Results 41 to 50 of about 29,824 (175)
Verifiable image revision from chameleon hashes
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and privacy exposure.
Junpeng Xu +4 more
doaj +1 more source
Sound and Precise Malware Analysis for Android via Pushdown Reachability and Entry-Point Saturation [PDF]
We present Anadroid, a static malware analysis framework for Android apps. Anadroid exploits two techniques to soundly raise precision: (1) it uses a pushdown system to precisely model dynamically dispatched interprocedural and exception-driven control ...
Aldous, Petey +6 more
core +2 more sources
Hash-Tree Anti-Tampering Schemes [PDF]
Procedures that provide detection, location and correction of tampering in documents are known as anti-tampering schemes. In this paper we describe how to construct an anti-tampering scheme using a pre-computed tree of hashes.
Ashman, Helen, Moss, Ben
core
Detecting Location Fraud in Indoor Mobile Crowdsensing
Mobile crowdsensing allows a large number of mobile devices to measure phenomena of common interests and form a body of knowledge about natural and social environments.
Tahoun, Ezzeldin, Xu, Qiang, Zheng, Rong
core +1 more source
Tamper Detection in Audit Logs [PDF]
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable.
R SNODGRASS, S YAO, C COLLBERG
openaire +1 more source
HIDDEN MARKOV MODELS FOR SOFTWARE PIRACY DETECTION [PDF]
The unauthorized copying of software is often referred to as software piracy. Soft- ware piracy causes billions of dollars of annual losses for companies and governments worldwide. In this project, we analyze a method for detecting software piracy.
Kazi, Shabana
core +1 more source
Noise-attention-based forgery face detection method
With the advancement of artificial intelligence and deep neural networks, the ease of image generation and editing has increased significantly.Consequently, the occurrence of malicious tampering and forgery using image generation tools is on the rise ...
Bolin ZHANG +7 more
doaj +3 more sources
Space-time Domain Jointed Detection Algorithm for Object Removing Video [PDF]
With the rapid development of multimedia technology tampering software becomes more and more easy to be obtained and used.However,the subsequent forged video interfere the justice of judgment seriously in the meantime.So the detection of video forgery ...
WANG Bin,WANG Rangding
doaj +1 more source
Robust Watermarking using Hidden Markov Models [PDF]
Software piracy is the unauthorized copying or distribution of software. It is a growing problem that results in annual losses in the billions of dollars.
Mungale, Mausami
core +1 more source
Tamper Detection in Text Document
Although text document images authentication is difficult due to the binary nature and clear separation between the background and foreground but it is getting higher demand for many applications. Most previous researches in this field depend on insertion watermark in the document, the drawback in these techniques lie in the fact that changing pixel ...
openaire +4 more sources

