解释攻击 (interpretation attacks) :这种攻击在面对检测到的水印证据 时,试图捏造出种种解释来证明其无效。
基于48个网页-相关网页
Simulation results show that the system can resist interpretation attack and geometry attack very well.
仿真表明,该系统能较好地抵抗解释攻击,并对几何攻击也有很强的抵抗能力。
参考来源 - 一种结合数字认证基于SVD的数字水印系统·2,447,543篇论文数据,部分数据来源于NoteExpress
同时,对于数字水印的攻击也在不断出现,其中以解释攻击(IBM攻击)最为危险。
With the development of digital watermarking, more and more attacks on it appeared, interpretation attack(IBM attack) is the most dangerous attack of them.
为此本文详细介绍了如何利用时戳机制、单向水印机制和数字作品版权保护认证机制来避免由于解释攻击引起的无法仲裁的版权纠纷。
This article presents how to use timestamp, one-way watermarking mechanism and authentication mechanism of the copyright protection to avoid the copyright disputes from interpretation.
商业站点上每月都会发现跨站点脚本编制的攻击,并且每月都会发布解释这种威胁的报告。
Every month cross-site scripting attacks are found in commercial sites and advisories are published explaining the threat.
应用推荐