Showing 5,261 - 5,280 results of 7,025 for search '"Tampere"', query time: 0.92s Refine Results
  1. 5261
  2. 5262

    Supply Chain of Relief Materials using Blockchain by Bhatelia Jeet, Pandita Sagar, Ajmera Abhishek, Shekokar Narendra, Katre Neha

    Published 2020-01-01
    “…Our solution incorporates a box-in-box approach whilst keeping tabs via tamper-proof barcodes. Barcodes will be frequently scanned at designated locations. …”
    Get full text
    Article
  3. 5263

    Towards a new model for information warfare / Abdulrahman R. Alazmi by R. Alazmi, Abdulrahman

    Published 2014
    “…And with such flexibility in the distribution of information and its channels comes the huge risk of the information being compromised, tampered with, or corrupted. Such intentional acts of compromising and corrupting information for a certain goal constitute what is known as Information Warfare. …”
    Get full text
    Article
  4. 5264

    Coding in theoretical computer science by Chen, Yuan

    Published 2018
    “…In our last topic, we focus on the design of tampering detection codes or non-malleable codes resistant to large families of tampering function. …”
    Get full text
    Thesis
  5. 5265

    Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techni... by Abbas, Nidaa Hasan

    Published 2017
    “…In this thesis, a dual purpose watermarking system is designed that satisfy both robustness and fragility, and thus combining copyright protection and tamper proofing simultaneously without significantly degrading each other. …”
    Get full text
    Thesis
  6. 5266

    Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection by Rabha W. Ibrahim, Zahra Moghaddasi, Hamid A. Jalab, Rafidah Md Noor

    Published 2015-07-01
    “…The masks slide over the tampered image, and each pixel of the tampered image is convolved with the fractional mask weight window on eight directions. …”
    Get full text
    Article
  7. 5267

    Still and anymore in Burmese: another look at /theì/, /oùn/, /tó/ by Okell, John

    Published 2024
    “…Jones is (now) tampering', hence +x, and 'Mr. Jones was )previously) tamperint hence +y.…”
    Get full text
    Journal Article
  8. 5268

    Fragile and robust dual image watermarking based on DWT-SVD by Ernawan, Ferda, Gen, Lim Chen, Suraya, Abu Bakar, Chuin, Liew Siau, Azamuddin, Ab Rahman

    Published 2024
    “…Additionally, the proposed scheme achieved robustness with an NC value of about 0.981 against tampering rates up to 50%.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 5269

    A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images by Kaimeng Ding, Yueming Liu, Qin Xu, Fuqiang Lu

    Published 2020-08-01
    “…Experiments show that our algorithm has higher tamper sensitivity to subject-related malicious tampering, and the robustness is improved by about 10% compared to the existing U-net-based algorithm; compared to other deep learning-based algorithms, this algorithm achieves a better balance between robustness and tampering sensitivity, and has better overall performance.…”
    Get full text
    Article
  10. 5270

    A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids by Iram Bashir, Fawad Ahmed, Jawad Ahmad, Wadii Boulila, Nouf Alharbi

    Published 2019-11-01
    “…The proposed hashing scheme has been evaluated through a number of experiments involving cases of non-malicious distortions and malicious tampering. Experimental results reveal that the proposed hashing scheme is robust against non-malicious distortions and is sensitive to detect minute malicious tampering. …”
    Get full text
    Article
  11. 5271

    Optimal Oblivious RAM with Integrity by Mathialagan, Surya

    Published 2023
    “…In this work, we construct an ORAM protocol with worst-case O(log N) overhead and O(1) client storage that also protects against tampering adversaries. This matches the efficiency of the best known ORAM constructions while additionally providing security against tampering. …”
    Get full text
    Thesis
  12. 5272

    Blurred image splicing localization by exposing blur type inconsistency by Bahrami, Khosro, Kot, Alex Chichung, Li, Leida, Li, Haoliang

    Published 2015
    “…In a tampered blurred image generated by splicing, the spliced region and the original image may have different blur types. …”
    Get full text
    Get full text
    Journal Article
  13. 5273

    A study of women in the audit profession. by Chia, Ai Peng, Sng, Evonne Yen Yin, Wong, Tarn Lian

    Published 2014
    “…It would be unwise to tamper with this structure."…”
    Get full text
    Final Year Project (FYP)
  14. 5274

    A Review of Blockchain-Based Secure Sharing of Healthcare Data by Peng Xi, Xinglong Zhang, Lian Wang, Wenjuan Liu, Shaoliang Peng

    Published 2022-08-01
    “…Blockchain is widely used in the management of healthcare data because of its decentralized and tamper-proof features. In order to study the development of blockchain in healthcare, this paper evaluates it from various perspectives. …”
    Get full text
    Article
  15. 5275

    Image splicing detection based on noise level approach by Mohammed Kassem Alshwely, Saad N. AlSaad

    Published 2020-12-01
    “…It is now not easy by just looking at an image to know whether the image is original or has been tampered. This article describes a new image splicing detection method based on noise level as a major feature to detect the tempered region. …”
    Get full text
    Article
  16. 5276

    Blockchain-Watermarking for Compressive Sensed Images by Ming Li, Leilei Zeng, Le Zhao, Renlin Yang, Dezhi An, Haiju Fan

    Published 2021-01-01
    “…With the application of multimedia big data, the problems such as information leakage and data tampering have emerged. The security of images which is one of the most typical multimedia has become a major problem facing the large-scale open network environment. …”
    Get full text
    Article
  17. 5277

    Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran by Mohammed S. Khalil, Fajri Kurniawan, Muhammad Khurram Khan, Yasser M. Alginahi

    Published 2014-01-01
    “…Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.…”
    Get full text
    Article
  18. 5278

    A secure HEVC video watermarking scheme for authentication and copyright purposes by Elrowayati, Ali Abdulhafid

    Published 2020
    “…However, HEVC streams can be easily tampered by any third party, which negatively affects the authentication and copyright protection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 5279

    Image forgery detection algorithm based on U-shaped detection network by Zhuzhu WANG

    Published 2019-04-01
    “…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
    Get full text
    Article
  20. 5280

    Development of a Customized Blockchain Technology-Based Parameter Matching Protocol for Semiconductor Manufacturing by Myoung Soo Choi, Jumyung Um, Sang-Seok Lee

    Published 2024-01-01
    “…This paper introduces a novel solution to mitigate the vulnerability of operational parameter tampering in the semiconductor industry through a customized blockchain protocol. …”
    Get full text
    Article