它给人们带来种种便利的同时也带来了一系列的信息安全问题,比如信息窃取问题、多媒体信息的版权保护问题、信息篡改问题等。
It has brought us great convenience and a great number of information security problems as well. Such as information theft, copyright protection of multimedia data and image authentication.
所有这些信息都需要按照可靠且不可篡改的方式存储起来,支持根据这些数据生成审计报告。
All this information needs to be stored in a secure and tamper-resistant manner with the capability to report on it for audit purposes.
SSL中使用的证书包含标识信息,并被压缩在一个加密的信封中以防篡改。
The certificates used in SSL contain identity information and are encapsulated in a cryptographic envelope to prevent tampering.
世行集团采用各种技术来保护系统中存留的信息,以防丢失、误用、越权使用或泄漏、篡改和破坏。
The World Bank Group employs a range of technologies to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
这样的帐户信息通常正是基于网络(或者甚至是终端机)登录某台服务器的的同名帐户,而且往往能用来接管整个系统或是篡改网页。
Such account information is often precisely the same used for web-based (or even terminal) logins on a server, and can be used to take over entire systems or deface web pages.
cookie篡改(cookiepoisoning)是一项主要以获取模拟和隐私权泄密著称的技术,通过维护客户(或终端用户)身份的会话信息操纵来实现的。
Cookie poisoning is a technique known mainly for achieving impersonation and breach of privacy through manipulation of session cookies that maintain the identity of the client (or end user).
处理您的个人数据过程中,龙沙集团采取合理的措施来避免信息丢失、误用、未经授权访问、披露、篡改或毁坏。
In the course of handling your Personal Data, Lonza Group takes measures reasonably designed to protect that information from loss, misuse, unauthorized access, disclosure, alteration or destruction.
提出一种逻辑签署技术,以防范对打印信息的伪造、篡改及非法使用。
A logic signing technique was developed to protect printed information from being forged, tampered with or possessed illegally.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
数字签名告诉收件人该信息确实由您发出,不是伪造的,也没有被篡改。
The digital signature tells the recipient that the information actually came from you and has not been forged or tampered with.
我们不会在违背您的个人信息收集目的的情况下,或超出本隐私政策的范围处理、篡改、毁损您的个人信息。
We will not process, alter, or damage your Personal Information in contravention of the Personal Information Collection Purposes or outside the scope of this Privacy Policy.
攻击者利用网络技术,非法入侵他人计算机系统,窃取信息、篡改数据,给企业造成巨大损失。
Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.
同时,脆弱性水印不仅能判断图像的真实性,还能准确、直观地定位篡改信息。
Meanwhile, besides telling you whether an image has been tampered, the fragile watermark can reflect the distortion status truly and intuitively.
必须有识别滥用信息技术,包括不当进入、干扰或篡改商业数据的体系。
A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data.
信息在传输过程中如果不经加密,将很容易受到截取、篡改、伪造、重发攻击等威胁,其隐秘性也无从保障。
If information hasn't been encrypted in transmission, it will be easily caught, juggled, fabricated or repeat attacked etc, so its secrecy cann't be guaranteed.
讨论了多媒体信息可靠性鉴定的数字水印方法,可靠性鉴定也称为篡改证明。
We consider the problem of digital watermarking for credibility authentication or tamper proofing of multimedia.
如果数据资源过大,短时间内难以采集完成,或者数据有被篡改、丢失的危险,那么执法机关可以临时冻结相关数据信息。
Thee related information could also be temporarily frozen if it is too large to be collected or has the danger of being tampered 6 with or lost.
因此,要保证这些在网上传送的敏感信息不被窃取、假冒和篡改。
Therefore, we have to keep the transformed messages in the network from being stolen, spoofed and changed by the hacker.
客户及潜在客户期望我们准确维护其信息,保护信息免遭篡改和错误使用,失窃以及无未经客户授权泄露信息之虞。
Customers and potential customers expect us to maintain their information accurately, protected against manipulation and errors, secure from theft and free from unwarranted disclosure.
如果数据资源过大,短时间内难以采集完成,或者数据有被篡改、丢失的危险,那么执法机关可以临时冻结相关数据信息。 。
Thee related information could also be temporarily frozen if it is too large to be collected or has the danger of being tampered 6 with or lost.
您不可以篡改软件的原始信息,不可以声明您编写最初的软件。
The origin of this software must not be misrepresented; you must not claim that you wrote the original software.
它主要通过在媒体信息中嵌入标记信号(数字水印),为媒体信息在防伪、防篡改、认证、保障数据安全和完整性等方面提供有效的技术手段。
It can provide effective protection for digital media forgery, falsification, authentication, security and intactness by embedding a special mark (digital watermark) into the multimedia data.
大量的实验结果证明,该脆弱水印算法对篡改有极强的敏感性,且当小波参数不一致的情况下,则完全不能检测正确的水印信息。
Lots of simulation results show that the weak watermark is sensitive to the distortion of the image. When the parameter in the wavelet is wrong, the watermark cannot be detected correctly.
大量的实验结果证明,该脆弱水印算法对篡改有极强的敏感性,且当小波参数不一致的情况下,则完全不能检测正确的水印信息。
Lots of simulation results show that the weak watermark is sensitive to the distortion of the image. When the parameter in the wavelet is wrong, the watermark cannot be detected correctly.
应用推荐