Results 41 to 50 of about 29,824 (175)

Verifiable image revision from chameleon hashes

open access: yesCybersecurity, 2021
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu   +4 more
doaj   +1 more source

Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation [PDF]

open access: yes, 2013
We present Anadroid, a static malware analysis framework for Android apps. Anadroid exploits two techniques to soundly raise precision: (1) it uses a pushdown system to precisely model dynamically dispatched interprocedural and exception-driven control ...
Aldous, Petey   +6 more
core   +2 more sources

Hash-Tree Anti-Tampering Schemes [PDF]

open access: yes, 2002
Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes.
Ashman, Helen, Moss, Ben
core  

Detecting Location Fraud in Indoor Mobile Crowdsensing

open access: yes, 2017
Mobile crowdsensing allows a large number of mobile devices to measure phenomena of common interests and form a body of knowledge about natural and social environments.
Tahoun, Ezzeldin, Xu, Qiang, Zheng, Rong
core   +1 more source

Tamper Detection in Audit Logs [PDF]

open access: yes, 2004
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable.
R SNODGRASS, S YAO, C COLLBERG
openaire   +1 more source

HIDDEN MARKOV MODELS FOR SOFTWARE PIRACY DETECTION [PDF]

open access: yes, 2012
The unauthorized copying of software is often referred to as software piracy. Soft- ware piracy causes billions of dollars of annual losses for companies and governments worldwide. In this project, we analyze a method for detecting software piracy.
Kazi, Shabana
core   +1 more source

Noise-attention-based forgery face detection method

open access: yes网络与信息安全学报, 2023
With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise ...
Bolin ZHANG   +7 more
doaj   +3 more sources

Space-time Domain Jointed Detection Algorithm for Object Removing Video [PDF]

open access: yesJisuanji gongcheng, 2018
With the rapid development of multimedia technology tampering software becomes more and more easy to be obtained and used.However,the subsequent forged video interfere the justice of judgment seriously in the meantime.So the detection of video forgery ...
WANG Bin,WANG Rangding
doaj   +1 more source

Robust Watermarking using Hidden Markov Models [PDF]

open access: yes, 2011
Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars.
Mungale, Mausami
core   +1 more source

Tamper Detection in Text Document

open access: yesBaghdad Science Journal, 2008
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel ...
openaire   +4 more sources

Home - About - Disclaimer - Privacy