Research on Key Technology of Webpage Tampering Prevention

2014 ◽  
Vol 644-650 ◽  
pp. 2755-2758
Author(s):  
Li Zhao ◽  
Xiang Ling ◽  
Feng Deng

Webpage tampering prevention system is a security protection means of website to prevent from hacker’s unauthorized update to webpage. This paper deeply researches the key technology of webpage tampering prevention system, i.e., poll tampering detection technology, core embedding technology and file filtering drive technology, the algorithm of three prevailing tampering prevention detection technologies is realized on the basis of apache platform, they are integrated together to form an exclusive and perfect new type tampering prevention system.

2014 ◽  
Vol 6 (3) ◽  
pp. 30-46
Author(s):  
Jia-Hong Li ◽  
Tzung-Her Chen ◽  
Wei-Bin Lee

Image authentication must be able to verify the origin and the integrity of digital images, and some research has made efforts in that. In this paper, we reveal a new type of malicious alteration which we call the “Tattooing Attack”. It can successfully alter the protected image if the collision of the authentication bits corresponding to the altered image and the original watermarking image can be found. To make our point, we chose Chang et al.'s image authentication scheme based on watermarking techniques for tampering detection as an example. The authors will analyze the reasons why the attack is successful, and then they delineate the conditions making the attack possible. Since the result can be generally applied into other schemes, the authors evaluate such schemes to examine the soundness of these conditions. Finally, a solution is provided for all tamper detection schemes suffering from the Tattooing Attack.


2013 ◽  
Vol 312 ◽  
pp. 597-602 ◽  
Author(s):  
Jie Fang Xing ◽  
Yuan Chen ◽  
Lu Jun He

In order to improve production quality and efficiency of cigarette trademark, new type reel cigarette trademark on soft package adopts production mode of reel to reel, which becomes the development trend. This technique makes higher requirements on double-position connection lettering and detection technology of holographic / concave and protruding lettering. This experiment uses on-line quality examination system to conduct the relevant examinations on double-position lettering of holographic / protruding lettering of cigarette packet and makes the analysis. The experiment shows that: holographic lettering quality varies with the amount of lettering and lettering speed. For protruding lettering unit, electrified aluminium in vertical direction has a better result than that in horizontal direction. This study lays a foundation for normal production of machine and further quality inspection after lettering.


2011 ◽  
Vol 474-476 ◽  
pp. 729-734
Author(s):  
Qiu Yu Zhang ◽  
Zhi Peng Cai ◽  
Zhan Ting Yuan ◽  
Feng Man Miao

Cross-domain authentication is a key technology used in distributed computing, however, it isn’t perfect. In this paper, a new type of hybrid cross-domain authentication model is proposed to make up its shortcoming in safety, scalability and password synchronization. In this model, advantages of Kerberos and SAML in cross-domain authentication process are combined, and it mixed password transport protocols is adopted to achieve password synchronization. Theoretical analysis shows it can enhance the security and scalability of cross-domain authentication, the efficiency of cross-domain authentication is also improved as the attainment of password synchronization.


2013 ◽  
Vol 462-463 ◽  
pp. 55-58
Author(s):  
Yi Yao ◽  
Ya Chuan Yao ◽  
Qiang Han ◽  
Hong Song

Electronic tongue is a new type of modern analytical instrumentation based on the human taste receptor research mechanism. Use the sensor array, as the biological sensing taste buds cells, to detect object,and to get results by the method of pattern recognition. Introduce the principles of electronic tongue, the study of several typical systems. Focus on the application in liquor quality, microbial detection, as well as some existing problems in the research development.


2013 ◽  
Vol 748 ◽  
pp. 999-1002 ◽  
Author(s):  
Ren Chen ◽  
Hui Li

Hand-detection is a key technology to the somatic games. In this paper, we present a real-time hand-detection method based on Adaboost and skin-color characteristic. By processing the video frames with Adaboost classifier, we abstract the target regions which may contain the hand gestures. Then a filter based on skin color is proposed to select the correct regions. The best detection rate reaches above 89% with an acceptable failure rate and misjudgment rate. Experimental results show that this method is a lightweight and rapid approach to implement real-time hand detection in somatic games.


2006 ◽  
Vol 11 (6) ◽  
pp. 606-616 ◽  
Author(s):  
Oliver Von Ahsen ◽  
Anne Schmidt ◽  
Monika Klotz ◽  
Karsten Parczyk

High-throughput screening (HTS) of large chemical libraries has become the main source of new lead compounds for drug development. Several specialized detection technologies have been developed to facilitate the cost- and time-efficient screening of millions of compounds. However, concerns have been raised, claiming that different HTS technologies may produce different hits, thus limiting trust in the reliability of HTS data. This study was aimed to investigate the reliability of the authors most frequently used assay techniques: scintillation proximity assay (SPA) and homogeneous time-resolved fluorescence resonance energy transfer (TR-FRET). To investigate the data concordance between these 2 detection technologies, the authors screened a large subset of the Schering compound library consisting of 300,000 compounds for inhibitors of a nonreceptor tyrosine kinase. They chose to set up this study in realistic HTS scale to ensure statistical significance of the results. The findings clearly demonstrate that the choice of detection technology has no significant impact on hit finding, provided that assays are biochemically equivalent. Data concordance is up to 90%. The little differences in hit findings are caused by threshold setting but not by systematic differences between the technologies. The most significant difference between the compared techniques is that in the SPA format, more false-positive primary hits were obtained.


2012 ◽  
Vol 542-543 ◽  
pp. 814-817
Author(s):  
Jian Min Zhou ◽  
Li Juan Fan ◽  
Rui Feng Zhang

Infrared thermal wave detection technology has been found to be a new type of wide attention non-destructive testing (NDT) method due to its non-contact, non-destructive, rapidity, wide imaging field and advantages of direct observation. Key technologies and the latest research progress of the infrared thermal wave technology in parts defects are reviewed in this paper. The key technologies include the heat stimulator, infrared thermal image processing, heat transfer analysis and etc. The existing problems of the technology are also pointed out.


Author(s):  
M. MADHURI ◽  
K. YESESWINI ◽  
U. VIDYA SAGAR

Phishing is a new type of network attack where the attacker creates a replica of an existing Web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financial, or password data to what they think is their service provides’ Web site. In this project, we proposed a new end-host based anti-phishing algorithm, which we call Link Guard, by utilizing the generic characteristics of the hyperlinks in phishing attacks. These characteristics are derived by analyzing the phishing data archive provided by the Anti-Phishing Working Group (APWG). Because it is based on the generic characteristics of phishing attacks, Link Guard can detect not only known but also unknown phishing attacks. We have implemented LinkGuard in Windows XP. Our experiments verified that LinkGuard is effective to detect and prevent both known and unknown phishing attacks with minimal false negatives. LinkGuard successfully detects 195 out of the 203 phishing attacks. Our experiments also showed that LinkGuard is light weighted and can detect and prevent phishing attacks in real time. Index


2015 ◽  
Vol 15 (3) ◽  
pp. 415
Author(s):  
Himal Pratap Singh ◽  
Om Prakash Uniyal ◽  
Kireet Joshi

<p>As the population of world is growing day by day, there is a rapid increment in the vehicle production. With the increase in number of the vehicles, more parking spaces and efficient ways of parking are required. In the proposed system, a new and cost efficient way of finding the free spaces in parking lot is proposed and also different space detection technologies are compared. This system will be helpful for the drivers in finding the vacant spaces in the car parking lots using a simple technology in which a balloon will be used to determine the vacant parking spaces. Since this technology is cost efficient and effective,this system is termed as smart parking system.</p>


2014 ◽  
Author(s):  
Jörg Goldhahn ◽  
Niklas König

Falls have significant impact on affected individuals. They may lead to injuries including fractures, hospitalization, decrase in mobility, and loss of independence. Therefore, falls constitute a relevant outcome parameter in clinical trials. However, especially elderly and frail patients may forget to report or neglect falls. The use of fall-detection technology in clinical trials may overcome this challenges. However, commercially-available fall-detection technologies are designed as personal emergency response systems rather than as measurement tools to assess the effects of an intervention. Hence, before adopting a commercially-availablefall-detection technology in a clinical trial one has to assess its suitability for such application.


Sign in / Sign up

Export Citation Format

Share Document