-
161
A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression
Published 2025-01-01“…Traditional image forensics techniques often struggle to detect sophisticated tampering, and passive detection approaches are reactive, verifying authenticity only after counterfeiting occurs. …”
Get full text
Article -
162
Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT
Published 2022-01-01“…The detection algorithm can obtain zero watermark from the audio and video to be tested and judge and locate tampering by comparing with the zero watermark of the third party. …”
Get full text
Article -
163
Tendencies of Translation Manipulation Strategies in Anglophone Mass Media: The Case of the “Collective West”
Published 2024-12-01“…Five main tendencies identified from the analysis are: (a) subtle tampering in direct quotation; (b) deliberate omission of chunks; (c) imprecise indirect quotation; (d) tampering with the cornerstones of direct quotation; (e) defacing the source of quotation. …”
Get full text
Article -
164
Exposing Image Forgery by Detecting Consistency of Shadow
Published 2014-01-01“…We propose two tampered image detection methods based on consistency of shadow. …”
Get full text
Article -
165
A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents
Published 2014-01-01“…This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. …”
Get full text
Article -
166
A Comparative Analysis of Blockchain in Enhancing the Drug Traceability in Edible Foods Using Multiple Regression Analysis
Published 2022-01-01“…The emergence of Blockchain technology enables centralized tracking of information support in enhancing the data privacy and increasing transparency and support in eradicating the tampered food products in the supply chain system. …”
Get full text
Article -
167
Research on Face Recognition Method by Autoassociative Memory Based on RNNs
Published 2018-01-01“…In order to avoid the risk of the biological database being attacked and tampered by hackers, an Autoassociative Memory (AAM) model is proposed in this paper. …”
Get full text
Article -
168
Distributed Energy Management for Port Power System under False Data Injection Attacks
Published 2022-01-01“…This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. …”
Get full text
Article -
169
Explicit Content Detection System: An Approach towards a Safe and Ethical Environment
Published 2018-01-01“…In addition, the system also identifies the media files with tampered extension and label them as suspicious. The experimental result shows that the proposed model provides an accuracy of ~ 95% when tested on our image and video datasets.…”
Get full text
Article -
170
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…These findings illustrate the feasibility of integrating BC, SDN, and ZT principles to mitigate threats such as unauthorized access, data tampering, and delays in latency-sensitive tasks.…”
Get full text
Article -
171
Blockchain-based renewable energy certificate system in Indonesia
Published 2025-02-01“…The current study aims to address such limitation by proposing a blockchain-based solution for Indonesia's electricity grid which can enhance end-to-end traceability, real-time data access, and tamper-proof records. The methodology encompasses interview with energy stakeholders, blockchain model development, prototyping, and evaluation of its efficacy. …”
Get full text
Article -
172
Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics
Published 2024-09-01“…Using IPFS for decentralized file storage, along with the Ethereum blockchain to create tamper-proof medical records, provides increased efficiency, scalability and privacy. …”
Get full text
Article -
173
Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol
Published 2016-07-01“…In this paper, we proposed an efficient aggregation protocol which tolerates up to k passive adversaries that do not try to tamper the computation. The proposed protocol does not require a trusted key dealer and needs only one initialization during the whole time-series data aggregation. …”
Get full text
Article -
174
Blockchain digital forensics: technology and architecture
Published 2024-12-01“…Issues of limited scene adaptability, inadequate evidence preservation, and low efficiency in traditional digital forensics were addressed by analyzing the feasibility of incorporating decentralized, tamper-resistant blockchain technology into digital forensic practices. …”
Get full text
Article -
175
MHSDN: A Hierarchical Software Defined Network Reliability Framework design
Published 2023-01-01“…Abstract At present, attacks based on the vulnerability of the controller and flooding attacks still constitute a principal threat for hierarchical Software Defined Network (SDN), such as flow table tampering, malicious Application attacks, Distributed Denial of Service (DDoS) etc., due to the limitation against attacks based on known or unknown vulnerabilities for traditional cyber defence technology. …”
Get full text
Article -
176
Region Duplication Forgery Detection Technique Based on SURF and HAC
Published 2013-01-01“…From the forged region of an image no visual clues are often detected. For making the tampering more robust, various transformations like scaling, rotation, illumination changes, JPEG compression, noise addition, gamma correction, and blurring are applied. …”
Get full text
Article -
177
Empowering Diabetes Management Through Blockchain and Edge Computing: A Systematic Review of Healthcare Innovations and Challenges
Published 2025-01-01“…We analyzed 52 studies, categorizing findings into three key areas: enhanced data security and privacy through decentralized frameworks and tamper-proof storage; real-time data processing, enabled by edge computing for immediate analytics and alerts; and scalability, achieved via hybrid architectures that optimize data handling. …”
Get full text
Article -
178
CFA-Based Splicing Forgery Localization Method via Statistical Analysis
Published 2024-01-01“…Subsequently, curvature is employed in the analysis to select suitable features for generating the tampering probability map. Experimental results on the Columbia and Korus datasets indicate that the proposed method outperforms the state-of-the-art methods and is also more robust to various attacks, such as noise addition, Gaussian filtering, and JPEG compression with a quality factor of 90.…”
Get full text
Article -
179
Adaptive Sensing Private Property Protection Protocol Based on Cloud
Published 2015-11-01“…Each item is labeled with a unique tamper-evident adaptive sensor and the reader can simultaneously read a plurality of sensors. …”
Get full text
Article -
180
Blockchain-enabled digital twin system for brain stroke prediction
Published 2025-01-01“…The results show that the application is tamper-proof and is capable of detecting and automatically correcting backend data anomalies to maintain robust data protection. …”
Get full text
Article