Results 11 to 20 of about 29,824 (175)

Adaptive Ensemble Methods for Tampering Detection in Automotive Aftertreatment Systems

open access: yesIEEE Access, 2022
Control and diagnostic processes in modern vehicles incorporate nowadays a wide set of functionalities to preserve the vehicle’s health. Automotive vehicles contain embedded systems that must perform a diverse palette of tasks, ranging from less ...
Roland Bolboaca
doaj   +1 more source

Deepfake Detection Method Based on Tampering Artifacts [PDF]

open access: yesJisuanji gongcheng, 2021
With the development of Deepfake technology, criminals may use fake pictures to forge alibi, misleading the direction of investigation to evade legal responsibility.Most existing detection methods are data-driven, and are not robust in terms of the cross-
GENG Pengzhi, FAN Hongxing, ZHANG Yiyang, TANG Yunqi
doaj   +1 more source

Effective Self-Recovery and Tampering Localization Fragile Watermarking for Medical Images

open access: yesIEEE Access, 2020
It is increasingly important to achieve security and anti-counterfeiting for medical images. The integrity and verifiability of medical images before they are reviewed for potential medical diagnoses is imperative.
Guo-Dong Su   +2 more
doaj   +1 more source

Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems

open access: yes2022 IEEE Symposium on Security and Privacy (SP), 2022
A whole range of attacks becomes possible when adversaries gain physical access to computing systems that process or contain sensitive data. Examples include side-channel analysis, bus probing, device cloning, or implanting hardware Trojans. Defending against these kinds of attacks is considered a challenging endeavor, requiring anti-tamper solutions ...
Staat, Paul   +3 more
openaire   +2 more sources

Image tampering detection using genetic algorithm [PDF]

open access: yesMATEC Web of Conferences, 2019
As digital images become an indispensable source of information, the authentication of digital images has become crucial. Various techniques of forgery have come into existence, intrusive, and non-intrusive. Image forgery detection hence is becoming more
Agarwal Ritu, Pant Mallika
doaj   +1 more source

Heuristic Optimization Algorithm Based Watermarking on Content Authentication and Tampering Detection for English Text

open access: yesIEEE Access, 2023
Text information is a natural language dependent, which enhances reliability and security of text data exchanged through Internet networks and is becoming main concern for researchers.
Fahd N. Al-Wesabi   +5 more
doaj   +1 more source

Tampered energy meter information conveyed to concerned authority by wireless communication [PDF]

open access: yesE3S Web of Conferences
Utility companies face a serious problem with energy metre manipulation, which can result in lost income, inaccurate invoicing, and safety issues. Maintaining fair billing practices and the integrity of energy distribution systems depend on the prompt ...
Chandra Prasad S. Hari   +4 more
doaj   +1 more source

Non-Malleable Code in the Split-State Model

open access: yesEntropy, 2022
Non-malleable codes are a natural relaxation of error correction and error detection codes applicable in scenarios where error-correction or error-detection is impossible.
Divesh Aggarwal   +2 more
doaj   +1 more source

Efficient non-malleable codes and key derivation for poly-size tampering circuits [PDF]

open access: yes, 2016
Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS '10), provide roughly the following guarantee: if a codeword c encoding some message x is tampered to c' = f(c) such that c' ≠ c , then the tampered message x' contained in c' reveals ...
Faust, Sebastian   +3 more
core   +1 more source

Non-malleable codes for space-bounded tampering [PDF]

open access: yes, 2017
Non-malleable codes—introduced by Dziembowski, Pietrzak and Wichs at ICS 2010—are key-less coding schemes in which mauling attempts to an encoding of a given message, w.r.t.
A Faonio   +30 more
core   +2 more sources

Home - About - Disclaimer - Privacy