Practical Applications

From 2008.igem.org

(Difference between revisions)
 
Line 13: Line 13:
*Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)
*Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)
-
*[https://2008.igem.org/Ideal_Hash_Function_Characteristics Ideal Hash Function Characteristics]
+
*[https://2008.igem.org/Ideal_Hash_Function_Characteristics Ideal Hash Function Characteristics Page]
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home]
*[https://2008.igem.org/Team:Davidson-Missouri_Western Home]

Latest revision as of 22:39, 27 October 2008

  • Prove authentication of document
  • Protect Government Documents
  • Minimize Cheating on Standardized Tests
  • Protect Lengthy and Important Instructions
  • Protect Financial Transactions
  • Protect Passwords
  • Detect tampered pictures (pictures that have been photo-shopped) Detect tampered pictures with hidden info (terrorists)