Practical Applications
From 2008.igem.org
(Difference between revisions)
Krmuscalino (Talk | contribs) |
Krmuscalino (Talk | contribs) |
||
Line 13: | Line 13: | ||
*Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists) | *Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists) | ||
- | *[https://2008.igem.org/Ideal_Hash_Function_Characteristics Ideal Hash Function Characteristics] | + | *[https://2008.igem.org/Ideal_Hash_Function_Characteristics Ideal Hash Function Characteristics Page] |
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home] | *[https://2008.igem.org/Team:Davidson-Missouri_Western Home] |
Latest revision as of 22:39, 27 October 2008
- Prove authentication of document
- Protect Government Documents
- Minimize Cheating on Standardized Tests
- Protect Lengthy and Important Instructions
- Protect Financial Transactions
- Protect Passwords
- Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)