TAMPER

作品数:14被引量:19H指数:3
导出分析报告
相关领域:自动化与计算机技术更多>>
相关作者:李嘉更多>>
相关机构:百富计算机技术(深圳)有限公司清华大学更多>>
相关期刊:《Wuhan University Journal of Natural Sciences》《Chinese Journal of Electronics》《Optics and Photonics Journal》《Geoscience Frontiers》更多>>
相关基金:国家自然科学基金重庆市自然科学基金更多>>
-

检索结果分析

结果分析中...
条 记 录,以下是1-10
视图:
排序:
Continuously non-malleable codes from block ciphers in split-state model
《Cybersecurity》2024年第2期68-80,共13页Anit Kumar Ghosal Dipanwita Roychowdhury 
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to achieve.It ensures with high probability that decoded message is either completely...
关键词:Block cipher Non-malleable code Split-state model Tamper-resilient cryptography 
Image Tamper Detection and Multi-Scale Self-Recovery Using Reference Embedding with Multi-Rate Data Protection被引量:1
《China Communications》2019年第11期154-166,共13页Navid Daneshmandpour Habibollah Danyali Mohammad Sadegh Helfroush 
This paper proposes a multi-scale self-recovery(MSSR)approach to protect images against content forgery.The main idea is to provide more resistance against image tampering while enabling the recovery process in a mult...
关键词:TAMPER detection image recovery MULTI-SCALE SELF-RECOVERY tolerable tampering rate 
A Survey of Blind Forensics Techniques for JPEG Image Tampering被引量:1
《Journal of Computer and Communications》2019年第10期1-13,共13页Xueling Chu Haiming Li 
Blind forensics of JPEG image tampering as a kind of digital image blind forensics technology is gradually becoming a new research hotspot in the field of image security. Firstly, the main achievements of domestic and...
关键词:IMAGE FORENSICS TAMPER Detection JPEG IMAGE FORENSICS JPEG BLOCK Effect 
A geologically-based approach to map arsenic risk in crystalline aquifers:Analysis of the Tampere region, Finland被引量:3
《Geoscience Frontiers》2019年第5期1731-1741,共11页Daniele Pedretti Samrit Luoma Timo Ruskeeniemi Birgitta Backman 
supported by GTK (internal funding);EU Life-Environment Program (RAMAS project);EU Life+Project focusing on natural aggregate resources (ASROCKS)
The study illustrates the critical role of accurate geological structural mapping to delineate crystalline aquifer zones more prone to high health risk due to elevated dissolved As in drinking wells.The analysis revis...
关键词:ARSENIC RISK CRYSTALLINE BEDROCK Fractured aquifers Heterogeneity FINLAND 
Compressive Sensing-Based Audio Semi-fragile Zero-Watermarking Algorithm被引量:5
《Chinese Journal of Electronics》2015年第3期492-497,共6页TANG Xin MA Zhaofeng NIU Xinxin YANG Yixian 
supported by the National Natural Science Foundation of China(No.61272519,No.61170271,No.61121061)
A novel compressive sensing-based audio semi-fragile zero-watermarking algorithm is proposed in this paper. This algorithm transforms the original audio signal into the wavelet domain and applies compressive sensing t...
关键词:COMPRESSIVE SENSING SEMI-FRAGILE Zerowatermarking TAMPER detection 
An Image Authentication Method by Grouping Most Significant Bits
《Journal of Electronic Science and Technology》2013年第1期33-37,共5页Chi-Shiang Chan Yuan-Yu Tsai Chao-Liang Liu 
supported by the Asia University,Taiwan under Grant No.100-ASIA-38
In 2011, Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged. Due to this rearrangement, the value of the most-significant bit of each tampered p...
关键词:Image authentication information hiding tamper proofing. 
Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards被引量:2
《The Journal of China Universities of Posts and Telecommunications》2012年第5期104-114,共11页WANG Ding MA Chun-guang 
supported by the National Natural Science Foundation of China(61170241,61073042)
With the broad implementations of the electronic business and government applications, robust system security and strong privacy protection have become essential requirements for remote user authentication schemes. Re...
关键词:CRYPTANALYSIS authentication protocol smart card non-tamper resistant forward secrecy 
Comparative Evaluation of Semi Fragile Watermarking Algorithms for Image Authentication被引量:2
《Journal of Information Security》2012年第3期189-195,共7页Archana Tiwari Manisha Sharma 
Technology has no limits today;we have lots of software available in the market by which we can alter any image. People usually copies image from the internet and after some changes they claim that these are their own...
关键词:Image AUTHENTICATION Selective AUTHENTICATION Content Recovery ROBUSTNESS Semifragile WATERMARKING TAMPER Detection PSNR 
Digital Evidence for Database Tamper Detection
《Journal of Information Security》2012年第2期113-121,共9页Shweta Tripathi Bandu Baburao Meshram 
Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identifi...
关键词:TAMPER Detection LOG FILES FORENSICS ORACLE DATABASE 
Forward-Secure Digital Signature Scheme with Tamper Evidence
《Wuhan University Journal of Natural Sciences》2008年第5期582-586,共5页JIANG Han XU Qiuliang LIN Fengbo 
the Natural Science Foundation of Shandong Province (Y2007G37)
Based on the definition of tamper evidence, the authors define a new notion of tamper evidence forward secure signature scheme (TE-FSig), and propose a general method to build a TE-FSig scheme. Based on this method,...
关键词:tamper evidence forward secure bilinear map aggregate signature strongly unforgeable strong forward tamper-evidence secure 
检索报告 对象比较 聚类工具 使用帮助 返回顶部