• Furthermore, we briefly introduce some kinds of existed steganalysis methods and digital watermark attack methods.

    此外我们还简单介绍几种信息隐藏分析方法水印攻击方法。

    youdao

  • In the design of watermark encoder, through the combination of side information and watermark, our system also obtained the robustness against copy attack.

    水印编码设计上,通过将载体的个性信息水印融合,使整个系统拷贝攻击具有鲁棒性

    youdao

  • Test results show that embedding around video quality has not changed significantly, in the absence of attack detection of the watermark and the original watermark than no obvious changes.

    试验结果表明水印嵌入前后,视频质量没有显明变化攻击时检测水印信息水印信息比拟也没有显明的变化。

    youdao

  • The current text watermark algorithms are vulnerable to "formatting attack" and "saving attack".

    文本水印算法容易受到格式化存储攻击

    youdao

  • The experiment result shows that the synchronization method can synchronize the detector with the watermark perfectly and that the watermark is robust to affine transformation attack.

    实验表明,使用方法地恢复图像,有效地同步水印检测器水印信号,从而使水印仿射变换攻击具有鲁棒性。

    youdao

  • The experimental results and attack analysis show that the watermark algorithm is robust against some image processing operations, such as JPEG lossy compression , rotation, cropping and noise adding.

    实验结果表明水印算法具有良好的抗JPEG压缩旋转裁剪常见攻击的能力。

    youdao

  • Otherwise, the embedded mode of traditional watermark doesn't been adopted, which avoids the model attack problems under the traditional watermark.

    另外水印嵌入使用传统水印嵌入模式避免了传统水印嵌入模式模型攻击问题

    youdao

  • The limit that space domain only be applied in LSB under gray image of digital watermark was changed. Then, experiment showed that the method have a better adaptability to normal attack.

    灰度图像中的数字水印中,空间方法只能在LSB(最低有效位)的局限性同时实验表明常规攻击具有好的识别能力

    youdao

  • Watermark could be damage in attack, so how to improve ability of watermarking Anti-attack is one of the most important questions.

    数字水印都存在攻击可能导致破坏风险,因此如何提高水印攻击能力亟待解决的问题

    youdao

  • Dynamic graph watermark (DGW) is one of the best dynamic software watermarks. The idea of DGW is encoding the watermark into topology graph in order to be immune to semantics preserving attack.

    动态软件水印技术目前最好动态软件水印技术之一,核心思想水印信息编码拓扑图结构从而使拓扑图进行变换的保持语义攻击难以实现。

    youdao

  • To improve the security against the counterfeiting attack, this paper proposes a secure dual watermark scheme for image tamper detection and recovery.

    提高恢复水印算法抵抗伪造攻击的能力,提出一种用于图像篡改检测恢复的安全双水印算法。

    youdao

  • In order to improve performance of resistance to the geometrical attack while keep invisible, a zero-watermark algorithm for digital image based on Fourier-Millin transforming is proposed.

    为了提高几何攻击性能同时保证不可见性提出一种结合傅立叶-梅林变换和零水印概念的图像水印算法

    youdao

  • The experimental results have shown that the proposed watermark is invisible to human eyes and very robust to joint photographic experts group compression attack, crop attack and so on.

    实验结果表明算法具有良好的不可视性联合图像专家组压缩剪切、滤波攻击的能力。

    youdao

  • Therefore, problems of the multi-watermark method applied to increase the anti-attack robustness of the watermarking are discussed in this paper.

    单个数字水印算法或方案难以应付多种攻击方法的攻击,为此,文章对应用水印方法提高水印抗攻击鲁棒性问题进行探讨。

    youdao

  • The strength of the embedded watermark is image-adaptive according to the wavelets quantization noise, and combined with the error-correct code, it improved the characteristic to anti-attack.

    根据波域量化噪声自适应地确定嵌入强度结合纠错编码提高了抗攻击能力。

    youdao

  • The strength of the embedded watermark is image-adaptive according to the wavelets quantization noise, and combined with the error-correct code, it improved the characteristic to anti-attack.

    根据波域量化噪声自适应地确定嵌入强度结合纠错编码提高了抗攻击能力。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定