نتایج جستجو برای: authenticity protection
تعداد نتایج: 186339 فیلتر نتایج به سال:
We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a c...
the importance of iranian ancient as architectural heritage have to competent international prestige a nd respect due this is important with regard to proper conservation met hods based on non-destructive evaluation methods and non-contact testing providing enough accuracy and speed to bri ng performance to stabilize while correct location and age value of valuable architectural aspect of quant...
We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a c...
in defining and recognizing the originality of the carpet, it is necessary to adhere to the features of the appearance, including the color, design and function of the texture, such as the type of knot and tufts, and ... neglecting the intangible features such as the traditions of the tissue community and The historical, social and economic status of that society leads to a complete lack of co...
Copyright protection and authentication of digital contents has become a significant issue in the current digital epoch with efficient communication mediums such as internet. Plain text is the rampantly used medium used over the internet for information exchange and it is very crucial to verify the authenticity of information. There are very limited techniques available for plain text watermark...
Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...
We present a method to secure the complete path between a server and the local human user at a network node. This is useful for scenarios like internet banking, electronic signatures, or online voting. Protection of input authenticity and output integrity and authenticity is accomplished by a combination of traditional and novel technologies, e.g., SSL, ActiveX, and DirectX. Our approach does n...
IT security incidents are increasing nearly exponentially. With this increase, the importance of data accessibility, confidentiality, integrity, and authenticity grows. IT-based learning systems are especially endangered through intentional destructive actions. A basic condition to guarantee the security of personal data is the compliance with national laws and international regulations, especi...
The network layer of ad hoc networks is prone to attacks. Insertion of false routing information is inherently easy unless the routing messages are authenticated. Hence, protection of the routing protocol is a prerequisite for a reliable network service. The wireless broadcast media calls for bandwidth e¢ cient solutions. This paper proposes a hybrid protection scheme for the ad hoc Optimized L...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید