Articles with "tampering detection" as a keyword



Photo by limorganon from unsplash

Adaptive Ensemble Methods for Tampering Detection in Automotive Aftertreatment Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3211387

Abstract: Control and diagnostic processes in modern vehicles incorporate nowadays a wide set of functionalities to preserve the vehicle’s health. Automotive vehicles contain embedded systems that must perform a diverse palette of tasks, ranging from less… read more here.

Keywords: system; tampering detection; adaptive ensemble; detection ... See more keywords
Photo by namroud from unsplash

Image Alignment-Based Multi-Region Matching for Object-Level Tampering Detection

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2016.2615272

Abstract: Tampering detection methods based on image hashing have been widely studied with continuous advancements. However, most existing models cannot generate object-level tampering localization results, because the forensic hashes attached to the image lack contour information.… read more here.

Keywords: object level; image; tampering detection; level tampering ... See more keywords
Photo by historyhd from unsplash

Speech Watermarking for Tampering Detection Based on Modifications to LSFs

Sign Up to like & get
recommendations!
Published in 2019 at "Mathematical Problems in Engineering"

DOI: 10.1155/2019/7285624

Abstract: There have been serious issues concerning the protection of speech signals from malicious tampering. Digital watermarking has been paid much attention in solving this problem. This paper proposes a tampering detection approach based on speech… read more here.

Keywords: modifications lsfs; speech; tampering detection; watermarking tampering ... See more keywords