A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication, tamper localization and recovery.
设计并实现了一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证,篡改定位和恢复。
In order to solve the problem of integrality authentication for low bit-rate video, a novel video authentication schema based on the fragile watermark is proposed.
为了解决低码率视频完整性认证问题,提出了一种基于脆弱水印的视频认证方案。
Access control technology is an important research project, it is very significant for guarantee the integrality and authentication of information.
存取控制技术的研究是信息安全领域一项重要的研究课题,它的研究对于保证信息的完整性和认证性有着重要的意义。
It can provide high strength (with key of 256bits) encryption, integrality validation, identity authentication based on PKI, and anti-replay protection for upper layer application.
它可以提供256位高强度数据加密、完整性验证、基于PKI的身份认证以及抗重播保护功能,最大限度地对上层应用提供安全保护。
Cryptography is the foundation of supporting authentication, integrality and confidentiality.
而密码学是支持认证、完整性和机密性机制的基础。
Cryptography is an important technology of information security. It can guarantees information's confidentiality, integrality and authentication.
密码学作为信息安全的重要技术,能有效保障信息的机密性、完整性和鉴别。
The hashing function is one of the basic foundations of the cryptography. It widely used in data integrality and identity authentication.
散列函数是密码学的基础要素之一,主要应用方向是数据完整性校验和身份认证技术。
The authentication techniques of image authenticity and integrality are the important research subjects of the multi-media security field.
数字图像的真实性、完整性认证技术是多媒体安全保护的重要研究课题。
The security request of security multicast is different, including identity authentication, data authentication, data integrality, key updating etc.
安全多播系统对安全的需求比较复杂,包括身份认证、数据认证、数据完整性、密钥更新等多方面需求。
The security problems of information systems include identity authentication service, access control service, data secrecy service, data integrality service, non-negation service, etc.
信息系统中的安全性问题主要包含身份认证服务、访问控制服务、数据保密服务、数据完整牲服务和不可否认服务等几个方面。
Application and data security make up of authentication, access control, security audit, data security, data integrality, data consistency and so on.
其中应用和数据安全主要包括身份认证、访问控制、数据完整性、保密性、一致性和安全审计等。
Application and data security make up of authentication, access control, security audit, data security, data integrality, data consistency and so on.
其中应用和数据安全主要包括身份认证、访问控制、数据完整性、保密性、一致性和安全审计等。
应用推荐