-
121
Using Blockchain to Protect 3D Printing from Unauthorized Model Tampering
Published 2022-08-01“…If the original design models or the STL (stereolithography) files are hacked or tampered, severe consequences can be anticipated. In this paper, we propose a demonstration to use a high-throughput blockchain to store the “fingerprints” of the 3D model and verify the “fingerprints” before printing to prevent illegal tampering. …”
Get full text
Article -
122
No One Can Escape: A General Approach to Detect Tampered and Generated Image
Published 2019-01-01“…Fake or tampered images pose a real problem in today's life. …”
Get full text
Article -
123
A cycle-level recovery method for embedded processor against HT tamper
Published 2023-06-01“…However, embedded processors face various hardware security issues such as hardware trojans (HT) and code tamper attacks. In this paper, a cycle-level recovery method for embedded processor against HT tamper is proposed, which builds two hardware-implementation units, a General-Purpose Register (GPRs) backup unit and a PC rollback unit. …”
Get full text
Article -
124
PSPS: A Step toward Tamper Resistance against Physical Computer Intrusion
Published 2022-02-01“…We here propose a physical security system that can protect data from unauthorized access when the computer chassis is opened or tampered with. Sensor switches monitor the chassis status at all times and upload event logs to a cloud server for remote monitoring. …”
Get full text
Article -
125
Genes involved in systemic and arterial bed dependent atherosclerosis--Tampere Vascular study.
Published 2012-01-01“…METHODOLOGY/PRINCIPAL FINDINGS: We characterized the genes generally involved in human advanced atherosclerotic (AHA type V-VI) plaques in carotid and femoral arteries as well as aortas from 24 subjects of Tampere Vascular study and compared the results to non-atherosclerotic internal thoracic arteries (n=6) using genome-wide expression array and QRT-PCR. …”
Get full text
Article -
126
A Robust Image Tampering Detection Method Based on Maximum Entropy Criteria
Published 2015-12-01Subjects: “…image tampering detection…”
Get full text
Article -
127
EngraveChain: A Blockchain-Based Tamper-Proof Distributed Log System
Published 2021-05-01“…In this work, we present a tamper-resistant log system through the use of a blockchain. …”
Get full text
Article -
128
Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag
Published 2013-04-01Subjects: Get full text
Article -
129
Detection and Recovery of Higher Tampered Images Using Novel Feature and Compression Strategy
Published 2021-01-01Subjects: “…Tampered image…”
Get full text
Article -
130
Changes over time in mental health symptoms among adolescents in Tampere, Finland
Published 2021-01-01Get full text
Article -
131
Mitigation of tampering attacks for MR-based thermal sensing in optical NoCs
Published 2020“…In this paper, we focus on the tampering attacks on optical sampling during the thermal sensing process in ONoCs. …”
Get full text
Conference Paper -
132
Tamper detection and localization for Quranic text watermarking scheme based on hybrid technique
Published 2021“…The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC); thus, the location for tamper detection accuracy is low. The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida. …”
Article -
133
Opetusalan järjestöt koulutusdiskurssien pelikentällä. Arvosteltu teos: Mirka Räisänen 2014. Opettajat ja koulutuspolitiikka. Opetusalan ammattijärjestö ja Demokraattiset koulutyöntekijät -yhdistys peruskoulukauden koulutuspolitiikassa. Tampere: Tampere University Press. 294 s.
Published 2014-09-01Get full text
Article -
134
-
135
-
136
-
137
-
138
-
139
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
Published 2022“…Results show three types of attacks in PDF documentation managed to detect tamper location after being tampered.…”
Get full text
Article -
140
Recovery And Tamper Localization For Reversible Iris Image Watermarking Scheme Using Hash Function
Published 2023“…The tamper of the digital image can affect the security aspect in which it authenticates the image that has been tampered as legitimate which can cause damage or data stolen. …”
Get full text
Undergraduates Project Papers