• Theoretical analysis and simulated experiment show that, the scheme has excellent performances against attacks, in particular statistical attack, differential attack and chosen plain image attack.

    理论分析仿真实验表明,本文提出的算法具有较高的安全性能特别是统计攻击差分攻击和选择明文攻击能力方面具有很好的攻击性能。

    youdao

  • With each attack, no matter what the circumstances, Australia's image takes another blow.

    次发生袭击事件无论中间曲折到底如何澳洲形象一次次的受到打击。

    youdao

  • The image watermarking algorithm design and the attack way are opposite to and promotional of each other.

    图像水印算法设计攻击技术互相促进对立面

    youdao

  • They reject or attack groups that somehow threaten their group's grandiose image.

    他们排斥攻击那些不知怎么就威胁到群体伟大形象的其他群体

    youdao

  • A boxing, to mimic the movement of the snake image, melting into the attack and the main features.

    拳术一种模仿运动形象技击为主要特点

    youdao

  • The latest research on watermarking attack indicates that the robust evaluation used by image watermarking systems is incomplete as yet.

    最新的数字水印攻击研究表明至今为止图像水印系统使用鲁棒性评价不完善的。

    youdao

  • Experimental results show that the algorithm maintains the quality of the original image and is robust to non-geometric attack and loss compression.

    实验表明算法较好地保持原始图像品质几何攻击有损压缩具有较好的稳健性。

    youdao

  • To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.

    提高恢复水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测恢复的安全双水印算法。

    youdao

  • It's difficult to detect blindly the image rotation Angle in blind watermarking under geometry attack.

    几何攻击检测数字水印难点图像旋转角度检测。

    youdao

  • That can ensure the one to one mapping relationship between the feature set and the image, and avoid the counterfeit attack.

    可以保证特征图像之间一一映射关系避免伪造攻击。

    youdao

  • Pointing out the limitation of the image authentication algorithm based on dividing blocks and give the reason why collage attack can be successful.

    指出基于分块图像认证方法存在缺陷以及共谋攻击得以成功的原因

    youdao

  • In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.

    论文信息隐藏方面主要工作就是围绕两种应用展开,内容涉及图像乱、图像信息隐藏隐藏分析和攻击技术等方面。

    youdao

  • Experimental results and attack analysis show that the method is robust against normal image processing such as JPEG loss compression, filtering, additive noise, and cropping attacks.

    实验结论攻击测试表明算法对JPEG有损压缩滤波附加噪声、剪切各种图像处理的攻击有较强的棒性。

    youdao

  • The experimental results show that this method are robust against JPEG compression image processing and attack such as noise, filtering, cropping etc.

    实验结果表明提出的算法抵抗JPEG压缩攻击能力,并且噪声滤波、剪切等图像处理操作也取得了良好的鲁棒性。

    youdao

  • To detect the forged parts in a single image with copy-move attack, an autocorrelation detection method based on phase and amplitude spectrum of FFT is proposed.

    针对一类单幅图像的复制遮盖篡改提出一种基于快速傅立叶变换相位幅度自相关检测算法篡改部位进行检测

    youdao

  • Complaining is an attack on your self-image... you are denying your personal Power.

    抱怨自我形象的攻击否认自己个人力量。

    youdao

  • The experimental results and attack analysis show that the watermark algorithm is robust against some image processing operations, such as JPEG lossy compression , rotation, cropping and noise adding.

    实验结果表明水印算法具有良好的抗JPEG压缩旋转裁剪常见攻击的能力。

    youdao

  • In order to improve performance of resistance to the geometrical attack while keep invisible, a zero-watermark algorithm for digital image based on Fourier-Millin transforming is proposed.

    为了提高几何攻击性能同时保证不可见性提出一种结合傅立叶-梅林变换和零水印概念的图像水印算法

    youdao

  • To overcome well-connected attack in fragile watermarking, a novel fragile watermarking method based on chaotic system and image content was proposed.

    针对脆弱水印方案的“伪认证攻击”问题,提出基于混沌图像内容的脆弱水印方案。

    youdao

  • The limit that space domain only be applied in LSB under gray image of digital watermark was changed. Then, experiment showed that the method have a better adaptability to normal attack.

    灰度图像中的数字水印中,空间方法只能在LSB(最低有效位)的局限性同时实验表明常规攻击具有好的识别能力

    youdao

  • The experimental results have demonstrated that this algorithm can locate the tampered area as well as detecting "collage-attack" to the watermarked image.

    实验结果表明算法不仅具有良好定位篡改区域功能,而且能够有效地克服“拼贴攻击”。

    youdao

  • Level 2 - Gives a 10 chance to evade attacks and increases Juxtapose's image generation by 4. Gives Juxtapose images a 5 chance to duplicate themselves on an attack.

    二级-幻影长矛手能以10几率闪避攻击提高4幻象生成几率,同时,幻象攻击5几率制造幻象。

    youdao

  • Level 2 - Gives a 10% chance to evade attacks and increases Juxtapose's image generation by 4%. Gives Juxtapose images a 5% chance to duplicate themselves on an attack.

    二级-幻影长矛手能以10%的几率闪避攻击提高4%幻象生成几率,同时,幻象攻击中有5%的几率制造幻象。

    youdao

  • The strength of the embedded watermark is image-adaptive according to the wavelets quantization noise, and combined with the error-correct code, it improved the characteristic to anti-attack.

    根据波域量化噪声自适应地确定嵌入强度结合纠错编码提高了抗攻击能力。

    youdao

  • The image above is a melee attack with 3 sections [start, loop, and end].

    上面图片一个拥有部分攻击动画【开始循环结束】。

    youdao

  • The image above is a melee attack with 3 sections [start, loop, and end].

    上面图片一个拥有部分攻击动画【开始循环结束】。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定