Showing 1 - 20 results of 21 for search '(( tamper detection ) OR ( tamper selection ))', query time: 0.10s Refine Results
  1. 1

    MATADOR: a magic matrix-based framework for tamper detection and image recovery by Thilina Mendis, Farah Kandah, Lalith Medury

    Published 2025-06-01
    “…Abstract Ensuring the integrity and authenticity of digital medical images is crucial for healthcare security and digital forensics, as image tampering can have serious consequences. Traditional methods often struggle to detect subtle, localized manipulations, leaving critical vulnerabilities. …”
    Get full text
    Article
  2. 2
  3. 3

    A Robust Cross-Channel Image Watermarking Technique for Tamper Detection and its Precise Localization by Muhammad Ashraf, Adnan Nadeem, Oussama Benrhouma, Muhammad Sarim, Kashif Rizwan, Amir Mehmood

    Published 2025-01-01
    “…This property makes proposed algorithm a preferred choice for data integrity protection; it achieved an average F1-score of 0.97 for tamper detection.…”
    Get full text
    Article
  4. 4
  5. 5

    Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization by Buti Sello, Jianming Yong, Xiaohui Tao

    Published 2024-06-01
    “…Abstract The introduction of blockchain technology has brought about significant transformation in the realm of digital transactions, providing a secure and transparent platform for peer-to-peer interactions that cannot be tampered with. The decentralised and distributed nature of blockchains guarantees the integrity and authenticity of the data, eliminating the need for intermediaries. …”
    Get full text
    Article
  6. 6
  7. 7

    Research on airport baggage anomaly retention detection technology based on machine vision, edge computing, and blockchain by Yuzhou Chen, Gang Mao, Xue Yang, Mingqian Du, Hongqing Song

    Published 2024-12-01
    “…To address this challenge, this paper proposes a real‐time detection and alerting of luggage anomaly retention based on the YOLOv5 object detection model, leveraging visual algorithms. …”
    Get full text
    Article
  8. 8

    Enhancing anomaly detection and prevention in Internet of Things (IoT) using deep neural networks and blockchain based cyber security by Sathyabama A R, Jeevaa Katiravan

    Published 2025-07-01
    “…Unlike traditional rule-based intrusion detection systems (IDS), the DNN continuously learns and adapts to new attack patterns, improving detection accuracy and false-positive reduction. …”
    Get full text
    Article
  9. 9
  10. 10

    SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture by Umesh Kumar Lilhore, Sarita Simaiya, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Afnan Alhazmi, Md Monish Khan

    Published 2025-07-01
    “…To ensure transparency and tamper-proof event tracking, the framework also incorporates blockchain-based logging that is aligned with ZTA compliance. …”
    Get full text
    Article
  11. 11

    Combating electricity fraud: Employing hybrid learning and computer vision for sustainable energy management by Jui-Sheng Chou, Nader Anwar Charaf, Dani Nugraha Limantono, Hoang-Minh Nguyen

    Published 2025-07-01
    “…Electricity fraud deliberately manipulates electricity consumption data, such as meter tampering and unauthorized bypassing, to reduce recorded usage. …”
    Get full text
    Article
  12. 12

    Hybrid deep learning-enabled framework for enhancing security, data integrity, and operational performance in Healthcare Internet of Things (H-IoT) environments by Nithesh Naik, Neha Surendranath, Sai Annamaiah Basava Raju, Chennaiah Madduri, Nagaraju Dasari, Vinod Kumar Shukla, Vathsala Patil

    Published 2025-08-01
    “…Abstract The increasing reliance on Human-centric Internet of Things (H-IoT) systems in healthcare and smart environments has raised critical concerns regarding data integrity, real-time anomaly detection, and adaptive access control. Traditional security mechanisms lack dynamic adaptability to streaming multimodal physiological data, making them ineffective in safeguarding H-IoT devices against evolving threats and tampering. …”
    Get full text
    Article
  13. 13

    Region-Based Hybrid Medical Image Watermarking Scheme for Robust and Secured Transmission in IoMT by Priyanka Singh, K. Jyothsna Devi, Hiren Kumar Thakkar, Ketan Kotecha

    Published 2022-01-01
    “…To ascertain integrity of RoI, tamper detection and recovery bits are embedded in RoI in the medical image. …”
    Get full text
    Article
  14. 14

    HalalChain: A decentralized blockchain model for enhanced data integrity, real-time compliance, and automated verification in halal food supply chain by Muhammad Muntasir Yakubu, Mohd Fadzil B Hassan, Kamaluddeen Usman Danyaro, Bello Musa Yakubu, Abdullah Abdulrahman Alabdulatif, S. Zulaikha Beevi, Aliyu Garba

    Published 2025-09-01
    “…Experimental evaluations demonstrate HalalChain’s superiority over existing models (AgriFoodCredChain, AgriBlockIoT), achieving a 99.8 % tamper detection rate, transaction throughput (38 TPS), consensus times of 1.2–2.5 s, 98 % validator approval rate, and optimal compliance adherence under varying loads. …”
    Get full text
    Article
  15. 15

    Quantum secured blockchain framework for enhancing post quantum data security by Nalavala Ramanjaneya Reddy, Supriya Suryadevara, K. Guru Raghavendra Reddy, Ramisetty Umamaheswari, Ramakrishna Guttula, Rajitha Kotoju

    Published 2025-08-01
    “…QKD: The system supports tamper-proof key exchange, quantum-resilient consensus among validator nodes, and secure transaction signing. …”
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    ESTIMATION TRACE OF HEROIN EXTRACTED FROM TOXIC PLANTS USING MOLECULARLY PRECIPITATION POLYMERS TECHNOLOGY by Y. K. Al-Bay, N. R. Jber, S. F. Abdullah

    Published 2025-08-01
    “…In human urine samples that were tampered with, the relative recoveries for heroin range from 92.5 to 103.75%. …”
    Get full text
    Article