Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to achieve.It ensures with high probability that decoded message is either completely...
This paper proposes a multi-scale self-recovery(MSSR)approach to protect images against content forgery.The main idea is to provide more resistance against image tampering while enabling the recovery process in a mult...
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and...
supported by GTK (internal funding);EU Life-Environment Program (RAMAS project);EU Life+Project focusing on natural aggregate resources (ASROCKS)
The study illustrates the critical role of accurate geological structural mapping to delineate crystalline aquifer zones more prone to high health risk due to elevated dissolved As in drinking wells.The analysis revis...
supported by the National Natural Science Foundation of China(No.61272519,No.61170271,No.61121061)
A novel compressive sensing-based audio semi-fragile zero-watermarking algorithm is proposed in this paper. This algorithm transforms the original audio signal into the wavelet domain and applies compressive sensing t...
supported by the Asia University,Taiwan under Grant No.100-ASIA-38
In 2011, Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged. Due to this rearrangement, the value of the most-significant bit of each tampered p...
supported by the National Natural Science Foundation of China(61170241,61073042)
With the broad implementations of the electronic business and government applications, robust system security and strong privacy protection have become essential requirements for remote user authentication schemes. Re...
Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own...
Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identifi...
the Natural Science Foundation of Shandong Province (Y2007G37)
Based on the definition of tamper evidence, the authors define a new notion of tamper evidence forward secure signature scheme (TE-FSig), and propose a general method to build a TE-FSig scheme. Based on this method,...