Based on the description of the algorithm, experimental results and attack analysis are given.
在描述算法的基础上,给出了实验结果及攻击分析。
Experimental results and attack analysis show that the method is robust against normal image processing such as JPEG loss compression, filtering, additive noise, and cropping attacks.
实验结论和攻击测试表明,该算法对JPEG有损压缩、滤波、附加噪声、剪切等各种图像处理的攻击有较强的鲁棒性。
The experimental results and attack analysis show that the watermark algorithm is robust against some image processing operations, such as JPEG lossy compression , rotation, cropping and noise adding.
实验结果表明该水印算法具有良好的抗JPEG压缩、旋转、裁剪和加噪等常见攻击的能力。
So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.
因此,我对于工作中得出的相关数据分析结果非常的感兴趣,这些数据最近发表在赛门铁克关于攻击工具和恶意站点的报告中。
During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.
经过分析,我获取了目前使用最广泛的两种攻击工具,以下对它们进行简短说明。
This is the first time that scientists have done a systematic analysis of how genes can influence the effect of coffee on heart attack risk.
报道说,这是科学家们首次对基因如何影响咖啡对心脏病发作危险的作用进行系统的分析研究。
From packet sniffing to analysis to alerting you or an admin to possible intrusions, Snort protects your work from attack.
从包嗅探、分析一直到向您或管理员发出可能出现入侵的警报,Snort能够保护您的工作成果,使之免受攻击。
A type of statistical analysis used to study high-energy physics and stock market fluctuations could yield a new Angle of attack in the fight against the virus that causes AIDS.
一种统计方法主要用于研究高能物理和股市波动,现在有可能在人类对抗艾滋病的战役中开辟新的战场。
In this analysis, 143 participants who took calcium had a heart attack, compared with 111 who took a placebo.
经分析表明,服用钙片导致心脏病的有143名参与者,相较而言,服用安慰剂而导致心脏病的只有111名。
The virus could attack the analysis by exhausting the patience of such an analyser.
病毒就可能通过消磨此类分析器的耐性来攻击该分析。
An example of attack on the flow analysis stage was discussed in the section entitled 'promises of formal analyses'.
在‘形式分析的承诺’这个小节中讨论了一个攻击流分析阶段的例子。
Because the sensitive data is encrypted, any direct attack on the database file analysis, can only see the ciphertext.
由于敏感数据被加密,任何直接对数据库文件进行分析的攻击方式,都只能看到密文。
A further analysis on enhancing the ability to resist cropping attack is made again according to experimental results.
文中还结合实验结果对增强剪切攻击鲁棒性的技术进行了分析。
To be more secure, crypto-chips should be protected against simple power analysis attack and differential power analysis attack.
为进一步提高密码芯片的安全性,密码芯片必须防止简单能量分析和差分能量分析的攻击。
Analysis and evaluates the characteristics of typical attack scenarios from the aspects of the possibility, ability of concealment, release rate and harmfulness of the possible attacks.
从袭击发生的可能性、隐蔽性、生化制剂的释放速度和危害性这四个方面,对典型生化袭击场景的特性进行了分析和评价。
The computer system security analysis by fault tree and the network system security analysis by attack graph use the security analysis model.
针对计算机系统的安全故障树方法和网络信息系统的攻击图方法应用了这一安全分析建模工作。
Then, using packet capture mechanism to attack the data collection, analysis and recording.
然后,利用数据包捕获机制对攻击数据进行收集、分析和记录。
The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.
扩展的诚实理想分析模型不仅继承了原理论的有关性质,而且适应猜测攻击的分析。
This paper first made a systematic analysis of the correlation features between the redundant events, including attack class constraint, spacial constraint, timing constraint.
本文首先对冗余事件的关联特征进行系统的分析,包括攻击类型关联特征、空间关联特征、时间关联特征。
Based on the analysis of attack scheme, an improved proxy multi-signature scheme was proposed.
在全面分析攻击方案的基础上,构造了一种增强的代理多重签名方案。
Based on abduction inference, a method of network attack process analysis for incident response was designed.
针对事后入侵响应,提出了一种基于引理推理的攻击过程分析方法。
The security analysis shows it can prevent plaintext attack, conspiracy attack and forging attack.
安全性分析表明该方案能够防止明文攻击、合谋攻击和伪造攻击。
GSK had already submitted its own pooled analysis to the FDA, which suggested that short-term use of rosiglitazone might increase the risk of heart attack by some 30-40%.
GSK已经向FDA提交了他们自己的混合分析,认为短期服用罗格列酮可能增加约30 - 40%的心脏病发作的危险。
In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.
本论文在信息隐藏方面的主要工作就是围绕这两种应用展开的,内容涉及图像置乱、图像信息隐藏和隐藏分析和攻击技术等方面。
The frequency and complexity of network attack behaviors make securities withstand more difficult the method of analysis on network attack behaviors have been given more attention by people.
网络攻击行为的频度和复杂性使安全防御的难度越来越大。网络攻击行为分析方法因而引起人们的关注。
The honeypot took as one kind of new security tool in the attack examination, the analysis, the research, has the superior performance in particular to the unknown attack capture aspect.
蜜罐作为一种新的安全工具在攻击的检测、分析、研究,尤其是对未知攻击的捕捉方面有着优越的性能。
The honeypot took as one kind of new security tool in the attack examination, the analysis, the research, has the superior performance in particular to the unknown attack capture aspect.
蜜罐作为一种新的安全工具在攻击的检测、分析、研究,尤其是对未知攻击的捕捉方面有着优越的性能。
应用推荐