نتایج جستجو برای: tamper shape
تعداد نتایج: 192340 فیلتر نتایج به سال:
Utilities are currently installing a number of resource-constrained embedded devices at the remote endpoints of their SCADA (Supervisory Control and Data Acquisition) networks as part of their smart grid rollout. These devices present a security risk for utilities: They are deployed in many different places and environments; they have very little physical security; and they have direct access b...
This paper describes a semi-fragile watermarking scheme for image authentication and tamper-proofing. Each watermark bit is duplicated and randomly embedded in the original image in the discrete wavelet domain by modifying the corresponding image coefficients through quantization. The modifications are made so that they have little effect on the image and that the watermarking is robust against...
Raw network traces can be used to compromise the privacy of Internet users. For this reason, many ISPs are reluctant to collect network traces – they often regard possession of such traces as a liability. To mitigate this concern, anonymization techniques have been developed to protect user-identifying information. While most projects anonymize their traces as a post-processing step (i.e., offl...
We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...
Image authentication and image tamper detection. Double JPEG compression might occur when a portion is cut from an image which may or may not be: Image tamper detection using passive-blind techniques has become a hot research field. It uses non-intrusive methods which uses image functions to detect tampering. The tampering operation changes the inherent statistical properties of an image which ...
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermarks are embedded using clusters points, where a bit is encoded in each cluster. The four point encoding mechanism uses a combination of one point encoding and three point encoding schemes. Using these schemes it is poss...
A seal is only as good as the man in whose briefcase it's carried. —KAREN SPÄRCK JONES 12.1 Introduction Many computer systems rely to some extent on secure printing, packaging, and seals to guarantee important aspects of their protection. • Many software products get some protection against forgery, using tricks such as holographic stickers that are supposed to tear when removed from the packa...
Recently enterprises and corporations have reported several incidents of leakage of sensitive data and plagiarism of copyrighted information on the Web. We address the Bulk Document Leakage (BDL) problem: Given a large set of sensitive or copyrighted documents in an enterprise, determine if a portion of the document set has leaked (or has been plagiarized) and been published on the Web. An adve...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید