نتایج جستجو برای: forgery
تعداد نتایج: 1967 فیلتر نتایج به سال:
Recently, Yang et al. improved Yang and Shieh’s two password authentication schemes to withstand Sun and Yeh’s forgery attacks. However, Kim et al. pointed out that Yang et al.’s improvements still cannot withstand forgery attacks. At the same time, Kim et al. proposed improved methods. In this paper, we shall show that Kim et al.’s improvements also cannot resist the forgery attacks.
In this paper, we present a digital check forgery attack on check processing systems used in online banking that results in check fraud. Such an attack is facilitated by multiple factors: the use of digital images to perform check transactions, advances in image processing technologies, the use of untrusted client-side devices and software, and the modalities of deposit. We note that digital ch...
Identifying inter-frame forgery and tampering a video is a challenging topic in video forensics. Tampering involves falsification with video content in order to cause damage or make unauthorised modification/alteration. These tampering impacts need to be studied. Till now the studies employed a video authentication method that detects and determines both frame duplication and region duplication...
With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery that copied a part of an image and pasted it on the other region in the same image. First, the method divides the image i...
Today manipulation of digital images has become easy due to powerful computers, advanced photo-editing software packages and high resolution capturing devices. Verifying the integrity of images and detecting traces of tampering without requiring extra prior knowledge of the image content or any embedded watermarks is an important research field. An attempt is made to survey the recent developme...
Copy-Move forgery is the very prevalent form of image tampering. The powerful image processing tools available freely helps even the naive to tamper with images. A copy-move forgery is performed by copying a region in an image and pasting it in the same image most probably after applying some form of post-processing on the region like rotation, blurring, scaling, double JPEG compression etc. Th...
The ready availability of image-editing software makes ensuring the authenticity of images an important issue. The most common type of image tampering is cloning, or Copy-Move Forgery (CMF), in which part(s) of the image are copied and pasted back into the same image. One possible transformation is where an object is copied, rotated and pasted; this type of forgery is called Copy-Rotate-Move Fo...
With the help of various image editing tools available, it has become easier to alter an image in such a way that it does not leave behind any clues. Copy –Move forgery or also known as Region Duplication Forgery is a type of image forgery in which a part of digital image is copied and pasted to another part of same image. Since the copied and pasted image comes from the same image, it becomes ...
128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vulnerable to birthday forgery attack. Birthday forgery attack requires minimum 2 known message-MAC pairs for finding collision in 128-EIA3. 128-EIA3 is susceptible to internal collision of its universal ...
The talk about image forgery is very common in the digital image forensic area. But with advanced image editing tools exposure of tampered part from the original image is hard. Human cannot visually identify the fabricated region from the Image. So, it is imperative to advance a technique which can detect the forged image from the original one. Copy-move/paste image forgery is a frequent catego...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید