نتایج جستجو برای: authenticity protection

تعداد نتایج: 186339  

2003
Harold Szu Steven Noel Seong-Bin Yim Jeff Willey Joe Landa

We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a c...

Journal: :international journal of architectural engineering and urban planning 0
اصغر محمدمرادی asghar mohammad moradi faculty of architecture and urban planning of iran university of science and technologyدانشکده معماری و شهرسازی دانشگاه علم وصنعت ایران محمدصادق طاهرطلوع دل mohammad sadegh taher tolou del faculty of architecture and urban planning of iran university of science and technologyدانشکده معماری و شهرسازی دانشگاه علم وصنعت ایران

the importance of iranian ancient as architectural heritage have to competent international prestige a nd respect due this is important with regard to proper conservation met hods based on non-destructive evaluation methods and non-contact testing providing enough accuracy and speed to bri ng performance to stabilize while correct location and age value of valuable architectural aspect of quant...

Journal: :Neural networks : the official journal of the International Neural Network Society 2003
Harold Szu Steven Noel Seong-Bin Yim Jefferson M. Willey Joe Landa

We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a c...

ژورنال: گلجام 2019

in defining and recognizing the originality of the carpet, it is necessary to adhere to the features of the appearance, including the color, design and function of the texture, such as the type of knot and tufts, and ... neglecting the intangible features such as the traditions of the tissue community and  The historical, social and economic status of that society leads to a complete lack of co...

Journal: :CoRR 2010
Zunera Jalil Anwar M. Mirza Maria Sabir

Copyright protection and authentication of digital contents has become a significant issue in the current digital epoch with efficient communication mediums such as internet. Plain text is the rampantly used medium used over the internet for information exchange and it is very crucial to verify the authenticity of information. There are very limited techniques available for plain text watermark...

2005
Elizabeth Haubert Joseph Tucek Larry Brumbaugh William Yurcik

Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...

Journal: :CoRR 2006
Hanno Langweg Tommy Kristiansen

We present a method to secure the complete path between a server and the local human user at a network node. This is useful for scenarios like internet banking, electronic signatures, or online voting. Protection of input authenticity and output integrity and authenticity is accomplished by a combination of traditional and novel technologies, e.g., SSL, ActiveX, and DirectX. Our approach does n...

Journal: :Int. J. Comp. Sci. Sport 2002
Hans-Ulrich Bierhahn

IT security incidents are increasing nearly exponentially. With this increase, the importance of data accessibility, confidentiality, integrity, and authenticity grows. IT-based learning systems are especially endangered through intentional destructive actions. A basic condition to guarantee the security of personal data is the compliance with national laws and international regulations, especi...

2006
A. M. Hegland L. Nilsen

The network layer of ad hoc networks is prone to attacks. Insertion of false routing information is inherently easy unless the routing messages are authenticated. Hence, protection of the routing protocol is a prerequisite for a reliable network service. The wireless broadcast media calls for bandwidth e¢ cient solutions. This paper proposes a hybrid protection scheme for the ad hoc Optimized L...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید