Practical Applications
From 2008.igem.org
(Difference between revisions)
Krmuscalino (Talk | contribs) |
Krmuscalino (Talk | contribs) |
||
(One intermediate revision not shown) | |||
Line 12: | Line 12: | ||
*Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists) | *Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists) | ||
+ | |||
+ | *[https://2008.igem.org/Ideal_Hash_Function_Characteristics Ideal Hash Function Characteristics Page] | ||
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home] | *[https://2008.igem.org/Team:Davidson-Missouri_Western Home] |
Latest revision as of 22:39, 27 October 2008
- Prove authentication of document
- Protect Government Documents
- Minimize Cheating on Standardized Tests
- Protect Lengthy and Important Instructions
- Protect Financial Transactions
- Protect Passwords
- Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)