• Eventually, Mr Sharma expects to see Xerox scanners and copiers with data-hiding functions built into them.

    ECONOMIST: MONITOR

  • With reversible data-hiding, however, photographic evidence could be watermarked and secured from tampering the moment the shutter is pressed.

    ECONOMIST: MONITOR

  • The data-hiding technique neatly fits within the image, and all the authentication tasks are localised, notes Guarav Sharma of Xerox.

    ECONOMIST: MONITOR

  • But as Mr Celik outlines the possible applications for reversible data-hiding, it becomes obvious why preserving image integrity is so critical.

    ECONOMIST: MONITOR

  • The United States army has expressed an interest in the data-hiding algorithms for combining extremely high-resolution reconnaissance photographs with authentication security.

    ECONOMIST: MONITOR

  • Reversible data-hiding offers a clever solution.

    ECONOMIST: MONITOR

  • This could result in the compromise of technologies that could be used, for example, in anti-submarine warfare and will afford them data (detailed imagery of underwater access routes, off-shore hiding places, etc.) that could be used to facilitate attacks on this country.

    CENTERFORSECURITYPOLICY: President Bush tells base to ��get LOST��

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定