نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

1998
Deepa Kundur Dimitrios Hatzinakos

In this paper we present a novel fragile watermarking scheme for the tamper-proo ng of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modi ed. We call such a technique a telltale tamper-proo ng method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quantiz...

Journal: :IACR Cryptology ePrint Archive 2004
Mahalingam Ramkumar Nasir D. Memon

Key pre-distribution (KPD) schemes, are inherently trade-offs between security and complexity, and are perhaps well suited for securing large-scale deployments of resource constrained nodes without persistent access to a trusted authority (TA). However, the need to offset their inherent security limitations, calls for some degree of tamper-resistance of nodes. Obviously, if absolute tamper-resi...

2005
Hongxia Jin Ginger Myles Jeffrey B. Lotspiech

Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques include code obfuscation, software watermarking, and tamper detection. In this paper we propose a tamper resistance technique which provides both on and offline tamper detection. In our offline approach, the software dynamically detects tamperi...

2012
Girija Chetty Renuka Biswas

In this paper, we propose novel algorithmic models based on information fusion and feature transformation in crossmodal subspace for different types of residue features extracted from several intra-frame and inter-frame pixel sub-blocks in video sequences for detecting digital video tampering or forgery. An evaluation of proposed residue features – the noise residue features and the quantizatio...

Journal: :Journal of Multimedia 2010
Shengbing Che Zuguo Che Xu Shu

Image compression operator based on discrete cosine transform was brought up. A securer scrambling locational operator was put forward based on the concept of anti-tamper radius. The basic idea of the algorithm is that it first combined image block compressed data with eigenvalue of image block and its offset block, then scrambled or encrypted and embeded them into least significant bit of corr...

2010
Girija Chetty Monica Singh

In this paper, we propose a novel fuzzy fusion of image residue features for detecting tampering or forgery in video sequences. We suggest use of feature selection techniques in conjunction with fuzzy fusion approach to enhance the robustness of tamper detection methods. We examine different feature selection techniques, the independent component analysis (ICA), and the canonical correlation an...

2002
ROGER G. JOHNSTON Roger G. Johnston

Tamper detection 2 has an important role to play in domestic nuclear security and safeguards, as well as in international verification and treaty monitoring. Unfortunately, ideas about tamper detection often seem to be based on misconceptions, fuzzy goals, and wishful thinking. Current tamper detection programs are hampered by these problems, as well as by poor training, limited analysis, vague...

2012
Ioana Boureanu Serge Vaudenay

Following both theoretical and practical arguments, we construct UC-secure bit-commitment protocols that place their strength on the sender’s side and are built using tamper-evident devices, e.g., a type of distinguishable, sealed envelopes. We show that by using a second formalisation of tamper-evident distinguishable envelopes we can attain better security guarantees, i.e., EUC-security. We s...

2012
Sajjad Dadkhah Azizah Abd Manaf Somayeh Sadeghi

The authentications of digital images have become the center of attentions for certain group of companies since the number of doctored images increased. Tampering the digital images in a way that it’s impossible to be detected by naked eyes has become easier with development of image editing tools. Digital watermarking can preserve the authentication of digital images. In this paper we proposed...

1998
Deepa Kundur Dimitrios Hatzinakos

In this paper we present a novel fragile watermarking scheme for the tamper-proofing of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modified. We call such a technique a telltale tamper-proofing method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quan...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید