Results 31 to 40 of about 29,824 (175)
Systematic analysis of video tampering and detection techniques
Video tampering detection is a crucial research area that aims to identify and mitigate the manipulation and tampering of video content. With the widespread use of videos in various applications, ensuring the integrity and truthfulness of video data has ...
Anjali Diwan +3 more
doaj +1 more source
Review on remote OBD system data analysis of heavy-duty diesel vehicle
Heavy-duty diesel vehicle is an important source of nitrogen oxides and particulates in the atmosphere. The remote OBD system combines OBD technology with wireless communication technology to send the vehicle operation data, emission status and fault ...
LIU Haoye +3 more
doaj +1 more source
Non-Malleable Codes for Small-Depth Circuits [PDF]
We construct efficient, unconditional non-malleable codes that are secure against tampering functions computed by small-depth circuits. For constant-depth circuits of polynomial size (i.e.
Ball, Marshall +4 more
core +2 more sources
On Resampling Detection and its Application to Detect Image Tampering [PDF]
Usually digital image forgeries are created by copy-pasting a portion of an image onto some other image. While doing so, it is often necessary to resize the pasted portion of the image to suit the sampling grid of the host image. The resampling operation changes certain characteristics of the pasted portion, which when detected serves as a clue of ...
Prasad, S., K. R., Ramakrishnan
openaire +2 more sources
With the increasing amount of cloud-based speech files, the privacy protection of speech files faces significant challenges. Therefore, integrity authentication of speech files is crucial, and there are two pivotal problems: (1) how to achieve fine ...
Fujiu Xu, Jianqiang Li, Xi Xu
doaj +1 more source
Fraud detection in energy consumption: a supervised approach [PDF]
Data from utility meters (gas, electricity, water) is a rich source of information for distribution companies, beyond billing. In this paper we present a supervised technique, which primarily but not only feeds on meter information, to detect meter ...
Alcoverro, Santiago +4 more
core +1 more source
Autonomous Vehicle Ultrasonic Sensor Vulnerability and Impact Assessment [PDF]
Vehicles today are relying more on technologies to bring about fully autonomous features. The conventional wirings within are being simplified into a network of electronic components, and this network is controlled via advanced sensing of the environment
Keoh, Sye Loong +2 more
core +1 more source
Tamper Detection in Color Image
In this work a fragile watermarking scheme is presented. This scheme is applied to digital color images in spatial domain. The image is divided into blocks, and each block has its authentication mark embedded in it, we would be able to insure which parts of the image are authentic and which parts have been modified.
openaire +4 more sources
Revisiting the Sanders-Freiman-Ruzsa Theorem in $\mathbb{F}_p^n$ and its Application to Non-malleable Codes [PDF]
Non-malleable codes (NMCs) protect sensitive data against degrees of corruption that prohibit error detection, ensuring instead that a corrupted codeword decodes correctly or to something that bears little relation to the original message.
Aggarwal, Divesh, Briët, Jop
core +7 more sources
Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types.
Jonny Karlsson +2 more
doaj +1 more source

