Results 21 to 30 of about 36,777 (311)
Image copy-move forgery detection and localization based on super-BPD segmentation and DCNN
With the increasing importance of image information, image forgery seriously threatens the security of image content. Copy-move forgery detection (CMFD) is a greater challenge because its abnormality is smaller than other forgeries.
Qianwen Li +3 more
doaj +1 more source
On the security of digital signature schemes based on error-correcting codes [PDF]
We discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the ...
Doumen, Jeroen +2 more
core +3 more sources
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection [PDF]
Comment: ICLR 2024 ...
Jiawei Liang +5 more
openalex +3 more sources
Spectrum sharing security and attacks in CRNs: a review [PDF]
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi +2 more
core +3 more sources
A Multi-User, Single-Authentication Protocol for Smart Grid Architectures [PDF]
open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data
Al-Bayatti, Ali Hilal +2 more
core +2 more sources
Quantum authentication with unitary coding sets [PDF]
A general class of authentication schemes for arbitrary quantum messages is proposed. The class is based on the use of sets of unitary quantum operations in both transmission and reception, and on appending a quantum tag to the quantum message used in ...
David J. Santos +8 more
core +2 more sources
Deepfake Cross-Model Defense Method Based on Generative Adversarial Network [PDF]
To reduce social risks caused by the abuse of deepfake technology, an active defense method against deep forgery based on a Generative Adversarial Network (GAN) is proposed. Adversarial samples are created by adding imperceptible perturbation to original
DAI Lei, CAO Lin, GUO Yanan, ZHANG Fan, DU Kangning
doaj +1 more source
Differential Forgery Attack Against LAC [PDF]
LAC is one of the candidates to the CAESAR competition. In this note we present a differential forgery attack on LAC. We show that some differentials have a probability higher than 2^-64, using a collection of characteristics in order to evaluate a lower bound on the probability of a differential. This allows a forgery attack on the full LAC. This work
openaire +3 more sources
Toward Resisting Forgery Attacks via Pseudo-Signatures [PDF]
Recent work has shown that certain handwriting biometrics are susceptible to forgery attacks, both human- and machine-based. In this paper, we examine a new scheme for using handwritten input that attempts to address such concerns. Pseudo-signatures are intended to be easy for users to create and reproduce while being resilient to forgeries.
Jin Chen +2 more
openaire +1 more source
A Watermark-Based Scheme for Authenticating JPEG Image Integrity
JPEG is the most common image format in smartphones, computers, or digital cameras. Because numerous JPEG images are easily shared and distributed, there are privacy and security concerns for these images.
Oh-Jin Kwon +2 more
doaj +1 more source

