lecture26_alomari

Could then change the id affecting already marked

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: affecting already marked images and bypassing checks for existing marks to overwrite them. Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU Many techniques can survive individual transformations but are vulnerable to combinations of them. Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU Need to cope with common transformations to prevent accidental removal of mark. IMPLEMENTATION ATTACKS Use of benchmarking can help determine vulnerabilities. 9 10 REFERENCES End lecture 26 Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU Jonathan Cummins, Patrick Diskin, Samuel Lau and Robert Parlett, School of Computer Science, The University of Birmingham, 2004. 11 Copyrights are reserved @ 2010 for Dr. Alomari, CIS, JU 3...
View Full Document

This note was uploaded on 05/17/2013 for the course CIS 102 taught by Professor Loaynemer during the Spring '13 term at University of Jordan.

Ask a homework question - tutors are online