Showing 1 - 20 results of 5,822 for search '"Tampere"', query time: 1.83s Refine Results
  1. 1
  2. 2

    Image tampering by Dang, Chun Kin

    Published 2013
    “…Hence, the purpose of this project is to perform another round of demosaicing to find out if the photo has gone through any tampering and how easy it is to cover up the traces of tampering through.…”
    Get full text
    Final Year Project (FYP)
  3. 3

    The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing by Suh, G. Edward, Clarke, Dwaine, Gassend, Blaise, van Dijk, Marten, Devadas, Srinivas

    Published 2023
    “…AEGIS provides users with tamper-evident, authenticated environments in which any physical or software tampering by an adversary is guaranteed to be detected, and private and authenticated tamper-resistant environments where additionally the adversary is unable to obtain any information about software or data by tampering with, or otherwise observing, system operation. …”
    Get full text
  4. 4
  5. 5
  6. 6

    The AEGIS Processor Architecture for Tamper-Evident and Private Tamper-Resistant Enviorments by Suh, G. Edward, Clarke, Dwaine, Gassend, Blaise, van Dijk, Marten, Devadas, Srinivas

    Published 2023
    “…AEGIS assumes that the operating system and all components external to it, such as memory, are untrusted. AEGIS provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be detected, and private and authenticated, tamper-resistant environments where additionally the adversary is unable to obtain any information about software or data by tampering with, or otherwise observing, system operation. …”
    Get full text
  7. 7

    Expiry-date tampering. by Day, J, Hien, T, Farrar, J

    Published 2004
    Journal article
  8. 8

    Fingerprint Watermarking with Tamper Detection by Jasni, Mohamad Zain, Azma, Abdullah

    Published 2006
    “…The experimental results demonstrate that the precision of tamper detection and localization is close to 100% after level-2 detection.…”
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Tamper Detection against Unitary Operators by Naresh Goud Boddu, Upendra Kapshikar

    Published 2023-11-01
    “…Security of a storage device against a tampering adversary has been a well-studied topic in classical cryptography. …”
    Get full text
    Article
  14. 14

    Watermark based recovery of tampered documents by Makur, Anamitra, Sridharan, Govindarajan

    Published 2013
    “…Algorithms for tamper detection and recovery are suggested and their functioning explained with detailed examples.…”
    Get full text
    Get full text
    Conference Paper
  15. 15

    Experiment of Tamper Detection and Recovery Watermarking in PACS by Siau-Chuin, Liew, Jasni, Mohamad Zain

    Published 2010
    “…These images can be tampered with existing image processing tools that is easily available. …”
    Get full text
    Conference or Workshop Item
  16. 16

    Regenerative Medicine as an Emergent Cluster in Tampere Region by Tuomo Heinonen, Francisco Javier Ortega-Colomer

    Published 2015-01-01
    “…Empirically this study is based on the emergent RM cluster in the region of Tampere in Finland. Analysis of 24 conducted interviews helps to contextualize the emergence of the RM cluster in Tampere, where academia is both the booster and the driver of the emergent RM cluster. …”
    Get full text
    Article
  17. 17

    Image tampering detection using genetic algorithm by Agarwal Ritu, Pant Mallika

    Published 2019-01-01
    “…The proposed work compares between various feature selection algorithms for the detection of image forgery in tampered images. Several features are extracted from normal and spliced images using spatial grey level dependence method and many more. …”
    Get full text
    Article
  18. 18
  19. 19
  20. 20