Results 71 to 80 of about 29,824 (175)
Towards Universal Quantum Tamper Detection
Tamper-resilient cryptography studies how to protect data against adversaries who can physically manipulate codewords before they are decoded. The notion of tamper detection codes formalizes this goal, requiring that any unauthorized modification be detected with high probability.
Broadbent, Anne +2 more
openaire +2 more sources
Improvement of Alert System against Tampering and Theft in Surveillance Cameras
Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around.
Furat N. Tawfeeq
doaj +1 more source
This research introduces efficient algorithms for the forward and inverse lossless Integer-to-Integer Tchebichef Transform (I2ITT), tailored for resource-constrained embedded systems.
Achraf Daoui +4 more
doaj +1 more source
Physical Tampering Detection Using Single COTS Wi-Fi Endpoint. [PDF]
Chan PY, Lai AI, Wu PY, Wu RB.
europepmc +1 more source
Overcome the Brightness and Jitter Noises in Video Inter-Frame Tampering Detection. [PDF]
Pu H, Huang T, Weng B, Ye F, Zhao C.
europepmc +1 more source
Non-technical loss in power grid not only has a significant impact on the economic benefits of the power company, but also poses a serious threat to power quality and operational safety of the power system.
WANG Yunjing +5 more
doaj +1 more source
Prefix oriented N4WA coding scheme for improved tampering detection in relational data
In this paper, a memory efficient N4WA coding scheme (breifed in section 3.1) ispresented to detect tampering and restoring modified data values in relational data.The existing watermarking schemes for tampering detection do not provide ...
Waqas Haider +4 more
doaj
4KSecure: A Universal Method for Active Manipulation Detection in Images of Any Resolution
This paper presents a method for actively safeguarding image integrity based on embedding a hidden signature generated by a neural network. The proposed solution utilizes two cooperating networks: the first one is responsible for generating a signature ...
Paweł Duszejko, Zbigniew Piotrowski
doaj +1 more source
Numerous image authentication techniques have been devised to address the potential security issue of malicious tampering with image content since digital images can be easily duplicated, modified, transformed and diffused via the Internet transmission ...
Xuejing Li +3 more
doaj +1 more source
Temporal Tampering Detection in Automotive Dashcam Videos via Multi-Feature Forensic Analysis and a 1D Convolutional Neural Network. [PDF]
Shinwari AR, Khairuddin UB, Haniff MFB.
europepmc +1 more source

