• 本文提出一种用于视频产品完整性认证实时视频水印的算法

    This paper proposes a real time watermarking algorithm in the bit domain for complete authentication.

    youdao

  • 数字图像真实性完整性认证技术多媒体安全保护重要研究课题

    The authentication techniques of image authenticity and integrality are the important research subjects of the multi-media security field.

    youdao

  • 为了解决码率视频完整性认证问题提出了基于脆弱水印的视频认证方案。

    In order to solve the problem of integrality authentication for low bit-rate video, a novel video authentication schema based on the fragile watermark is proposed.

    youdao

  • 接着总结矢量地图数据证数字水印技术研究以及矢量地图完整性认证方法的研究。

    Then this thesis summed up the research on digital watermarking technology used to protect vector maps, as well as the research on authenticating the integrity of vector maps.

    youdao

  • 针对压缩视频流完整性认证问题提出一种基于压缩传感(CS)的视频水印算法

    For the problem of integrity authentication about compressed video streams, this paper proposed a video watermarking algorithm based on Compressive Sensing (CS).

    youdao

  • 实验表明算法较高视觉质量同时修改进行准确定位,满足完整性认证水印要求

    Experimental results show that this algorithm has high visual quality, at the same time, can exactly localize the alteration, and really satisfies the requirement of complete authentication.

    youdao

  • 设计并实现一种基于分层的半脆弱数字水印算法,用于图像内容完整性认证篡改定位恢复

    A hierarchical semi-fragile digital watermarking algorithm was designed for image content integrality authentication, tamper localization and recovery.

    youdao

  • 认证阶段运用相同技术处理待检测图像,生成影子,认证算法实现图像完整性认证

    In the authentication phase, the same technology is used to the suspect images, then using the image authentication algorithm to achieve integrity certification.

    youdao

  • 由于数字签名作为具有消息完整性认证可鉴别性、不可否认具有加密功能技术应运而生。

    Positively because of this, the digital signature is used as a kind of technique having function of the new integrity authentication, identification, non-repudiation and encryption.

    youdao

  • 基于变换双重数字水印方法,通过嵌入鲁棒水印脆弱水印实现图像内容版权保护完整性认证的双重目的

    Double Digital Watermarking Method based on Transform Domain has realized the double aims of the copyright protection and the integrity authentication of image content.

    youdao

  • 以前NFS版本都没有这种能力因此不能保护质量数据完整性认证要求加密类型进行协商

    Past NFS versions did not have this ability and therefore could not negotiate for the quality of protection, data integrity, the requirement for authentication, or the type of encryption.

    youdao

  • SSL协议支持认证数据完整性机密性

    SSL protocols support authentication, data integrity, and confidentiality.

    youdao

  • 通过增强访问控制身份标识认证提高UDDI数据完整性从而使安全性问题得以解决。

    Security will be addressed by improving UDDI data integrity through enhanced access control, identity, and authentication.

    youdao

  • 这个安全框架NFSv4可以提供服务器客户机之间认证完整性隐私机制

    This security framework allows NFSv4 to provide mechanisms for authentication, integrity, and privacy between clients and servers.

    youdao

  • 对于WebServices绑定我们认证完整性机密性策略

    LR: For the Web Services bindings, we have enabled authentication, integrity and confidentiality policies.

    youdao

  • 算法信息安全领域主要应用验证数据完整性签名认证

    In the field of communication security, the main applications of the hash function are data integrity verification and signature authentication.

    youdao

  • 安全电话系统提供了完整安全服务保密性、身份认证完整性、抗抵赖性等。

    Secure Telephone System provides integrate security services: confidentiality, authority certification, integrality and anti-denying.

    youdao

  • 可以各种网络应用提供身份认证信息机密性完整性以及交易不可否认安全服务

    It can provide many network applications with all kinds of security service, such as authentication, confidentiality, information integrity and non-repudiation of transaction.

    youdao

  • 众所周知加密算法认证完整性控制基础,因此我们还介绍选用加密算法原则

    As we know, the encryption is the footstone of authentication and integrity control, so we introduce the principle of choosing encryption algorithms.

    youdao

  • 数字签名已经信息安全身份认证数据完整性、不可否认性以及匿名等方面发挥重要作用

    Digital signature has been playing a very important role in the fields of information security, identity authentication, data integrity, nonrepudiation and anonymity, etc.

    youdao

  • 普通数字签名方案相比,除了具有认证性、数据完整性外还具有保密性接收方隐私性

    Compared with common digital signature scheme, it has authentication, secrecy, data integrity and privacy of the receiver.

    youdao

  • 目前数字水印成为多媒体版权认证完整性保护有效手段

    At present, watermarking technique has been a kind of effective means to multimedia copyright authentication and its integrity protection.

    youdao

  • 存取控制技术研究信息安全领域一项重要的研究课题研究对于保证信息完整性认证有着重要的意义。

    Access control technology is an important research project, it is very significant for guarantee the integrality and authentication of information.

    youdao

  • 实现信息系统安全目标,需要系统能够提供相关安全服务身份标识认证服务、授权与访问控制服务、非否认服务、机密性服务、完整性服务。

    Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system.

    youdao

  • 如果保护消息完整性,你应该认证标签包含这些

    If you want to protect the integrity of the message, you should however include those values in the authentication tag.

    youdao

  • 可以提供256强度数据加密完整性验证基于PKI身份认证以及重播保护功能,最大限度地上层应用提供安全保护。

    It can provide high strength (with key of 256bits) encryption, integrality validation, identity authentication based on PKI, and anti-replay protection for upper layer application.

    youdao

  • 改进后网络数学计算框架有效地提供计算数据机密性、完整性用户认证安全功能。

    The resulting secure Mathematical Computation Protocol can then provide crypto-graphic authentications, data privacy and integrity.

    youdao

  • 设计过程中通过对用户认证数据加密机制来确保系统安全性数据完整性

    In the design process, system security and data integrity are ensured by user authentication and encryption respectively.

    youdao

  • 数字签名技术身份认证数据完整性等方面具有其它技术无法替代作用,在信息安全领域得到广泛的应用

    The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.

    youdao

  • 数字签名技术身份认证数据完整性等方面具有其它技术无法替代作用,在信息安全领域得到广泛的应用

    The digital signatures have many applications in a lot of field for it cannot be substituted by other techniques in information security, including authentication, data integrity, and non-repudiation.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定