期刊文献+
共找到1,018篇文章
< 1 2 51 >
每页显示 20 50 100
基于非抽样Contourlet变换的图像模糊取证 被引量:16
1
作者 王俊文 刘光杰 +2 位作者 戴跃伟 张湛 王执铨 《计算机研究与发展》 EI CSCD 北大核心 2009年第9期1549-1555,共7页
数字图像被动盲取证技术是对图像的完整性和真实性进行鉴别.图像遭受篡改操作后,为了消除图像伪造在拼接边缘产生畸变,伪造者通常会采用后处理消除伪造痕迹,其中,模糊操作是最常用的手法之一.因此提出了一种针对人工模糊的取证方法.首先... 数字图像被动盲取证技术是对图像的完整性和真实性进行鉴别.图像遭受篡改操作后,为了消除图像伪造在拼接边缘产生畸变,伪造者通常会采用后处理消除伪造痕迹,其中,模糊操作是最常用的手法之一.因此提出了一种针对人工模糊的取证方法.首先,利用非抽样Contourlet变换分析图像边缘点特征进行边缘点分类;然后通过统计正常边缘点与模糊边缘点之间的差异鉴别模糊边缘;最后引入局部清晰度来区分人工模糊与离焦模糊,从而最终标定人工篡改边缘痕迹.实验表明该方法能够有效地检测出图像人工模糊篡改操作,较为准确地定位图像篡改边界.伪造图像边缘模糊越严重方法的检测效果越好.与其他模糊检测方法相比所提方法具有像素级别定位能力. 展开更多
关键词 图像取证 篡改 人工模糊 非抽样Contourlet 局部清晰度
下载PDF
BIOS安全防护技术研究 被引量:13
2
作者 杨培 吴灏 金然 《计算机工程与设计》 CSCD 北大核心 2008年第15期3840-3842,3914,共4页
随着BIOS攻击事件的日益增多,计算机硬件系统的安全面临着新一轮的挑战,而对BIOS安全防护技术的研究能够掌握与之对抗的能力。通过对BIOS的攻击手段进行分析了解和对BIOS病毒的实现机理等相关技术进行深入剖析,提出了基于植入企图预测... 随着BIOS攻击事件的日益增多,计算机硬件系统的安全面临着新一轮的挑战,而对BIOS安全防护技术的研究能够掌握与之对抗的能力。通过对BIOS的攻击手段进行分析了解和对BIOS病毒的实现机理等相关技术进行深入剖析,提出了基于植入企图预测、文件指纹认证的模块检测以及基于BIOS指令执行检测的攻击技术对策。 展开更多
关键词 恶意代码 BIOS安全 篡改 模块检测 指令检测
下载PDF
A Hybrid Intelligent Approach for Content Authentication and Tampering Detection of Arabic Text Transmitted via Internet 被引量:9
3
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2021年第1期195-211,共17页
In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authenticati... In this paper,a hybrid intelligent text zero-watermarking approach has been proposed by integrating text zero-watermarking and hidden Markov model as natural language processing techniques for the content authentication and tampering detection of Arabic text contents.The proposed approach known as Second order of Alphanumeric Mechanism of Markov model and Zero-Watermarking Approach(SAMMZWA).Second level order of alphanumeric mechanism based on hidden Markov model is integrated with text zero-watermarking techniques to improve the overall performance and tampering detection accuracy of the proposed approach.The SAMMZWA approach embeds and detects the watermark logically without altering the original text document.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SAMMZWA has been implemented and validated with attacked Arabic text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 HMM NLP text analysis ZERO-WATERMARKING tampering detection
下载PDF
A Smart English Text Zero-Watermarking Approach Based on Third-Level Order and Word Mechanism of Markov Model 被引量:9
4
作者 Fahd N.Al-Wesabi 《Computers, Materials & Continua》 SCIE EI 2020年第11期1137-1156,共20页
Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researche... Text information is principally dependent on the natural languages.Therefore,improving security and reliability of text information exchanged via internet network has become the most difficult challenge that researchers encounter.Content authentication and tampering detection of digital contents have become a major concern in the area of communication and information exchange via the Internet.In this paper,an intelligent text Zero-Watermarking approach SETZWMWMM(Smart English Text Zero-Watermarking Approach Based on Mid-Level Order and Word Mechanism of Markov Model)has been proposed for the content authentication and tampering detection of English text contents.The SETZWMWMM approach embeds and detects the watermark logically without altering the original English text document.Based on Hidden Markov Model(HMM),Third level order of word mechanism is used to analyze the interrelationship between contexts of given English texts.The extracted features are used as a watermark information and integrated with digital zero-watermarking techniques.To detect eventual tampering,SETZWMWMM has been implemented and validated with attacked English text.Experiments were performed on four datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results show that our method is more sensitive and efficient for all kinds of tampering attacks with high level accuracy of tampering detection than compared methods. 展开更多
关键词 Content authentication hidden Markov model ZERO-WATERMARKING NLP tampering detection.
下载PDF
Image Tampering Detection Using No-Reference Image Quality Metrics 被引量:3
5
作者 Ying Li Bo Wang +1 位作者 Xiang-Wei Kong Yan-Qing Guo 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期51-56,共6页
In this paper,a new approach is proposed to determine whether the content of an image is authentic or modified with a focus on detecting complex image tampering.Detecting image tampering without any prior information ... In this paper,a new approach is proposed to determine whether the content of an image is authentic or modified with a focus on detecting complex image tampering.Detecting image tampering without any prior information of the original image is a challenging problem since unknown diverse manipulations may have different characteristics and so do various formats of images.Our principle is that image processing,no matter how complex,may affect image quality,so image quality metrics can be used to distinguish tampered images.In particular,based on the alteration of image quality in modified blocks,the proposed method can locate the tampered areas.Referring to four types of effective no-reference image quality metrics,we obtain 13 features to present an image.The experimental results show that the proposed method is very promising on detecting image tampering and locating the locally tampered areas especially in realistic scenarios. 展开更多
关键词 image forensics tampering detection NO-REFERENCE image quality metrics tampering localization
下载PDF
一种检测图像Copy-Move篡改鲁棒算法 被引量:5
6
作者 王俊文 刘光杰 +1 位作者 戴跃伟 王执铨 《模式识别与人工智能》 EI CSCD 北大核心 2009年第4期630-634,共5页
针对现有的复制粘贴(Copy-Move)检测算法鲁棒性较差,时间复杂度高,提出一种有效快速的检测与定位篡改区域算法.利用小波变换获取图像低频区域,引入几何矩提取分块鲁棒特征,通过特征向量排序缩小匹配空间,最后通过经验阈值和数学形态学... 针对现有的复制粘贴(Copy-Move)检测算法鲁棒性较差,时间复杂度高,提出一种有效快速的检测与定位篡改区域算法.利用小波变换获取图像低频区域,引入几何矩提取分块鲁棒特征,通过特征向量排序缩小匹配空间,最后通过经验阈值和数学形态学定位篡改区域.实验结果表明该算法不仅能有效抵抗如高斯白噪声、JPEG压缩等常规图像后处理操作,而且减少块总数,算法的时间复杂度大大降低. 展开更多
关键词 复制粘贴 篡改 几何矩 鲁棒检测
原文传递
基于四元数极性复指数变换的图像复制-粘贴篡改检测算法
7
作者 赵杰 高柱柱 +1 位作者 杨滨峰 李亚文 《系统仿真技术》 2024年第1期79-84,共6页
在面对复制-粘贴(Copy-Move)篡改检测时,图像经过压缩、缩放、旋转和加噪等篡改操作处理后会导致检测性能的急剧下降甚至检测失败。本研究提出一种基于四元数极性复指数变换(quaternion polar complex exponential transform,QPCET)和改... 在面对复制-粘贴(Copy-Move)篡改检测时,图像经过压缩、缩放、旋转和加噪等篡改操作处理后会导致检测性能的急剧下降甚至检测失败。本研究提出一种基于四元数极性复指数变换(quaternion polar complex exponential transform,QPCET)和改进PatchMatch的篡改检测算法。将待测图像进行重叠分块之后,计算各分块的四元数极性复指数变换不变量,并作为每一块的特征向量,构成特征矩阵。特征向量的初步匹配通过改进的PatchMatch算法完成,再通过随机抽样一致(random sampling consistency,RANSAC)算法去除错误的匹配块。在此基础上,使用形态学运算对标记区域进行处理,最终确定篡改区域。仿真结果表明,该算法可以有效检测图像中的Copy-Move篡改,并且对图像旋转、缩放、加噪和JPEG压缩等篡改区域后处理操作具有较好的鲁棒性。 展开更多
关键词 篡改 四元数极性复指数变换 特征匹配
下载PDF
《世界反兴奋剂条例》“篡改”规定的不足与完善 被引量:6
8
作者 赵永如 《体育科研》 2018年第5期45-55,共11页
2015年《世界反兴奋剂条例》规定了有"篡改或企图篡改兴奋剂管制过程中的任何环节"(简称"篡改")违规的相关规定(简称"篡改"规定)。"篡改"规定本身具有规制范围广泛、认定标准不明确、违规处罚... 2015年《世界反兴奋剂条例》规定了有"篡改或企图篡改兴奋剂管制过程中的任何环节"(简称"篡改")违规的相关规定(简称"篡改"规定)。"篡改"规定本身具有规制范围广泛、认定标准不明确、违规处罚裁量范围小、补充性等特点,使得该规定在反兴奋剂实践中的适用存在问题。2015年国际体育仲裁院审理的瑞塔·吉普图案和卡尔·穆里案较为典型地反映出了"篡改"规定的适用问题,同时也为"篡改"条款以及《世界反兴奋剂条例》其他相关规定的完善提供了思路。本研究认为,今后《世界反兴奋剂条例》的修订中可以进一步明确"篡改"违规的主客观要件,同时通过增加加重情节规定、加强反兴奋剂调查阶段运动员辩护权保护等方法,促进反兴奋剂规则体系的进一步完善。 展开更多
关键词 《世界反兴奋剂条例》 “篡改”规定 结果要件 意图 完善
下载PDF
Research on Improved MobileViT Image Tamper Localization Model
9
作者 Jingtao Sun Fengling Zhang +1 位作者 Huanqi Liu Wenyan Hou 《Computers, Materials & Continua》 SCIE EI 2024年第8期3173-3192,共20页
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social stability.In the realm of image tampering localization,accurately l... As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social stability.In the realm of image tampering localization,accurately localizing limited samples,multiple types,and various sizes of regions remains a multitude of challenges.These issues impede the model’s universality and generalization capability and detrimentally affect its performance.To tackle these issues,we propose FL-MobileViT-an improved MobileViT model devised for image tampering localization.Our proposed model utilizes a dual-stream architecture that independently processes the RGB and noise domain,and captures richer traces of tampering through dual-stream integration.Meanwhile,the model incorporating the Focused Linear Attention mechanism within the lightweight network(MobileViT).This substitution significantly diminishes computational complexity and resolves homogeneity problems associated with traditional Transformer attention mechanisms,enhancing feature extraction diversity and improving the model’s localization performance.To comprehensively fuse the generated results from both feature extractors,we introduce the ASPP architecture for multi-scale feature fusion.This facilitates a more precise localization of tampered regions of various sizes.Furthermore,to bolster the model’s generalization ability,we adopt a contrastive learning method and devise a joint optimization training strategy that leverages fused features and captures the disparities in feature distribution in tampered images.This strategy enables the learning of contrastive loss at various stages of the feature extractor and employs it as an additional constraint condition in conjunction with cross-entropy loss.As a result,overfitting issues are effectively alleviated,and the differentiation between tampered and untampered regions is enhanced.Experimental evaluations on five benchmark datasets(IMD-20,CASIA,NIST-16,Columbia and Coverage)validate the effectiveness of our proposed model. 展开更多
关键词 Image tampering localization focused linear attention mechanism MobileViT contrastive loss
下载PDF
基于SM3算法的智能配电网报文安全认证方法
10
作者 区永通 陈重辰 +3 位作者 谭浩彬 林聪 龙国良 邓轲 《机电工程技术》 2024年第2期263-266,共4页
电网智能化的不断提升,使智能配电网的信息报文传输安全重要性不断提高,如何减少信息报文在整个电力系统流通时被网络攻击一直在广泛研究。首先介绍了智能配电网信息报文传输安全的背景,再讲述配电网遭受网络攻击的过程,指出了在传输过... 电网智能化的不断提升,使智能配电网的信息报文传输安全重要性不断提高,如何减少信息报文在整个电力系统流通时被网络攻击一直在广泛研究。首先介绍了智能配电网信息报文传输安全的背景,再讲述配电网遭受网络攻击的过程,指出了在传输过程中报文存在篡改的风险,并针对风险环节引入了国密算法SM3。介绍了SM3算法在配电网报文中具体的安全认证方式,通过对比发送方和接收方所得的摘要是否一致来判断报文是否安全。最后将SM3算法移植入Dev C++软件上进行实例测试,验证了算法的完整性校验和时效性,表明满足报文安全性要求。 展开更多
关键词 智能配电网 报文传输 篡改 SM3
下载PDF
Digital Text Document Watermarking Based Tampering Attack Detection via Internet
11
作者 Manal Abdullah Alohali Muna Elsadig +3 位作者 Fahd N.Al-Wesabi Mesfer Al Duhayyim Anwer Mustafa Hilal Abdelwahed Motwakel 《Computer Systems Science & Engineering》 2024年第3期759-771,共13页
Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentica... Owing to the rapid increase in the interchange of text information through internet networks,the reliability and security of digital content are becoming a major research problem.Tampering detection,Content authentication,and integrity verification of digital content interchanged through the Internet were utilized to solve a major concern in information and communication technologies.The authors’difficulties were tampering detection,authentication,and integrity verification of the digital contents.This study develops an Automated Data Mining based Digital Text Document Watermarking for Tampering Attack Detection(ADMDTW-TAD)via the Internet.The DM concept is exploited in the presented ADMDTW-TAD technique to identify the document’s appropriate characteristics to embed larger watermark information.The presented secure watermarking scheme intends to transmit digital text documents over the Internet securely.Once the watermark is embedded with no damage to the original document,it is then shared with the destination.The watermark extraction process is performed to get the original document securely.The experimental validation of the ADMDTW-TAD technique is carried out under varying levels of attack volumes,and the outcomes were inspected in terms of different measures.The simulation values indicated that the ADMDTW-TAD technique improved performance over other models. 展开更多
关键词 Content authentication tampering attacks detection model SECURITY digital watermarking
下载PDF
An Active Image Forgery Detection Approach Based on Edge Detection
12
作者 Hüseyin Bilal Macit Arif Koyun 《Computers, Materials & Continua》 SCIE EI 2023年第4期1603-1619,共17页
Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Mo... Recently, digital images have become the most used data, thanks tohigh internet speed and high resolution, cheap and easily accessible digitalcameras. We generate, transmit and store millions of images every second.Most of these images are insignificant images containing only personal information.However, in many fields such as banking, finance, public institutions,and educational institutions, the images of many valuable objects like IDcards, photographs, credit cards, and transaction receipts are stored andtransmitted to the digital environment. These images are very significantand must be secured. A valuable image can be maliciously modified by anattacker. The modification of an image is sometimes imperceptible even by theperson who stored the image. In this paper, an active image forgery detectionmethod that encodes and decodes image edge information is proposed. Theproposed method is implemented by designing an interface and applied on atest image which is frequently used in the literature. Various tampering attacksare simulated to test the fidelity of the method. The method not only notifieswhether the image is forged or not but also marks the tampered region ofthe image. Also, the proposed method successfully detected tampered regionsafter geometric attacks, even on self-copy attacks. Also, it didn’t fail on JPEGcompression. 展开更多
关键词 Image forgery image tampering edge detection
下载PDF
关于《古文尚书音义》窜改离厄的分析与思考——以敦煌残本《尧典释文》与今本的异同比较为例
13
作者 黄继省 《乐山师范学院学报》 2023年第7期63-70,78,共9页
唐代陆德明的《经典释文》是一部文字、音韵、训诂的资料宝库,其语言学和文献学价值巨大,但在流传刊刻中,几经离厄,《经典释文·古文尚书音义》尤甚,被窜改得面目全非。参考一些清儒的校勘考据,通过敦煌写本《古文尚书音义·尧... 唐代陆德明的《经典释文》是一部文字、音韵、训诂的资料宝库,其语言学和文献学价值巨大,但在流传刊刻中,几经离厄,《经典释文·古文尚书音义》尤甚,被窜改得面目全非。参考一些清儒的校勘考据,通过敦煌写本《古文尚书音义·尧典》残卷与今本释文的比较,分析其离厄窜改的原因、概况、所依据的原则及其影响等,并对《古文尚书音义》的整理提出几点思考。 展开更多
关键词 陆德明 《经典释文》 《古文尚书音义》 《尧典释文》 窜改
下载PDF
电能计量装置的防窃电措施 被引量:4
14
作者 谭伟瀚 《科技与创新》 2014年第17期14-15,共2页
由于受各种因素的影响,各个地区均出现了不同程度的窃电现象,使计量结果产生误差,给电力企业造成了极大的经济损失,影响到电网安全、稳定的运行,因此,需要电力管理人员予以高度的重视,在计量装置方面做好防窃措施。简单分析了电能计量... 由于受各种因素的影响,各个地区均出现了不同程度的窃电现象,使计量结果产生误差,给电力企业造成了极大的经济损失,影响到电网安全、稳定的运行,因此,需要电力管理人员予以高度的重视,在计量装置方面做好防窃措施。简单分析了电能计量装置的作用,并从三个方面阐述了电能计量装置的防窃电措施,包括合理配置计量装置、技术改造、制度防范等,为电力人员提供一定的参考和借鉴。 展开更多
关键词 电力企业 电能计量装置 防窃电 技术改造
下载PDF
An Overview of Image Tamper Detection
15
作者 Xingyu Chen 《Journal of Information Hiding and Privacy Protection》 2022年第2期103-113,共11页
With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software,the threshold of digital image editing becomes lower and lower.Thismakes it easy to t... With the popularization of high-performance electronic imaging equipment and the wide application of digital image editing software,the threshold of digital image editing becomes lower and lower.Thismakes it easy to trick the human visual system with professionally altered images.These tampered images have brought serious threats to many fields,including personal privacy,news communication,judicial evidence collection,information security and so on.Therefore,the security and reliability of digital information has been increasingly concerned by the international community.In this paper,digital image tamper detection methods are classified according to the clues that they rely on,detection methods based on image content and detection methods based on double JPEG compression traces.This paper analyzes and discusses the important algorithms in several classification methods,and summarizes the problems existing in various methods.Finally,this paper predicts the future development trend of tamper detection. 展开更多
关键词 Image forensics image tampering traces image tampering detection
下载PDF
Image Tamper Detection and Multi-Scale Self-Recovery Using Reference Embedding with Multi-Rate Data Protection 被引量:1
16
作者 Navid Daneshmandpour Habibollah Danyali Mohammad Sadegh Helfroush 《China Communications》 SCIE CSCD 2019年第11期154-166,共13页
This paper proposes a multi-scale self-recovery(MSSR)approach to protect images against content forgery.The main idea is to provide more resistance against image tampering while enabling the recovery process in a mult... This paper proposes a multi-scale self-recovery(MSSR)approach to protect images against content forgery.The main idea is to provide more resistance against image tampering while enabling the recovery process in a multi-scale quality manner.In the proposed approach,the reference data composed of several parts and each part is protected by a channel coding rate according to its importance.The first part,which is used to reconstruct a rough approximation of the original image,is highly protected in order to resist against higher tampering rates.Other parts are protected with lower rates according to their importance leading to lower tolerable tampering rate(TTR),but the higher quality of the recovered images.The proposed MSSR approach is an efficient solution for the main disadvantage of the current methods,which either recover a tampered image in low tampering rates or fails when tampering rate is above the TTR value.The simulation results on 10000 test images represent the efficiency of the multi-scale self-recovery feature of the proposed approach in comparison with the existing methods. 展开更多
关键词 tamper detection image recovery MULTI-SCALE SELF-RECOVERY tolerable tampering rate
下载PDF
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship 被引量:3
17
作者 Fahd N.Al-Wesabi Saleh Alzahrani +3 位作者 Fuad Alyarimi Mohammed Abdul Nadhem Nemri Mohammed M.Almazah 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期297-311,共15页
In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The thir... In this paper,a combined approach CAZWNLP(a combined approach of zero-watermarking and natural language processing)has been developed for the tampering detection of English text exchanged through the Internet.The third gram of alphanumeric of the Markov model has been used with text-watermarking technologies to improve the performance and accuracy of tampering detection issues which are limited by the existing works reviewed in the literature of this study.The third-grade level of the Markov model has been used in this method as natural language processing technology to analyze an English text and extract the textual characteristics of the given contexts.Moreover,the extracted features have been utilized as watermark information and then validated with the attacked English text to detect any suspected tampering occurred on it.The embedding mechanism of CAZWNLP method will be achieved logically without effects or modifying the original text document to embed a watermark key.CAZWNLP has been implemented using VS code IDE with PHP.The experimental and simulation results using standard datasets of varying lengths show that the proposed approach can obtain high robustness and better detection accuracy of tampering common random insertion,reorder,and deletion attacks,e.g.,Comparison results with baseline approaches also show the advantages of the proposed approach. 展开更多
关键词 NLP text analysis English text watermarking ROBUSTNESS tampering detection
下载PDF
高光谱成像技术在黑色中性笔检测方面的研究 被引量:3
18
作者 王伟利 赵曰峰 《电脑知识与技术》 2018年第3期236-237,共2页
应用高光谱成像技术识别篡改的字迹,还原原本数据,以及重现同色掩盖的字迹。提取特征波段后,可以对样本数据做出初步的区分。对每个样本依次进行降噪、IsoData、建立眼膜、去除背景和PCA分析处理。并结合数学统计分析提出了识别篡改字... 应用高光谱成像技术识别篡改的字迹,还原原本数据,以及重现同色掩盖的字迹。提取特征波段后,可以对样本数据做出初步的区分。对每个样本依次进行降噪、IsoData、建立眼膜、去除背景和PCA分析处理。并结合数学统计分析提出了识别篡改字迹和重现掩盖字迹的方法。该方法对18种品牌黑色中性笔的篡改字迹识别率和重现掩盖字迹识别率分别为75.8%和57.3%。 展开更多
关键词 高光谱成像 字迹 篡改 掩盖 主成分分析
下载PDF
System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks:the optimality of attack strategy 被引量:2
19
作者 Jin Guo Xuebin Wang +2 位作者 Yanling Zhang Wenchao Xue Yanlong Zhao 《Control Theory and Technology》 EI CSCD 2022年第1期127-138,共12页
With the development of wireless communication technology,cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security ... With the development of wireless communication technology,cyber physical systems are applied in various fields such as industrial production and infrastructure,where lots of information exchange brings cyber security threats to the systems.From the perspective of system identification with binary-valued observations,we study the optimal attack problem when the system is subject to both denial of service attacks and data tampering attacks.The packet loss rate and the data tampering rate caused by the attack is given,and the estimation error is derived.Then the optimal attack strategy to maximize the identification error with the least energy is described as a min–max optimization problem with constraints.The explicit expression of the optimal attack strategy is obtained.Simulation examples are presented to verify the effectiveness of the main conclusions. 展开更多
关键词 System identification Binary-valued observations Denial-of-service attacks Data tampering attacks
原文传递
On the Use of Benford’s Law to Detect JPEG Biometric Data Tampering
20
作者 Iorliam Aamo Shangbum F. Caleb 《Journal of Information Security》 2017年第3期240-256,共17页
Tampering of biometric data has attracted a great deal of attention recently. Furthermore, there could be an intentional or accidental use of a particular biometric sample instead of another for a particular applicati... Tampering of biometric data has attracted a great deal of attention recently. Furthermore, there could be an intentional or accidental use of a particular biometric sample instead of another for a particular application. Therefore, there exists a need to propose a method to detect data tampering, as well as differentiate biometric samples in cases of intentional or accidental use for a different application. In this paper, fingerprint image tampering is studied. Furthermore, optically acquired fingerprints, synthetically generated fingerprints and contact-less acquired fingerprints are studied for separation purposes using the Benford’s law divergence metric. Benford’s law has shown in literature to be very effective in detecting tampering of natural images. In this paper, the Benford’s law features with support vector machine are proposed for the detection of malicious tampering of JPEG fingerprint images. This method is aimed at protecting against insider attackers and hackers. This proposed method detected tampering effectively, with Equal Error Rate (EER) of 2.08%. Again, the experimental results illustrate that, optically acquired fingerprints, synthetically generated fingerprints and contact-less acquired fingerprints can be separated by the proposed method effectively. 展开更多
关键词 Benford’s LAW FINGERPRINTS JPEG COEFFICIENTS tampering
下载PDF
上一页 1 2 51 下一页 到第
使用帮助 返回顶部