-
141
Reversible Medical Image Watermarking for Tamper Detection and Recovery with Run Length Encoding Compression
Published 2010“…The embedded watermark allows tampering detection and tampered image recovery. The watermark is also reversible and data compression technique was used to allow higher embedding capacity.…”
Get full text
Get full text
Article -
142
A Review of Reversible Medical Image Watermarking Scheme with Tamper Localization and Recovery Capability
Published 2014“…This paper reviews the works that have done on the reversible watermarking scheme with tamper localization and recovery capability.…”
Get full text
Get full text
Conference or Workshop Item -
143
Penerapan Metode Localization Tampering dan Hashing untuk Deteksi Rekayasa Video Digital
Published 2021-04-01Subjects: “…forensics, video, localization tampering, manipulation.…”
Get full text
Article -
144
A Multi-Feature Extraction-Based Algorithm for Stitching Tampered/Untampered Image Classification
Published 2022-02-01Subjects: Get full text
Article -
145
A bit toggling approach for AMBTC tamper detection scheme with high image fidelity.
Published 2020-01-01“…The existing tamper detection schemes for absolute moment block truncation coding (AMBTC) compressed images are able to detect the tampering. …”
Get full text
Article -
146
A Sharing-Based Fragile Watermarking Method for Authentication and Self-Recovery of Image Tampering
Published 2008-01-01“…The hidden watermark in the proposed method not only detects and locates the tampered portion of an image, but also self-recovers the tampered portion. …”
Get full text
Article -
147
Identification of Sparse Audio Tampering Using Distributed Source Coding and Compressive Sensing Techniques
Published 2009-01-01“…<p/> <p>In the past few years, a large amount of techniques have been proposed to identify whether a multimedia content has been illegally tampered or not. Nevertheless, very few efforts have been devoted to identifying which kind of attack has been carried out, especially due to the large data required for this task. …”
Get full text
Article -
148
Identifiable Tampering Multi-Carrier Image Information Hiding Algorithm Based on Compressed Sensing
Published 2020-01-01“…Aiming at the security problem of secret information preprocessing and the difficulty of improving the capacity and robustness of the single-carrier image information hiding algorithm, an identifiable tampering multi-carrier image information hiding algorithm based on compressed sensing is proposed. …”
Get full text
Article -
149
Microcontroller-Based PUF for Identity Authentication and Tamper Resistance of Blockchain-Compliant IoT Devices
Published 2023-07-01“…Alongside identity authentication, it is crucial to ensure resistance against tampering, including safeguarding against unauthorized alterations and protection against device counterfeiting or cloning. …”
Get full text
Article -
150
Member Tampering Attack on Burmester-Desmedt Group Key Exchange Protocol and Its Countermeasure
Published 2022-10-01Subjects: Get full text
Article -
151
Image Tampering Localization Using Demosaicing Patterns and Singular Value Based Prediction Residue
Published 2021-01-01Subjects: “…Image tampering localization…”
Get full text
Article -
152
Tamper-sensitive pre-formed ReRAM-based PUFs: Methods and experimental validation
Published 2022-11-01Subjects: Get full text
Article -
153
AUTHENTICATION, TAMPER LOCALIZATION AND RECTIFICATION ALGORITHM WITH PRIVACY PRESERVATION OF IMAGE FOR THE CLOUD USING HMAC
Published 2017-11-01Subjects: Get full text
Article -
154
Remote medical video region tamper detection system based on Wireless Sensor Network
Published 2022-07-01Subjects: Get full text
Article -
155
JPEG recapture image tamper detection method based on block effect grid offset
Published 2017-12-01“…Recaptured images are captured original or distorted image shown on the intermediaries,a high-quality recapture image is difficult to distinguish the authenticity of the human eye.Aimed at the tampering operation of JPEG image,a method of detecting block effect grid offset due to re-compression was proposed.The original image was compressed multiple times did not produce the block effect of the grid offset,and the recapture image,because of the recapture process would introduce background information that was not related to the original image,the re-compression of the block effect grid with the original grid is mismatched,and the average information loss amount of the image was used to detect whether the block effect grid generates an offset or not to detect the recapture image.Experiments show that this method is more accurate than the existing recapture image detection method,and the average detection time is shorter.…”
Get full text
Article -
156
Identification of factors influencing tampering of codeine-containing medicines in England: a qualitative study
Published 2020-09-01Subjects: Get full text
Article -
157
High Embedding Capacity and Robust Audio Watermarking for Secure Transmission Using Tamper Detection
Published 2018-02-01Subjects: Get full text
Article -
158
Stratigraphy of the central parts of the Palaeoproterozoic Tampere Schist Belt, southern Finland: review and revision
Published 1998-06-01Subjects: Get full text
Article -
159
Efficient Electronic Patient Information Hiding Scheme With Tamper Detection Function for Medical Images
Published 2022-01-01Subjects: Get full text
Article -
160
An early Proterozoic metagreywacke-slate turbidite sequence: The Tampere schist belt, southwestern Finland
Published 1986-06-01“…The metasedimentary sequence of the Tampere Schist belt, where it has undergone only slight metamorphism, clearly consisted of graded graywackes, siltstones and mudstones. …”
Get full text
Article