其主要思想把篡改检测和篡改定位相分离。
The main idea is to separate the tamper detection and tamper localization.
被动认证可分为来源鉴别与内容篡改检测。
Passive authentication methods can be classified into the source detection and tamper detection.
它还具有内置的篡改检测来防止数据被提取。
It also features built-in tamper detection to prevent data from being extracted.
NILFS的可能用途包括:版本控制、篡改检测、SOX遵从日志等等。
The possible use of NILFS includes, versioning, tamper detection, SOX compliance logging, and so forth.
实验结果表明该算法能够很好地实现数字图像版权保护、篡改检测和定位。
The experimental result shows this algorithm can realize copyright protection, tamper detection and localization well.
作为多媒体认证和篡改检测的一种新技术,易碎水印正得到越来越多的关注。
As an effective method for multimedia authentication and tamper detection, fragile watermarking is drawing extensive attention recently.
提出了一种基于图像块关联机制,实现图像篡改检测和恢复的脆弱水印新算法。
We propose a fragile watermarking scheme capable of image tamper detection and recovery with a block-wise dependency mechanism.
新版本还支持更多不同合作伙伴的编码器和相机,包括有篡改检测功能的相机。
The new version also supports even more encoder and camera models from various partners, including cameras with tampering detection.
应用结果表明,该检测方法对非法篡改具有高度敏感性和优秀的数据篡改检测性能。
Applied results demonstrate that this method has highly sensitive to intentional tampering and outstanding detection performance for data tamper detection.
实验表明,该方案对灰度文本图像有50%的篡改检测概率、并具有较好不可见性和一定的鲁棒性。
Experiments show that the algorithm has a tampering detecting probability 50% to the gray text image, and the invisibility and robustness works well.
为提高可恢复双水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测和恢复的安全双水印算法。
To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.
NWD-455是一款高性能1 / 3英寸的CCD网络摄像机,它优化了图像质量并具备强大篡改检测功能。
The NWD-455 is a high performance 1/3-inch CCD network camera optimized for image quality and featuring powerful tamper detection.
这意味着所有网络传输都是加密的,并且消息篡改也可以检测到。
This means that all network traffic is encrypted, and tampering with messages is also detected.
这样,能够识别签名的工具就可以有选择地为您授予软件安全特权,这是其他文件做不到的,它还可以检测代码是否被篡改过。
Tools that recognize your signature can then optionally grant your software security privileges it wouldn't otherwise have, and detect if the code has been tampered with.
IBM也有一款与之竞争的产品,还有一种产品使用射频识别芯片,芯片植入包装之中,可以检测出篡改,并实现精确追踪。
IBM has a rival offering, as well as one using radio-frequency identification (RfID) chips, which are embedded in packaging to detect tampering and allow precise tracking.
这台重要的服务器的安全措施之一是,它每天都运行Tripwire——具体地说,是较老的2.3.0版本。Tripwire是一个检测重要文件是否被篡改的安全程序。
A security precaution on this server was that every day, it ran the security program Tripwire — specifically, the older version, 2.3.0.
本文在对数字图像的一些统计特性进行研究的基础上,提出了两个检测篡改图像的算法。
Two algorithms of detecting the digital forgeries are proposed in this paper. They are based on the study of some statistical properties of digital images.
恶意篡改文件的类型属性以掩盖文件真实结构达到诱骗用户访问、回避检测、隐藏数据等目的是计算机犯罪行为中最常用的手段。
Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure, avoiding detection and hiding data is the most common computer crime means.
同时还采用了聚合篡改区域方法来完成失真检测,能够区分出恶意攻击和一般的图像处理。
This algorithm accomplishes the distortion detection by gathering the tamper areas to distinguish malicious attacks from incidental distortions.
而脆弱水印则主要用来对图像进行防篡改验证,它能够检测到所添加水印的微小变化。
Fragile watermarks are used for authentication purposes and are capable of detecting minute changes of the watermark's content.
针对一类单幅图像的复制遮盖篡改,提出一种基于快速傅立叶变换相位和幅度的自相关检测算法对篡改部位进行检测。
To detect the forged parts in a single image with copy-move attack, an autocorrelation detection method based on phase and amplitude spectrum of FFT is proposed.
介绍软件抗篡改是编写程序的艺术,使代码在没有攻击检测的情况下,不会被潜在的有恶意的攻击代码所修改。
Software tamper resistance is the art of crafting a program such that it cannot be modified by a potentially malicious attacker without the attack being detected.
本文针对该篡改技术,提出一种有效快速的检测与定位篡改区域算法。
In this paper, we describe an efficient and robust algorithm for detecting and localizing this type of malicious tampering.
所以需要通过语音内容认证方法来检测语音内容是否被篡改过。
Therefore, a speech content authentication method is needed to authenticate whether the speech content is tampered or not.
论文在完成水印的嵌入之后对它的抗攻击性进行检测,讲述了如何确定篡改区域和篡改类型的半易损水印的方法。
Papers completed the watermark embedded in it after the attacks of the anti-testing, to determine how to tamper with the regional and tampering with the type of semi-fragile watermarking method.
该算法可以检测任何修改,且能把篡改定位精确到一个像素。
The algorithm can detect any manipulations and can localize the modifications to a single-pixel level.
图像是否受到篡改,并检测出图像受到篡改的部位。最后论文分析了当前在混沌加密与图像水印研究中存在的问题,并指出了进一步的研究方向。
Finally, the thesis is concluded by pointing out some open issues on the research of chaos based encryption and image watermarking as well as highlight some further research directions.
大量的实验结果证明,该脆弱水印算法对篡改有极强的敏感性,且当小波参数不一致的情况下,则完全不能检测正确的水印信息。
Lots of simulation results show that the weak watermark is sensitive to the distortion of the image. When the parameter in the wavelet is wrong, the watermark cannot be detected correctly.
大量的实验结果证明,该脆弱水印算法对篡改有极强的敏感性,且当小波参数不一致的情况下,则完全不能检测正确的水印信息。
Lots of simulation results show that the weak watermark is sensitive to the distortion of the image. When the parameter in the wavelet is wrong, the watermark cannot be detected correctly.
应用推荐