给出了应用该算法的具体步骤,并分析了攻击算法的计算复杂性。
The concrete step and complexity of the attack algorithm is given.
给出了应用该算法的具体步骤,并分析了攻击算法的计算复杂性。
Researches on the Algorithm and Software of the Complexity Analysis of Electrical Noise;
实验表明,该算法能够很好地抵抗局部剪切的攻击。
Experimental results show that, this algorithm is able to resist local cropping attack.
在描述算法的基础上,给出了实验结果及攻击分析。
Based on the description of the algorithm, experimental results and attack analysis are given.
文本水印算法容易受到格式化和存储攻击。
The current text watermark algorithms are vulnerable to "formatting attack" and "saving attack".
文本水印算法容易受到格式化和存储攻击。
The current text watermark algorithms are vulnerable to "formatting attack" and "saving attack".
应用推荐