然后,像所有接下来的加密消息一样,我们要确保解密后的内容没有被篡改。
Then, like all future encrypted messages, we need to make sure the decrypted contents haven't been tampered with.
然而,最常见的一个需求是确保应用程序的用户和提供程序之间的HTTP通信的内容是安全的,不会被篡改。
However, one of the most common requirements is to ensure that the content of the HTTP communication between the user and the provider of the application is safe from tampering.
使用XML签名可以确保消息确实来自声称的发起者,并且消息内容在传输过程中没有被篡改。
Using XML signatures gives you guarantees that messages are really from the claimed originator and that the message content has not been tampered with in transit.
消息摘要解决了篡改问题,消息摘要是消息内容的定长数字表示。
Tampering is addressed by a message digest, which is a fixed size numeric representation of the contents of a message.
基于DSig的协议有个很主要的优势——断定身份的同时还能创建消息内容的防篡改信封,这两个功能通常都要求同时出现。
One of the key advantages of DSig-based protocols is the ability to both assert identity and create a tamper-proof envelope of the content of the message which are often both required together.
交换的消息可以防止篡改,所以没有第三方能够更改内容或者对任何一方造成损害。
The messages exchanged are tamper-proof so that no third party can change the content and cause harm to either party.
如果你篡改了医改方案的内容,我们会把你开掉,我也不会接受把维持现状作为一种解决方案。
If you misrepresent what's in the plan, we'll call you out. And I will not accept the status quo as a solution.
而纪录片的制片人通常会强调‘禁止演绎’,因为他们不希望内容被篡改,但他们会允许商业使用,这样电影院里就可以播放他们的作品。
Documentary producers often say 'no derivatives' because they don't want the story to change, but will allow commercial use so that movie theatres can show their work.
遗嘱被篡改的,篡改的内容无效。
Where a will has been tampered with, the affected parts of it shall be void.
实验分析可以看出,算法对各种常用的内容保留操作(重采样、高斯白噪声、压缩等)具有较强的鲁棒性,而对恶意篡改非常敏感。
Experiments show that the algorithm is robust against several operations, such as resampling, white noise addition, compression and so on, and is sensitive to malicious tampering.
验证图像时需同时通过与摘要的对比以及与水印特征的对比来确定内容是否被篡改。
Image authentication needs to contrast with the digest and watermark character to confirm whether the content is tampered.
为了能够区分偶然攻击与恶意篡改,半脆弱水印需要对一般的内容保护图像操作有一定的鲁棒性。
In order to differentiate incidental attacks and malicious attacks, semi-fragile watermark must be robust against content-protection image processing.
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。
A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication, tamper localization and recovery.
数字水印是多媒体版权保护和内容防篡改的重要手段之一。
Digital watermarking is a key technique for copyright protection and content slight change detection for a multimedia document.
验证图像时,需同时验证光滑特征和边缘特征,以确定图像内容是否被篡改。
When the image is verified, the smooth character and edge character are compared to confirm whether the content has been tampered.
所以需要通过语音内容认证方法来检测语音内容是否被篡改过。
Therefore, a speech content authentication method is needed to authenticate whether the speech content is tampered or not.
“这些事是乱编的,是(别人)故意制造的假象,它来自第三方服务器的过时材料,被窃取和篡改的私人邮件内容又被断章取义,”她在一份声明中表示。
"This story is based on outdated material taken out of context from hacked and doctored private emails from a third party server and gives a deliberately inaccurate picture," she said in a statement.
被动认证可分为来源鉴别与内容篡改检测。
Passive authentication methods can be classified into the source detection and tamper detection.
XML参数篡改,注射或参数非法脚本内容为XML。
XML parameter Tampering -injection of illegitimate scripts or content into XML parameters.
从技术上防止数字内容的非法复制、篡改、假冒,使用户必须得到授权后才能使用数字内容。
It prevented the digital content from illegal duplication, tampers with, pretends from the technology, it makes the user to have to be under the authorization before using the digital content.
实验结果表明,算法能够对视频内容进行验证并实现篡改定位,且对MPEG-4压缩具有鲁棒性。
The experimental results show that the proposed algorithm is able to authenticate the video contents and detect the tamper localization, and it is robust for MPEG-4 compression.
实验结果表明,算法能够对视频内容进行验证并实现篡改定位,且对MPEG-4压缩具有鲁棒性。
The experimental results show that the proposed algorithm is able to authenticate the video contents and detect the tamper localization, and it is robust for MPEG-4 compression.
应用推荐