Results 71 to 80 of about 29,824 (175)

Towards Universal Quantum Tamper Detection

open access: yes
Tamper-resilient cryptography studies how to protect data against adversaries who can physically manipulate codewords before they are decoded. The notion of tamper detection codes formalizes this goal, requiring that any unauthorized modification be detected with high probability.
Broadbent, Anne   +2 more
openaire   +2 more sources

Improvement of Alert System against Tampering and Theft in Surveillance Cameras

open access: yesTikrit Journal of Pure Science, 2019
Use of Surveillance cameras in houses and markets became common, that resulted to minimize theft and make it a difficult task because it let recording and viewing what is going around.
Furat N. Tawfeeq
doaj   +1 more source

FPGA-Implementation of Lossless Integer Tchebichef Transform With Application for Tampering Detection in ROI Medical Images

open access: yesIEEE Access
This research introduces efficient algorithms for the forward and inverse lossless Integer-to-Integer Tchebichef Transform (I2ITT), tailored for resource-constrained embedded systems.
Achraf Daoui   +4 more
doaj   +1 more source

Detection and identification of non-technical loss based on electricity consumption curve and deep learning

open access: yesDiance yu yibiao
Non-technical loss in power grid not only has a significant impact on the economic benefits of the power company, but also poses a serious threat to power quality and operational safety of the power system.
WANG Yunjing   +5 more
doaj   +1 more source

Prefix oriented N4WA coding scheme for improved tampering detection in relational data

open access: yesKuwait Journal of Science, 2016
In this paper, a memory efficient N4WA coding scheme (breifed in section 3.1) ispresented to detect tampering and restoring modified data values in relational data.The existing watermarking schemes for tampering detection do not provide ...
Waqas Haider   +4 more
doaj  

4KSecure: A Universal Method for Active Manipulation Detection in Images of Any Resolution

open access: yesApplied Sciences
This paper presents a method for actively safeguarding image integrity based on embedding a hidden signature generated by a neural network. The proposed solution utilizes two cooperating networks: the first one is responsible for generating a signature ...
Paweł Duszejko, Zbigniew Piotrowski
doaj   +1 more source

Block mapping and dual-matrix-based watermarking for image authentication with self-recovery capability.

open access: yesPLoS ONE
Numerous image authentication techniques have been devised to address the potential security issue of malicious tampering with image content since digital images can be easily duplicated, modified, transformed and diffused via the Internet transmission ...
Xuejing Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy