نتایج جستجو برای: tamper shape

تعداد نتایج: 192340  

2014
Wujie Zhou Ting Luo Zhongpeng Wang Mingkun Feng Jianfeng Weng Xin Li

Most of digital watermarking algorithms have been designed for only single purpose. In this paper, a new multipurpose oriented stereo image watermarking algorithm is proposed for three dimensional multimedia, which can be used for copyright protection, content authentication and tamper detection in three dimensional (3D) multimedia. Specifically, host stereo image is divided into non-overlappin...

Journal: :IACR Cryptology ePrint Archive 2016
Amir S. Mortazavi Mahmoud Salmasizadeh Amir Daneshgar

A non-malleable encoding scheme is a keyless encoding scheme which is resilient to tampering attacks. Such a scheme is said to be continuously secure if the scheme is resilient to attacks containing more than one tampering procedure. Also, such a scheme is said to have tamper-detection property if any kind of tampering attack is detected. In [S. Faust, et al., Continuous nonmalleable codes, TCC...

2007
RENUKA GUPTA KAMALINDER K. SINGH

Packaging of pharmaceuticals is a critical process. It is an economical means of providing protection, presentation, information, identiÞ cation, containment, administration, shelf-life and convenience for a product during carriage, storage, display and ultimate total use, paying due attention to any legal and environmental factors1. Plastics are a wide group of solid composite materials, which...

2004
Darko Kirovski Nebojsa Jojic Gavin Jancke

We present FaceCerts, a simple, inexpensive, and cryptographically secure identity certification system. A FaceCert is a printout of person’s portrait photo, an arbitrary textual message, and a 2-D color barcode which encodes an RSA signature of the message hash and the compressed representation of the face encompassed by the photo. The signature is created using the private key of the party is...

2008
Brian Gladman Roger Johnston

It is relatively easy to build an encryption system that is secure if it is working as intended and is used correctly but it is still very hard to build a system that does not compromise its security in situations in which it is either misused or one or more of its sub-components fails (or is ’encouraged’ to misbehave) . . . this is now the only area where the closed world is still a long way a...

Journal: :Journal of the Korea Academia-Industrial cooperation Society 2014

Journal: :TELKOMNIKA (Telecommunication Computing Electronics and Control) 2014

Journal: :IEEE Security & Privacy Magazine 2009

Journal: :International Journal of Hospitality Management 2022

Restaurant-to-consumer food delivery has experienced disruption with the growth of third-party services such as DoorDash and Uber Eats. However, this platform-to-consumer method introduces increased opportunities for tampering contamination due to additional touchpoints in process. To mitigate these concerns, more restaurants are implementing tamper-evident closures seals attached containers us...

2003
Dennis Heimbigner

An important and recurring security scenario involves the need to carry out trusted computations in the context of untrusted environments. It is shown how a tamper-detecting interpreter for a programming language – specifically Lisp 1.5 – combined with the use of a secure co-processor can address this problem. The term “tamper-detecting” means that any attempt to corrupt a computation carried o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید