-
5421
A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory
Published 2023-01-01“…However, the use of untrusted centralized third-party auditors can result in security issues because these auditors may be malicious and tamper with or delete user data. This poses a significant challenge for ensuring the reliability of the data verification results. …”
Get full text
Article -
5422
A Preservation Metamodel Based on Blockchain Technology for Preserving Mobile Evidence
Published 2024-01-01“…The investigation task will become much more complicated if this evidence is lost or tampered with during the investigation process. Several traditional preservation mechanisms have been proposed to preserve the integrity of the mobile evidence from being tampered with or altered in any way. …”
Get full text
Article -
5423
Integrity Authentication Based on Blockchain and Perceptual Hash for Remote-Sensing Imagery
Published 2023-10-01“…The experimental results show that the method can effectively verify remote-sensing image integrity and tamper with the location. The perceptual hashing algorithm exhibits strong robustness and sensitivity. …”
Get full text
Article -
5424
Secure Medical Image Communication Using Fragile Data Hiding Based on Discrete Wavelet Transform and A₅ Lattice Vector Quantization
Published 2023-01-01“…Fragile watermarking algorithms are suitable options since they can be used to detect any tampering attempt. In this paper, a novel fragile data-hiding algorithm based on Integer-to-Integer Discrete Wavelet Transforms (IIDWT) and <inline-formula> <tex-math notation="LaTeX">$A_{5}$ </tex-math></inline-formula> Lattice Vector Quantization (LVQ) is proposed. …”
Get full text
Article -
5425
Optimizing data retrieval for enhanced data integrity verification in cloud environments
Published 2024-08-01“…Conventional remote storage methods, while widely used, are inherently vulnerable to security breaches, corruption, and tampering. Recognizing this critical challenge, a state-of-the-art protocol has emerged to address these vulnerabilities head-on. …”
Get full text
Article -
5426
Exploring Synergy of Blockchain and 6G Network for Industrial Automation
Published 2023-01-01“…With its decentralized and tamper-proof nature, blockchain has disrupted various sectors, while 6G offers unprecedented connectivity and lightning-fast data transfer speeds. …”
Get full text
Article -
5427
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
Published 2014-01-01“…This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. …”
Get full text
Article -
5428
Proof-of-concept blockchain application for certificate authentication – part 1 (front end)
Published 2023“…In the education sector, there is an increasing demand for reliable and tamper-proof identity management solutions. To address this, this project proposes the creation of a blockchain-based NFT version of student matriculation cards and a user-friendly interface for students to generate these NFT cards. …”
Get full text
Final Year Project (FYP) -
5429
Image forensics through detection of imaging regularities
Published 2009“…It is believed that noise level pattern in an image is consistent throughout an image and if any region is tampered, it will disturb its localized noise level. …”
Get full text
Final Year Project (FYP) -
5430
Semi fragile watermark with self authentication and self recovery
Published 2009“…On the other hand, fragile watermarks are good for tamper detection applications. Semi fragile watermarks possess some properties of both robust and fragile watermarks at a moderate level. …”
Article -
5431
-
5432
Corantes marcadores de combustíveis: legislação e métodos analíticos para detecção
Published 2011-01-01“…It is used as "markers" to identify and guarantee the identity of the specific product of a particular manufacturer to discourage theft, tampering and disclosure of the quality of solvent or fuel. …”
Get full text
Article -
5433
Codex, Roll, and Libraries in Oxyrhynchus
Published 2006-05-01“…Could it be that the driving reason was the protection of the contents against tampering?…”
Get full text
Article -
5434
The privacy protection mechanism of Hyperledger Fabric and its application in supply chain finance
Published 2019-01-01“…Abstract Blockchain technology ensures that data is tamper-proof, traceable, and trustworthy. This article introduces a well-known blockchain technology implementation—Hyperledger Fabric. …”
Get full text
Article -
5435
Watermark Embedder and Detector for Medical Images: The Requirements and Design
Published 2010“…Watermarking had been proven to be able to protect medical images from unauthorized tampering and modification. Numerous watermarking schemes are available for different purposes depending on the security needs. …”
Get full text
Get full text
Conference or Workshop Item -
5436
A Survey of Partition-Based Techniques for Copy-Move Forgery Detection
Published 2014-01-01“…A copy-move forged image results from a specific type of image tampering procedure carried out by copying a part of an image and pasting it on one or more parts of the same image generally to maliciously hide unwanted objects/regions or clone an object. …”
Get full text
Article -
5437
Application of flexible electronic devices in intelligent food packaging
Published 2024-12-01“…The research progress of the application of flexible electronic devices in food quality inspection and food packaging in China and abroad was clarified, such as drug residue detection, microbiological detection, freshness detection, storage environment monitoring, tamper-evident packaging design, and logistics tracking. …”
Get full text
Article -
5438
CFLedger: Preventing chargeback fraud with blockchain
Published 2022-09-01“…To combat chargeback fraud, this paper proposes a consortium blockchain based chargeback fraud data sharing mechanism — CFLedger, which includes multi-source reporting, anti-tamper accounting, and post-supervision. This paper also analyzes the efficiency, effectiveness, and practicality of CFLedger, proving that it is an effective and feasible mechanism to prevent chargeback fraud.…”
Get full text
Article -
5439
Sonic Watermarking Method for Ensuring the Integrity of Audio Recordings
Published 2020-05-01“…The challenge is to prove if recordings were tampered with or not. A reliable solution for this was the highly acclaimed Electrical Network Frequency (ENF) criterion. …”
Get full text
Article -
5440
A data plane security model of SR-BE/TE based on zero-trust architecture
Published 2022-11-01“…By auditing the fields, behaviors, loops, labels, paths, and SIDs of messages, threats such as stream path tampering, SID tampering, DoS attacks, and loop attacks can be effectively detected. …”
Get full text
Article