Results 31 to 40 of about 29,824 (175)

Systematic analysis of video tampering and detection techniques

open access: yesCogent Engineering
Video tampering detection is a crucial research area that aims to identify and mitigate the manipulation and tampering of video content. With the widespread use of videos in various applications, ensuring the integrity and truthfulness of video data has ...
Anjali Diwan   +3 more
doaj   +1 more source

Review on remote OBD system data analysis of heavy-duty diesel vehicle

open access: yes能源环境保护, 2023
Heavy-duty diesel vehicle is an important source of nitrogen oxides and particulates in the atmosphere. The remote OBD system combines OBD technology with wireless communication technology to send the vehicle operation data, emission status and fault ...
LIU Haoye   +3 more
doaj   +1 more source

Non-Malleable Codes for Small-Depth Circuits [PDF]

open access: yes, 2018
We construct efficient, unconditional non-malleable codes that are secure against tampering functions computed by small-depth circuits. For constant-depth circuits of polynomial size (i.e.
Ball, Marshall   +4 more
core   +2 more sources

On Resampling Detection and its Application to Detect Image Tampering [PDF]

open access: yes2006 IEEE International Conference on Multimedia and Expo, 2006
Usually digital image forgeries are created by copy-pasting a portion of an image onto some other image. While doing so, it is often necessary to resize the pasted portion of the image to suit the sampling grid of the host image. The resampling operation changes certain characteristics of the pasted portion, which when detected serves as a clue of ...
Prasad, S., K. R., Ramakrishnan
openaire   +2 more sources

An Encrypted Speech Integrity Authentication Method: Focus on Fine-Grained Tampering Detection and Tampering Recovery Under High Tamper Ratios

open access: yesMathematics
With the increasing amount of cloud-based speech files, the privacy protection of speech files faces significant challenges. Therefore, integrity authentication of speech files is crucial, and there are two pivotal problems: (1) how to achieve fine ...
Fujiu Xu, Jianqiang Li, Xi Xu
doaj   +1 more source

Fraud detection in energy consumption: a supervised approach [PDF]

open access: yes, 2016
Data from utility meters (gas, electricity, water) is a rich source of information for distribution companies, beyond billing. In this paper we present a supervised technique, which primarily but not only feeds on meter information, to detect meter ...
Alcoverro, Santiago   +4 more
core   +1 more source

Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment [PDF]

open access: yes, 2018
Vehicles today are relying more on technologies to bring about fully autonomous features. The conventional wirings within are being simplified into a network of electronic components, and this network is controlled via advanced sensing of the environment
Keoh, Sye Loong   +2 more
core   +1 more source

Tamper Detection in Color Image

open access: yesBaghdad Science Journal, 2008
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified.
openaire   +4 more sources

Revisiting the Sanders-Freiman-Ruzsa Theorem in $\mathbb{F}_p^n$ and its Application to Non-malleable Codes [PDF]

open access: yes, 2016
Non-malleable codes (NMCs) protect sensitive data against degrees of corruption that prohibit error detection, ensuring instead that a corrupted codeword decodes correctly or to something that bears little relation to the original message.
Aggarwal, Divesh, Briët, Jop
core   +7 more sources

Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm

open access: yesSensors, 2013
Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types.
Jonny Karlsson   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy