Results 21 to 30 of about 36,777 (311)

Image copy-move forgery detection and localization based on super-BPD segmentation and DCNN

open access: yesScientific Reports, 2022
With the increasing importance of image information, image forgery seriously threatens the security of image content. Copy-move forgery detection (CMFD) is a greater challenge because its abnormality is smaller than other forgeries.
Qianwen Li   +3 more
doaj   +1 more source

On the security of digital signature schemes based on error-correcting codes [PDF]

open access: yes, 2003
We discuss the security of digital signature schemes based on error-correcting codes. Several attacks to the Xinmei scheme are surveyed, and some reasons given to explain why the Xinmei scheme failed, such as the linearity of the signature and the ...
Doumen, Jeroen   +2 more
core   +3 more sources

Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection [PDF]

open access: green
Comment: ICLR 2024 ...
Jiawei Liang   +5 more
openalex   +3 more sources

Spectrum sharing security and attacks in CRNs: a review [PDF]

open access: yes, 2014
Cognitive Radio plays a major part in communication technology by resolving the shortage of the spectrum through usage of dynamic spectrum access and artificial intelligence characteristics.
Alhakami, Wajdi   +2 more
core   +3 more sources

A Multi-User, Single-Authentication Protocol for Smart Grid Architectures [PDF]

open access: yes, 2020
open access articleIn a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data
Al-Bayatti, Ali Hilal   +2 more
core   +2 more sources

Quantum authentication with unitary coding sets [PDF]

open access: yes, 2002
A general class of authentication schemes for arbitrary quantum messages is proposed. The class is based on the use of sets of unitary quantum operations in both transmission and reception, and on appending a quantum tag to the quantum message used in ...
David J. Santos   +8 more
core   +2 more sources

Deepfake Cross-Model Defense Method Based on Generative Adversarial Network [PDF]

open access: yesJisuanji gongcheng
To reduce social risks caused by the abuse of deepfake technology, an active defense method against deep forgery based on a Generative Adversarial Network (GAN) is proposed. Adversarial samples are created by adding imperceptible perturbation to original
DAI Lei, CAO Lin, GUO Yanan, ZHANG Fan, DU Kangning
doaj   +1 more source

Differential Forgery Attack Against LAC [PDF]

open access: yes, 2016
LAC is one of the candidates to the CAESAR competition. In this note we present a differential forgery attack on LAC. We show that some differentials have a probability higher than 2^-64, using a collection of characteristics in order to evaluate a lower bound on the probability of a differential. This allows a forgery attack on the full LAC. This work
openaire   +3 more sources

Toward Resisting Forgery Attacks via Pseudo-Signatures [PDF]

open access: yes2009 10th International Conference on Document Analysis and Recognition, 2009
Recent work has shown that certain handwriting biometrics are susceptible to forgery attacks, both human- and machine-based. In this paper, we examine a new scheme for using handwritten input that attempts to address such concerns. Pseudo-signatures are intended to be easy for users to create and reproduce while being resilient to forgeries.
Jin Chen   +2 more
openaire   +1 more source

A Watermark-Based Scheme for Authenticating JPEG Image Integrity

open access: yesIEEE Access, 2018
JPEG is the most common image format in smartphones, computers, or digital cameras. Because numerous JPEG images are easily shared and distributed, there are privacy and security concerns for these images.
Oh-Jin Kwon   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy