Showing 161 - 180 results of 218 for search '"Tampere"', query time: 0.04s Refine Results
  1. 161

    A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression by Chen-Hsiu Huang, Ja-Ling Wu

    Published 2025-01-01
    “…Traditional image forensics techniques often struggle to detect sophisticated tampering, and passive detection approaches are reactive, verifying authenticity only after counterfeiting occurs. …”
    Get full text
    Article
  2. 162

    Audio and Video Matching Zero-Watermarking Algorithm Based on NSCT by Di Fan, Wenxue Sun, Huiyuan Zhao, Wenshuo Kang, Changzhi Lv

    Published 2022-01-01
    “…The detection algorithm can obtain zero watermark from the audio and video to be tested and judge and locate tampering by comparing with the zero watermark of the third party. …”
    Get full text
    Article
  3. 163

    Tendencies of Translation Manipulation Strategies in Anglophone Mass Media: The Case of the “Collective West” by Alyona V. Dymova, Natalya N. Koptyaeva, Thomas A. Beavitt

    Published 2024-12-01
    “…Five main tendencies identified from the analysis are: (a) subtle tampering in direct quotation; (b) deliberate omission of chunks; (c) imprecise indirect quotation; (d) tampering with the cornerstones of direct quotation; (e) defacing the source of quotation. …”
    Get full text
    Article
  4. 164

    Exposing Image Forgery by Detecting Consistency of Shadow by Yongzhen Ke, Fan Qin, Weidong Min, Guiling Zhang

    Published 2014-01-01
    “…We propose two tampered image detection methods based on consistency of shadow. …”
    Get full text
    Article
  5. 165

    A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents by Omar Tayan, Muhammad N. Kabir, Yasser M. Alginahi

    Published 2014-01-01
    “…This paper addresses the problems and threats associated with verification of integrity, proof of authenticity, tamper detection, and copyright protection for digital-text content. …”
    Get full text
    Article
  6. 166

    A Comparative Analysis of Blockchain in Enhancing the Drug Traceability in Edible Foods Using Multiple Regression Analysis by K. Suresh Kumar, Vinay Kumar Nassa, Dipesh Uike, Ashima kalra, Ajay Kumar Sahu, Vijay Anant Athavale, V. Saravanan

    Published 2022-01-01
    “…The emergence of Blockchain technology enables centralized tracking of information support in enhancing the data privacy and increasing transparency and support in eradicating the tampered food products in the supply chain system. …”
    Get full text
    Article
  7. 167

    Research on Face Recognition Method by Autoassociative Memory Based on RNNs by Qi Han, Zhengyang Wu, Shiqin Deng, Ziqiang Qiao, Junjian Huang, Junjie Zhou, Jin Liu

    Published 2018-01-01
    “…In order to avoid the risk of the biological database being attacked and tampered by hackers, an Autoassociative Memory (AAM) model is proposed in this paper. …”
    Get full text
    Article
  8. 168

    Distributed Energy Management for Port Power System under False Data Injection Attacks by Qihe Shan, Xin Zhang, Qiongyue Zhang, Qiuye Sun

    Published 2022-01-01
    “…This paper investigates a distributed energy management strategy for the port power system under false data injection attacks. The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. …”
    Get full text
    Article
  9. 169

    Explicit Content Detection System: An Approach towards a Safe and Ethical Environment by Ali Qamar Bhatti, Muhammad Umer, Syed Hasan Adil, Mansoor Ebrahim, Daniyal Nawaz, Faizan Ahmed

    Published 2018-01-01
    “…In addition, the system also identifies the media files with tampered extension and label them as suspicious. The experimental result shows that the proposed model provides an accuracy of ~ 95% when tested on our image and video datasets.…”
    Get full text
    Article
  10. 170

    Securing fog computing in healthcare with a zero-trust approach and blockchain by Navjeet Kaur, Ayush Mittal, Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, Kashif Saleem, Ehab Seif Ghith

    Published 2025-02-01
    “…These findings illustrate the feasibility of integrating BC, SDN, and ZT principles to mitigate threats such as unauthorized access, data tampering, and delays in latency-sensitive tasks.…”
    Get full text
    Article
  11. 171

    Blockchain-based renewable energy certificate system in Indonesia by Indri Haryani, Indra Ardhanayudha Aditya, Almareta Harasti Nuraini, Sri Widiyanesti, Andry Alamsyah, Eva Nurhazizah, Muhammad Naufal Hakim, Tanti Ruwani, Mochamad Zaky Dwi Arli, Nadhif Ditertian Girawan

    Published 2025-02-01
    “…The current study aims to address such limitation by proposing a blockchain-based solution for Indonesia's electricity grid which can enhance end-to-end traceability, real-time data access, and tamper-proof records. The methodology encompasses interview with energy stakeholders, blockchain model development, prototyping, and evaluation of its efficacy. …”
    Get full text
    Article
  12. 172

    Using the Ethereum Blockchain in the Internet of Things Network for IT Diagnostics by U. A. Vishniakou, YiWei Xia, Chuyue Yu

    Published 2024-09-01
    “…Using IPFS for decentralized file storage, along with the Ethereum blockchain to create tamper-proof medical records, provides increased efficiency, scalability and privacy. …”
    Get full text
    Article
  13. 173

    Collusion-Tolerable and Efficient Privacy-Preserving Time-Series Data Aggregation Protocol by Yongkai Li, Shubo Liu, Jun Wang, Mengjun Liu

    Published 2016-07-01
    “…In this paper, we proposed an efficient aggregation protocol which tolerates up to k passive adversaries that do not try to tamper the computation. The proposed protocol does not require a trusted key dealer and needs only one initialization during the whole time-series data aggregation. …”
    Get full text
    Article
  14. 174

    Blockchain digital forensics: technology and architecture by FAN Wei, LI Haibo, ZHANG Zhujun

    Published 2024-12-01
    “…Issues of limited scene adaptability, inadequate evidence preservation, and low efficiency in traditional digital forensics were addressed by analyzing the feasibility of incorporating decentralized, tamper-resistant blockchain technology into digital forensic practices. …”
    Get full text
    Article
  15. 175

    MHSDN: A Hierarchical Software Defined Network Reliability Framework design by Zhengbin Zhu, Qinrang Liu, Dongpei Liu, ChenYang Ge, Chong Wang

    Published 2023-01-01
    “…Abstract At present, attacks based on the vulnerability of the controller and flooding attacks still constitute a principal threat for hierarchical Software Defined Network (SDN), such as flow table tampering, malicious Application attacks, Distributed Denial of Service (DDoS) etc., due to the limitation against attacks based on known or unknown vulnerabilities for traditional cyber defence technology. …”
    Get full text
    Article
  16. 176

    Region Duplication Forgery Detection Technique Based on SURF and HAC by Parul Mishra, Nishchol Mishra, Sanjeev Sharma, Ravindra Patel

    Published 2013-01-01
    “…From the forged region of an image no visual clues are often detected. For making the tampering more robust, various transformations like scaling, rotation, illumination changes, JPEG compression, noise addition, gamma correction, and blurring are applied. …”
    Get full text
    Article
  17. 177

    Empowering Diabetes Management Through Blockchain and Edge Computing: A Systematic Review of Healthcare Innovations and Challenges by K. Tlemcani, K. Azbeg, E. Saoudi, L. Fetjah, O. Ouchetto, S. Jai Andaloussi

    Published 2025-01-01
    “…We analyzed 52 studies, categorizing findings into three key areas: enhanced data security and privacy through decentralized frameworks and tamper-proof storage; real-time data processing, enabled by edge computing for immediate analytics and alerts; and scalability, achieved via hybrid architectures that optimize data handling. …”
    Get full text
    Article
  18. 178

    CFA-Based Splicing Forgery Localization Method via Statistical Analysis by Lei Liu, Peng Sun, Yubo Lang, Jingjiao Li

    Published 2024-01-01
    “…Subsequently, curvature is employed in the analysis to select suitable features for generating the tampering probability map. Experimental results on the Columbia and Korus datasets indicate that the proposed method outperforms the state-of-the-art methods and is also more robust to various attacks, such as noise addition, Gaussian filtering, and JPEG compression with a quality factor of 90.…”
    Get full text
    Article
  19. 179

    Adaptive Sensing Private Property Protection Protocol Based on Cloud by Kai Fan, Wei Wang, Hui Li, Yintang Yang

    Published 2015-11-01
    “…Each item is labeled with a unique tamper-evident adaptive sensor and the reader can simultaneously read a plurality of sensors. …”
    Get full text
    Article
  20. 180

    Blockchain-enabled digital twin system for brain stroke prediction by Venkatesh Upadrista, Sajid Nazir, Huaglory Tianfield

    Published 2025-01-01
    “…The results show that the application is tamper-proof and is capable of detecting and automatically correcting backend data anomalies to maintain robust data protection. …”
    Get full text
    Article