Practical Applications

From 2008.igem.org

(Difference between revisions)
Line 12: Line 12:
*Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)
*Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)
 +
 +
*[https://2008.igem.org/Ideal_Hash_Function_Characteristics Ideal Hash Function Characteristics]
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home]
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home]

Revision as of 22:28, 27 October 2008

  • Prove authentication of document
  • Protect Government Documents
  • Minimize Cheating on Standardized Tests
  • Protect Lengthy and Important Instructions
  • Protect Financial Transactions
  • Protect Passwords
  • Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)