Tampering Research Papers - Academia.edu (original) (raw)

1 Follower

Recent papers in Tampering

La methode STRIDE pour identifier les menaces, et réduisant progressivement la complexité de l'analyse des menaces du système d’assurance en ligne. Il est d'une importance capitale pour l'analyse de la sécurité et l'évaluation des risques... more

La methode STRIDE pour identifier les menaces, et réduisant progressivement la complexité de l'analyse des menaces du système d’assurance en ligne. Il est d'une importance capitale pour l'analyse de la sécurité et l'évaluation des risques du système d’assurance en ligne, et pour exploiter en profondeur les vulnérabilités et les risques du système d’assurance en ligne.

Modern face recognition systems are vulnerable to spoofing attack. Spoofing attack occurs when a person tries to cheat the system by presenting fake biometric data gaining unlawful access. A lot of researchers have originated novel... more

Modern face recognition systems are vulnerable to spoofing attack. Spoofing attack occurs when a person tries to cheat the system by presenting fake biometric data gaining unlawful access. A lot of researchers have originated novel techniques to fascinate these types of face tampering attack. It seems that no comparative studies of different face recognition algorithms on same protocols and fake data have been incorporated. The motivation behind this paper is to present the effect of face tampering on various categories of face recognition algorithms. For this purpose four categories of facial recognition algorithms have been selected to present the obtained results in the form of facial identification accuracy at various tampering and experimental protocols but obtained results are very fluctuating in nature. Finally, we come to the conclusion that it is totally unpredictable to select particular type of algorithm for tampered face recognition.

Face plays an ethical role in human interaction compared to other biometrics. It is most popular non-intrusive and non-invasive biometrics whose image can easily be snapped without user co-operation. That is why; criminals and imposters... more

Face plays an ethical role in human interaction compared to other biometrics. It is most popular non-intrusive and non-invasive biometrics whose image can easily be snapped without user co-operation. That is why; criminals and imposters always try to tamper their facial identity. Therefore, face tampering detection is one of the most important bottlenecks for security, commercial and industrial orbit. Face tampering detection is one of the most important bottlenecks for security, commercial and industrial orbit. In particular, few researchers have addressed the challenges for the disguise detection but inadequacy is benchmark database in public domain. This paper addresses these problems by preparing of three category of tampered face database within the framework of FRT (Facial Recognition Technology) and evaluates the performance of this database on face recognition algorithms. These categories of database are dummy, colour imposed and masked face.

Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Portable Network Graphics... more

Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Portable Network Graphics (PNG) format. This stego image is transmitted over the network. The authentication process is applied on the stego image on the receiver side. In the authentication process the data extracted from this stego image is compared with the data computed from the binary version of the stego image. If the data is matched the image is considered to be authentic. Else the tampered blocks are marked and the image is self-repaired using inverse secret sharing scheme.but in other methods they cannot resist the self-substitution attack, the same-position-substitution attack, or the cut- off attack. Furthermore, those attacks can be completed by the popular image editing software Adobe Photoshop. We proposed security enhanced authentication scheme. Our proposed scheme is capable of repairing the content of the given stego-image if attacked by the methods mentioned above.

Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Portable Network Graphics... more

Image authentication is one of the methods which can detect the any tampering data. The original grayscale document image is converted into stego image by adding the alpha channel plane. The stego image is in the Portable Network Graphics (PNG) format. This stego image is transmitted over the network. The authentication process is applied on the stego image on the receiver side. In the authentication process the data extracted from this stego image is compared with the data computed from the binary version of the stego image. If the data is matched the image is considered to be authentic. Else the tampered blocks are marked and the image is self-repaired using inverse secret sharing scheme.but in other methods they cannot resist the self-substitution attack, the same-position-substitution attack, or the cut- off attack. Furthermore, those attacks can be completed by the popular image editing software Adobe Photoshop. We proposed security enhanced authentication scheme. Our proposed scheme is capable of repairing the content of the given stego-image if attacked by the methods mentioned above.

In today’s era role of digital image is eloquent. With its escalating importance and usage it becomes necessary to assess if the content is realistic or has been manipulated to trick the observer. Image forensics answers all these... more

In today’s era role of digital image is eloquent. With its escalating importance and usage it becomes necessary to assess if the content is realistic or has been manipulated to trick the observer. Image forensics answers all these questions. Adding some useful features or eliminating awkward information is the extensively used tampering technique. The image forgery caused using this technique refers to cloning or copy-move attack. This paper elaborates the manifold techniques to detect cloned image forgery.

Log In