Sciweavers

24 search results - page 2 / 5
» Tamper Evident Microprocessors
Sort
View
ICALP
2005
Springer
13 years 11 months ago
Basing Cryptographic Protocols on Tamper-Evident Seals
Abstract. In this paper we attempt to formally study two very intuitive physical models: sealed envelopes and locked boxes, often used as illustrations for common cryptographic ope...
Tal Moran, Moni Naor
FC
2006
Springer
119views Cryptology» more  FC 2006»
13 years 9 months ago
Auditable Privacy: On Tamper-Evident Mix Networks
Abstract. We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers....
Jong Youl Choi, Philippe Golle, Markus Jakobsson
IWDW
2007
Springer
13 years 12 months ago
Detecting Photographic Composites of People
The compositing of two or more people into a single image is a common form of manipulation. We describe how such composites can be detected by estimating a camera’s intrinsic par...
Micah K. Johnson, Hany Farid
MMSEC
2006
ACM
216views Multimedia» more  MMSEC 2006»
13 years 11 months ago
Exposing digital forgeries in video by detecting double MPEG compression
With the advent of sophisticated and low-cost video editing software, it is becoming increasingly easier to tamper with digital video. In addition, an ever-growing number of video...
Weihong Wang, Hany Farid
ICIP
2010
IEEE
13 years 3 months ago
Undetectable image tampering through JPEG compression anti-forensics
Recently, a number of digital image forensic techniques have been developed which are capable of identifying an image's origin, tracing its processing history, and detecting ...
Matthew C. Stamm, Steven K. Tjoa, W. Sabrina Lin, ...