安全调查人员最近证明,利用MD5算法允许他们伪造可用的证书。
Security researchers have recently demonstrated exploits against the MD5 algorithm which allowed them to forge usable certificates.
针对数字图像取证中一类常见的复制粘贴图像伪造,本文提出了一种基于小波变换和奇异值分解的检测算法。
Aiming at a common copy-paste forgery in the research field of digital image forensics, this paper proposes a detection approach based on wavelet transform and singular value decomposition.
通过在包含同质或均匀区域的彩色伪造图像中的实验,进一步验证了本算法的有效性。
Experimental results on several forged images with various homogeneous or uniform regions were presented to demonstrate the effectiveness of the proposed algorithm.
为提高可恢复双水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测和恢复的安全双水印算法。
To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.
用最大距离可分码构造了一个理想门限体制,该体制中的秘密恢复算法可以正确地恢复秘密,并可检测出伪造的秘密份额,确定伪造者的身份。
An ideal threshold scheme is constructed from Maximum Distance Separable (MDS) codes, the recovery algorithm in this scheme can detect cheating, recover the correct secret and identify cheaters.
提出了ECC盲签名算法,并应用到安全数字时间戳服务中,从而解决了安全数字时间戳服务中时间戳的伪造问题。
An algorithm on ECC blind signature time-stamping is proposed. The algorithm, which is applied in the field of secure digital time-stamping service, solves time-stamping forge problem.
提出了ECC盲签名算法,并应用到安全数字时间戳服务中,从而解决了安全数字时间戳服务中时间戳的伪造问题。
An algorithm on ECC blind signature time-stamping is proposed. The algorithm, which is applied in the field of secure digital time-stamping service, solves time-stamping forge problem.
应用推荐