• In this paper, it presents a digital watermark protocol used for copy tracing.

    提出了用于盗版追踪数字水印协议

    youdao

  • In the third chapter, we first detail some watermarking attacks including watermark removal attacks, cryptographic attacks and protocol attacks.

    第三章中我们首先详细介绍了水印去除攻击密钥攻击协议攻击。

    youdao

  • But more research of the digital watermarking focus on algorithms and theoretical basis, while ignoring the design of watermark application protocol and implementation.

    但是目前对于数字水印研究集中算法理论基础方面,忽视水印应用协议实施标准设计和制定。

    youdao

  • A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.

    基于完全知识交互证明系统委托方案提出了可证明安全水印认证协议

    youdao

  • A proved secure protocol for watermark verification based on perfect zero knowledge interactive proof system and bit commitments scheme is proposed.

    基于完全知识交互证明系统委托方案提出了可证明安全水印认证协议

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定