key-collusion attack 共谋密钥攻击
anti-collusion attack 抗共谋攻击
content-collusion attack 共谋重放攻击
collusion attack freeness 抗合谋攻击
collusion key attack 共谋密钥攻击
First of all, the mathematical model of linear collusion attack is given. And according to the model, the design rules of video watermarking for resistance to linear collusion are put forward.
首先通过分析线性共谋攻击的数学模型,建立了有效抵抗线性共谋攻击的视频水印设计规则,并根据该规则提出了能够有效抵抗线性共谋攻击的视频水印方案。
参考来源 - 安全视频水印关键技术与应用研究Malicious node uses protocol loophole launching collusion attack, it badly affects the normal operation of network.
恶意节点利用协议漏洞发起合谋攻击,将严重影响网络的正常运行。
参考来源 - Ad Hoc网络中合谋攻击研究综述The technique not only has the robustness and imperceptions ability of watermarking, but also can anti collusion attack.
该方法除了具有一般数字水印技术所具备的健壮性与不可见性外,还对串谋攻击具有一定抵御能力,可以作为数字媒体拷贝跟踪的一种手段。
参考来源 - 数字水印健壮性研究Analysis showed that the new scheme could prevent the collusion attack launched by quitted members,and was more suitable for complicated and dynamic environment of VE.
分析表明,该方案可以防范那些已退出联盟的恶意成员对系统的联盟攻击,适合复杂动态的虚拟企业环境。
参考来源 - 抗联盟攻击的虚拟企业安全交互认证方案Finally, a compressed-domain video watermarking algorithm robust against self-collusion attack is proposed by utilizing the new characteristics of H.264/AVC.
第三,针对H.264/AVC编码标准的新特性,提出一种可抵抗共谋攻击的H.264/AVC压缩域视频水印算法。
参考来源 - H.264/AVC视频流的信息隐藏技术研究·2,447,543篇论文数据,部分数据来源于NoteExpress
But the scheme 1 does not provide asymmetry (non-repudiation) and the scheme 2 does not resist collusion attack.
但方案1不能够提供非对称性(防抵赖性),方案2不能够抵抗共谋攻击。
The standard deviation and concentration ratio of local evaluation was used to identify and control collusion attack.
采用基于局部评价标准差、局部评价集中度的方法识别和抑制共谋攻击;
Improved schemes have advantages of nonrepudiation, using insecure channel, against the public key substitution attack and collusion attack etc.
改进后的方案具有不可否认性,不使用安全信道,以及抵抗公钥替换攻击和合谋攻击等优点。
应用推荐