نتایج جستجو برای: forgery

تعداد نتایج: 1967  

2015
Nishtha Parashar Nirupama Tiwari

Due to powerful computers and advanced photo-editing software tools the manipulation of images has become an easy task. Confirming the authenticity of images and detecting tampered regions in an image without any knowledge about the image content is an important part of the research field. An effort is made to survey the recent advancements being made in the field of digital image forgery detec...

2014

Cross Site Request Forgery is considered as one of top vulnerability in today’s web, where an untrusted website can force the user browser to send the unauthorized valid request to the trusted site. Cross Site Request Forgery will let the integrity of the legitimate user. So far many solutions have been proposed for the CSRF attacks such as the referrer HTTP Header, Custom HTTP header, Origin H...

توحیدخواه , فرزاد , رشیدی, سعید , فلاح , علی ,

One of the basic problems in signature verification is variability and differences apparent on patterns of signature even for an individual. Signature segmentation to basic components, in addition to the access to the stable features, the hidden differences are revealed between genuine and forgery patterns. In this paper, signature patterns of two-dimensional are segmented by using dominant poi...

2014

This paper surveys the literature on illumination based digital image forgery detection techniques. With the development of advanced digital image processing techniques, it has been so easy to manipulate images, and therefore forge new realities. So we need an effective approach to distinguish between real and fake images. In this paper, we introduce some methods of digital image forgery detect...

2002
Arjen K. Lenstra Igor E. Shparlinski

We present a practical selective forgery attack against RSA signatures with fixed-pattern padding shorter than two thirds of the modulus length. Our result extends the practical existential forgery of such RSA signatures that was presented at Crypto 2001. For an n-bit modulus the heuristic asymptotic runtime of our forgery is comparable to the time required to factor a modulus of only 9 64n bit...

Journal: :Informatica, Lith. Acad. Sci. 2007
Tzungher Chen Gwoboa Horng Ke-Chiang Wu

Recently, there are several articles proposed based on Yang and Shieh’s password authentication schemes (YS for short) with the following features: (1) A user can choose password freely. (2) The server does not need to maintain a password table. (3) There is no need to involve a trusted third party. Although there were several variants of the YS-like schemes claimed to address the forgery attac...

Journal: :CoRR 2017
Abhishek Kashyap Rajesh Singh Parmar Megha Agarwal Hariom Gupta

With the headway of the advanced image handling software and altering tools, a computerized picture can be effectively controlled. The identification of image manipulation is vital in light of the fact that an image can be utilized as legitimate confirmation, in crime scene investigation, and in numerous different fields. The image forgery detection techniques intend to confirm the credibility ...

2016
Long Chen Yuan Lou Min Xiao Zhen-Xing Dong

In email forensic, the email detection and forgery conflict is an interdependent strategy selection process, and there exists complex dynamics between the detector and the forger, who have conflicting objectives and influence each other’s performance and decisions. This paper aims to study their dynamics from the perspective of game theory .We firstly analyze the email basic structure and heade...

2004
Amaç Herdağdelen Ethem Alpaydın

A self-contained application that verifies the signatures of enrolled users is developed. The verifier uses dissimilarity values based on dynamic alignment distances. Three different threshold calculation techniques are investigated: The first one makes use of the information provided by forged signatures and the other two methods use the information gathered from genuine signatures. The method...

2007
Yongdong Wu Feng Bao Robert H. Deng

In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to identify a traitor with just one invalid ciphertext. Since the original CPP scheme is vulnerable to the multi-key attack, we improved CPP to thwart the attack. However, CPP is vulnerable to a fatal forgery attack. In the f...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید