Results 21 to 30 of about 29,824 (175)

Blind Quantum Computation [PDF]

open access: yes, 2006
We investigate the possibility of "having someone carry out the work of executing a function for you, but without letting him learn anything about your input".
Arrighi, Pablo, Salvail, Louis
core   +1 more source

A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.

open access: yesPLoS ONE, 2020
The existing tamper detection schemes for absolute moment block truncation coding (AMBTC) compressed images are able to detect the tampering. However, the marked image qualities of these schemes can be enhanced, and their authentication methods may fail ...
Wien Hong   +4 more
doaj   +1 more source

A two-stage detection method of copy-move forgery based on parallel feature fusion

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
The copy-move forgery refers to the copying and pasting of a region of the original image into the target region of the same image, which represents a typical tampering method with the characteristics of easy tampering and high-quality tampering.
Wujian Ye   +4 more
doaj   +1 more source

Benchmarks for Detecting Measurement Tampering

open access: yes, 2023
Edits: extended and improved appendices, fixed references, figures, and ...
Roger, Fabien   +4 more
openaire   +2 more sources

Blur detection of digital forgery using mathematical morphology

open access: yes网络与信息安全学报, 2017
Aiming at the fuzzy operation commonly used in image tampering,a new fuzzy detection scheme using smooth filter preserving edges and mathematical morphological methods was studied.By using the sharpening function and denoising function of both methods ...
Hui-fen HUANG   +2 more
doaj   +3 more sources

Surveillance Footage Video Tampering Detection

open access: yesInformatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems, 2020
The quality of the captured images was enhanced by some of the first digital video and image processing applications, but as the power of computers expanded, so did the number of applications where video and image processing could make a difference. Video and image processing are used in many different applications nowadays.
P Vijayaraghavan   +3 more
openaire   +2 more sources

Detecting Test Tampering Using Item Response Theory [PDF]

open access: yesEducational and Psychological Measurement, 2015
Test tampering, especially on tests for educational accountability, is an unfortunate reality, necessitating that the state (or its testing vendor) perform data forensic analyses, such as erasure analyses, to look for signs of possible malfeasance. Few statistical approaches exist for detecting fraudulent erasures, and those that do largely do not ...
James A, Wollack   +2 more
openaire   +2 more sources

TDRB: An Efficient Tamper-Proof Detection Middleware for Relational Database Based on Blockchain Technology

open access: yesIEEE Access, 2021
The relational database has become one of the mainstream tools for data storage and management. However, there are two main types of threats to relational databases: external attacks and internal tampering threats. In this paper, we focus on the internal
Jie Lian, Siqian Wang, Yanmiao Xie
doaj   +1 more source

Quantum Security for the Physical Layer [PDF]

open access: yes, 2013
The physical layer describes how communication signals are encoded and transmitted across a channel. Physical security often requires either restricting access to the channel or performing periodic manual inspections.
Humble, Travis S.
core   +2 more sources

Video tamper detection method based on nonnegative tensor factorization

open access: yes网络与信息安全学报, 2017
The authenticity and integrity of video authentication is one of the important contents in information security field.A video tampering detection method based on non-negative tensor decomposition was proposed for video inter-frame tampering.First of all ...
Xue-li ZHANG,Tian-qiang HUANG,Wei HUANG   +1 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy