-
5261
-
5262
Supply Chain of Relief Materials using Blockchain
Published 2020-01-01“…Our solution incorporates a box-in-box approach whilst keeping tabs via tamper-proof barcodes. Barcodes will be frequently scanned at designated locations. …”
Get full text
Article -
5263
Towards a new model for information warfare / Abdulrahman R. Alazmi
Published 2014“…And with such flexibility in the distribution of information and its channels comes the huge risk of the information being compromised, tampered with, or corrupted. Such intentional acts of compromising and corrupting information for a certain goal constitute what is known as Information Warfare. …”
Get full text
Article -
5264
Coding in theoretical computer science
Published 2018“…In our last topic, we focus on the design of tampering detection codes or non-malleable codes resistant to large families of tampering function. …”
Get full text
Thesis -
5265
Design of robust and fragile image watermarking system for copyright protection and authentication using lifting wavelet transform and bivariate empirical mode decomposition techni...
Published 2017“…In this thesis, a dual purpose watermarking system is designed that satisfy both robustness and fragility, and thus combining copyright protection and tamper proofing simultaneously without significantly degrading each other. …”
Get full text
Thesis -
5266
Fractional Differential Texture Descriptors Based on the Machado Entropy for Image Splicing Detection
Published 2015-07-01“…The masks slide over the tampered image, and each pixel of the tampered image is convolved with the fractional mask weight window on eight directions. …”
Get full text
Article -
5267
Still and anymore in Burmese: another look at /theì/, /oùn/, /tó/
Published 2024“…Jones is (now) tampering', hence +x, and 'Mr. Jones was )previously) tamperint hence +y.…”
Get full text
Journal Article -
5268
Fragile and robust dual image watermarking based on DWT-SVD
Published 2024“…Additionally, the proposed scheme achieved robustness with an NC value of about 0.981 against tampering rates up to 50%.…”
Get full text
Get full text
Conference or Workshop Item -
5269
A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images
Published 2020-08-01“…Experiments show that our algorithm has higher tamper sensitivity to subject-related malicious tampering, and the robustness is improved by about 10% compared to the existing U-net-based algorithm; compared to other deep learning-based algorithms, this algorithm achieves a better balance between robustness and tampering sensitivity, and has better overall performance.…”
Get full text
Article -
5270
A Secure and Robust Image Hashing Scheme Using Gaussian Pyramids
Published 2019-11-01“…The proposed hashing scheme has been evaluated through a number of experiments involving cases of non-malicious distortions and malicious tampering. Experimental results reveal that the proposed hashing scheme is robust against non-malicious distortions and is sensitive to detect minute malicious tampering. …”
Get full text
Article -
5271
Optimal Oblivious RAM with Integrity
Published 2023“…In this work, we construct an ORAM protocol with worst-case O(log N) overhead and O(1) client storage that also protects against tampering adversaries. This matches the efficiency of the best known ORAM constructions while additionally providing security against tampering. …”
Get full text
Thesis -
5272
Blurred image splicing localization by exposing blur type inconsistency
Published 2015“…In a tampered blurred image generated by splicing, the spliced region and the original image may have different blur types. …”
Get full text
Get full text
Journal Article -
5273
A study of women in the audit profession.
Published 2014“…It would be unwise to tamper with this structure."…”
Get full text
Final Year Project (FYP) -
5274
A Review of Blockchain-Based Secure Sharing of Healthcare Data
Published 2022-08-01“…Blockchain is widely used in the management of healthcare data because of its decentralized and tamper-proof features. In order to study the development of blockchain in healthcare, this paper evaluates it from various perspectives. …”
Get full text
Article -
5275
Image splicing detection based on noise level approach
Published 2020-12-01“…It is now not easy by just looking at an image to know whether the image is original or has been tampered. This article describes a new image splicing detection method based on noise level as a major feature to detect the tempered region. …”
Get full text
Article -
5276
Blockchain-Watermarking for Compressive Sensed Images
Published 2021-01-01“…With the application of multimedia big data, the problems such as information leakage and data tampering have emerged. The security of images which is one of the most typical multimedia has become a major problem facing the large-scale open network environment. …”
Get full text
Article -
5277
Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran
Published 2014-01-01“…Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.…”
Get full text
Article -
5278
A secure HEVC video watermarking scheme for authentication and copyright purposes
Published 2020“…However, HEVC streams can be easily tampered by any third party, which negatively affects the authentication and copyright protection. …”
Get full text
Get full text
Get full text
Thesis -
5279
Image forgery detection algorithm based on U-shaped detection network
Published 2019-04-01“…Aiming at the defects of traditional image tampering detection algorithm relying on single image attribute,low applicability and current high time-complexity detection algorithm based on deep learning,an U-shaped detection network image forgery detection algorithm was proposed.Firstly,the multi-stage feature information in the image by using the continuous convolution layers and the max-pooling layers was extracted by U-shaped detection network,and then the obtained feature information to the resolution of the input image through the upsampling operation was restored.At the same time,in order to ensure higher detection accuracy while extracting high-level semantic information of the image,the output features of each stage in U-shaped detection network would be merged with the corresponding output features through the upsampling layer.Further the hidden feature information between tampered and un-tampered regions in the image upon the characteristics of the general network was explored by U-shaped detection network,which could be realized quickly by using its end-to-end network structure and extracting the attributes of strong correlation information among image contexts that could ensure high-precision detection results.Finally,the conditional random field was used to optimize the output of the U-shaped detection network to obtain a more exact detection results.The experimental results show that the proposed algorithm outperforms those traditional forgery detection algorithms based on single image attribute and the current deep learning-based detection algorithm,and has good robustness.…”
Get full text
Article -
5280
Development of a Customized Blockchain Technology-Based Parameter Matching Protocol for Semiconductor Manufacturing
Published 2024-01-01“…This paper introduces a novel solution to mitigate the vulnerability of operational parameter tampering in the semiconductor industry through a customized blockchain protocol. …”
Get full text
Article