نتایج جستجو برای: forgery

تعداد نتایج: 1967  

Journal: :I. J. Network Security 2006
Ren-Chiun Wang Chou Chen Yang

Recently, Yang et al. improved Yang and Shieh’s two password authentication schemes to withstand Sun and Yeh’s forgery attacks. However, Kim et al. pointed out that Yang et al.’s improvements still cannot withstand forgery attacks. At the same time, Kim et al. proposed improved methods. In this paper, we shall show that Kim et al.’s improvements also cannot resist the forgery attacks.

2014
Rigel Gjomemo Hafiz Malik Nilesh Sumb V. N. Venkatakrishnan Rashid Ansari

In this paper, we present a digital check forgery attack on check processing systems used in online banking that results in check fraud. Such an attack is facilitated by multiple factors: the use of digital images to perform check transactions, advances in image processing technologies, the use of untrusted client-side devices and software, and the modalities of deposit. We note that digital ch...

2015
Harmanpreet Kaur Manpreet Kaur

Identifying inter-frame forgery and tampering a video is a challenging topic in video forensics. Tampering involves falsification with video content in order to cause damage or make unauthorised modification/alteration. These tampering impacts need to be studied. Till now the studies employed a video authentication method that detects and determines both frame duplication and region duplication...

2016
Beste Ustubioglu Elif Baykal Gul Muzaffer Guzin Ulutas

With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery that copied a part of an image and pasted it on the other region in the same image. First, the method divides the image i...

Journal: :Digital Investigation 2013
Gajanan K. Birajdar Vijay H. Mankar

Today manipulation of digital images has become easy due to powerful computers, advanced photo-editing software packages and high resolution capturing devices. Verifying the integrity of images and detecting traces of tampering without requiring extra prior knowledge of the image content or any embedded watermarks is an important research field. An attempt is made to survey the recent developme...

Journal: :IJDCF 2014
Resmi Sekhar Shaji Ramaswamy Swarnammal

Copy-Move forgery is the very prevalent form of image tampering. The powerful image processing tools available freely helps even the naive to tamper with images. A copy-move forgery is performed by copying a region in an image and pasting it in the same image most probably after applying some form of post-processing on the region like rotation, blurring, scaling, double JPEG compression etc. Th...

2017
Ali Retha Hasoon Khayeat Paul L. Rosin Xianfang Sun

The ready availability of image-editing software makes ensuring the authenticity of images an important issue. The most common type of image tampering is cloning, or Copy-Move Forgery (CMF), in which part(s) of the image are copied and pasted back into the same image. One possible transformation is where an object is copied, rotated and pasted; this type of forgery is called Copy-Rotate-Move Fo...

2014
Tanuja K. Sarode Naveen Vaswani

With the help of various image editing tools available, it has become easier to alter an image in such a way that it does not leave behind any clues. Copy –Move forgery or also known as Region Duplication Forgery is a type of image forgery in which a part of digital image is copied and pasted to another part of same image. Since the copied and pasted image comes from the same image, it becomes ...

2011
Raja Zeshan Haider

128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vulnerable to birthday forgery attack. Birthday forgery attack requires minimum 2 known message-MAC pairs for finding collision in 128-EIA3. 128-EIA3 is susceptible to internal collision of its universal ...

2016
Chi-Man Pun Xiao-Chen Yuan

The talk about image forgery is very common in the digital image forensic area. But with advanced image editing tools exposure of tampered part from the original image is hard. Human cannot visually identify the fabricated region from the Image. So, it is imperative to advance a technique which can detect the forged image from the original one. Copy-move/paste image forgery is a frequent catego...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید