Tamper detection in RFID tags, using, fragile watermarking
Security and privacy are one of the two primary concerns with RFID (Radio Frequency Identification) adoption. While the mainstream RFID research is focused on solving the privacy issues, this paper focuses on security issues in general and data tampering in particular. We specifically consider the i...
| Main Authors: | Potdar, Vidyasagar, Chang, Elizabeth |
|---|---|
| Format: | Conference Paper |
| Published: |
IEEE Computer Society Press
2006
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/11412 |
Similar Items
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
The data integrity problem and multi-layered document integrity
by: Moss, Ben
Published: (2007)
by: Moss, Ben
Published: (2007)
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Subjective and objective watermark detection using a novel approach: Bar-coded watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Multimodal fingerprint and face biometrics with fragile watermarking and convolutional neural network
by: Najih, Abdulmawla
Published: (2020)
by: Najih, Abdulmawla
Published: (2020)
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Passive RFID tag for biomass tracking and monitoring
of temperature and humidity level
by: Ali, Amjad
Published: (2024)
by: Ali, Amjad
Published: (2024)
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking
by: Harjito, Bambang, et al.
Published: (2010)
by: Harjito, Bambang, et al.
Published: (2010)
State-of-the-art in techniques of text digital watermarking: challenges and limitations
by: Al-Maweri, Nasr Addin Ahmed Salem, et al.
Published: (2016)
by: Al-Maweri, Nasr Addin Ahmed Salem, et al.
Published: (2016)
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
by: Salem Hussin, Saleh Hussin
Published: (2005)
by: Salem Hussin, Saleh Hussin
Published: (2005)
An efficient method for audio watermarking using SWT and mean value quantization
by: Mushgil, Baydaa Mohammad
Published: (2016)
by: Mushgil, Baydaa Mohammad
Published: (2016)
Image authentication using Zernike moment watermarking
by: Shojanazeri, Hamid
Published: (2013)
by: Shojanazeri, Hamid
Published: (2013)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Autonomous robot navigation and path following via
RFID tag detection
by: Castle-Green, Simon
Published: (2017)
by: Castle-Green, Simon
Published: (2017)
Low-Cost RFID Identification Variation
by: Lin, K., et al.
Published: (2006)
by: Lin, K., et al.
Published: (2006)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Image orientation watermarking technique for copyright protection
by: Jasim, Hend Muslim
Published: (2016)
by: Jasim, Hend Muslim
Published: (2016)
Spatial and Temporal Analysis on the Distribution of Active Radio-Frequency Identification (RFID) Tracking Accuracy with the Kriging Method
by: Liu, Xin, et al.
Published: (2014)
by: Liu, Xin, et al.
Published: (2014)
Spread Spectrum Based High Embedding Capacity Watermarking Method for Audio Signals
by: Xiang, Y., et al.
Published: (2015)
by: Xiang, Y., et al.
Published: (2015)
Fingerprint Image Watermarking Using Encrypted Identification Number
by: Mustafa, Intan Shafinaz
Published: (2006)
by: Mustafa, Intan Shafinaz
Published: (2006)
Multiple image watermarking using the SILE approach
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Watermarking technique for wireless multimedia sensor networks: A state of the art
by: Potdar, Vidyasagar, et al.
Published: (2012)
by: Potdar, Vidyasagar, et al.
Published: (2012)
The Experimental Application of an Occupant Tracking Technology in Domestic Post-Occupancy Evaluation
by: Holland, Richard
Published: (2006)
by: Holland, Richard
Published: (2006)
Antecedents of Continuance Intention of RFID Technology in Western Australian Farms
by: Hossain, Mohammad, et al.
Published: (2012)
by: Hossain, Mohammad, et al.
Published: (2012)
Radio frequency identification (RFID) adoption: a cross-sectional comparison of voluntary and mandatory contexts
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
Breach with Intent: A Risk Analysis of Deliberate Security Breaches in the Seafood Supply Chain
by: Forbes, David, et al.
Published: (2015)
by: Forbes, David, et al.
Published: (2015)
Split-ring resonator-based antenna with photonic band gap for UHF RFID tag
by: Erman, Fuad Naim Ahmed
Published: (2016)
by: Erman, Fuad Naim Ahmed
Published: (2016)
Slotted UHF RFID full embroidery e-textile wearable tag antenna for WBAN application
by: Dawood, Bahaa Abbas
Published: (2017)
by: Dawood, Bahaa Abbas
Published: (2017)
Impact of External Environmental Factors on RFID Adoption in Australian Livestock Industry: An Exploratory Study
by: Hossain, M., et al.
Published: (2010)
by: Hossain, M., et al.
Published: (2010)
Does Mandatory Pressure Increase RFID Adoption? A Case Study of Western Australian Livestock Industry
by: Hossain, Mohammad, et al.
Published: (2013)
by: Hossain, Mohammad, et al.
Published: (2013)
Robust patchwork-based watermarking method for stereo audio signals
by: Natgunanathan, I., et al.
Published: (2013)
by: Natgunanathan, I., et al.
Published: (2013)
Robust Patchwork-Based Embedding and Decoding Scheme for Digital Audio Watermarking
by: Natgunanathan, I., et al.
Published: (2012)
by: Natgunanathan, I., et al.
Published: (2012)
Implementing RFID in China: A Critical Comparison between National and Foreign Owed Retailers
by: Wang, Luo
Published: (2011)
by: Wang, Luo
Published: (2011)
Developing and validating a model explaining the assimilation process of RFID: An empirical study.
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
Developing and validating a hierarchical model of external responsiveness: A study on RFID technology
by: Hossain, M., et al.
Published: (2014)
by: Hossain, M., et al.
Published: (2014)
Miniaturization of UHF RFID tag antenna
by: Daud, Nor Hidayah
Published: (2015)
by: Daud, Nor Hidayah
Published: (2015)
Coplanar UHF RFID tag antennna with u-shaped inductively coupled feed for metalic applications
by: Al Khanjar, Karrar Naji Salman
Published: (2016)
by: Al Khanjar, Karrar Naji Salman
Published: (2016)
Wireless multimedia sensor networks: a survey
by: Potdar, Vidyasagar, et al.
Published: (2009)
by: Potdar, Vidyasagar, et al.
Published: (2009)
Similar Items
-
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006) -
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005) -
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006) -
The data integrity problem and multi-layered document integrity
by: Moss, Ben
Published: (2007) -
A quantization based robust image watermarking algorithm in the wavelet domain
by: Potdar, Vidyasagar, et al.
Published: (2005)