging multiple message/tag pairs. This property was first noted in MACs based on universal hashing, such as the Galois/Counter Mode (GCM) of operation for block ciphers. However, we show that CBC-MAC and HMAC also have this property, and ...
Website Forgery is a type of web based attack where the phisher builds a website that is completely independent or a replica of a legitimate website, with the goal of deceiving a user by extracting information that could be used to defraud or launch other attacks upon the victim. In this paper we attempt to identify the different types of website forgery phishing attacks and non-technical count...
In 2013, Thadvai et al. proposed a novel authenticated encryption scheme with convertibility. They claimed that the proposed scheme satisfies all the properties of an ideal authenticated encryption scheme (AES). However, this paper shows that Thadvai et al.’s AES scheme still suffers from a forgery converted signature attack, that is, any one Corresponding author: Ki-Dong Bu ([email protected]) 27...
This paper describes a method for locating regions of an image with noise levels that vary significantly from the rest of the image. These regions are highly suspected to be tampered regions, as noise is typically fairly uniform throughout an authentic image. The addition of random noise to a region, however is often used to conceal the tampered region because it can thwart common forgery detec...
In today’s scenario medical image forgery has turned out to be unsophisticated because of capable PCs, propelled editing softwares and high resolution capturing gadgets. Insurance fraud is a deliberate deception perpetrated against or by an insurance company agent for financial gain. The only downside that the health industry faced rise in number frauds. An endeavor prepared review current impr...
HANUMAN is a mode of operation of a keyless cryptographic permutation for nonce-based authenticated encryption with associated data, included among the modes bundled in the PRIMATEs candidate in the currently ongoing CAESAR competition. HANUMAN is a sponge-like mode whose design and security argument are inspired by the SpongeWrap construction. We identify a flaw in the domain separation of HAN...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید