助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   提取攻击 在 计算机软件及计算机应用 分类中 的翻译结果: 查询用时:1.257秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
电信技术
互联网技术
更多类别查询

图标索引 历史查询
 

提取攻击    
相关语句
  extracting attack
    The present paper point out that extracting attack, which is essentially a special kind of cryptanalysis, belongs to the crossed field of cryptanalysis and steganalysis, and can be realized by combining the thoughts and techniques of the two fields. Based on this point of view, we did groping research on the theory and methods of extracting attack, and got the following results.
    本文提出对隐写术的“提取攻击”本质上是一种特殊的密码分析,它属于密码分析与隐写分析的交叉领域,需要结合二者的技术来实现,并基于此思路对“提取攻击”作了理论与方法上的探索性研究,主要完成了以下几方面的工作:
短句来源
  extracting attack
    The present paper point out that extracting attack, which is essentially a special kind of cryptanalysis, belongs to the crossed field of cryptanalysis and steganalysis, and can be realized by combining the thoughts and techniques of the two fields. Based on this point of view, we did groping research on the theory and methods of extracting attack, and got the following results.
    本文提出对隐写术的“提取攻击”本质上是一种特殊的密码分析,它属于密码分析与隐写分析的交叉领域,需要结合二者的技术来实现,并基于此思路对“提取攻击”作了理论与方法上的探索性研究,主要完成了以下几方面的工作:
短句来源
  extracting attack
    The present paper point out that extracting attack, which is essentially a special kind of cryptanalysis, belongs to the crossed field of cryptanalysis and steganalysis, and can be realized by combining the thoughts and techniques of the two fields. Based on this point of view, we did groping research on the theory and methods of extracting attack, and got the following results.
    本文提出对隐写术的“提取攻击”本质上是一种特殊的密码分析,它属于密码分析与隐写分析的交叉领域,需要结合二者的技术来实现,并基于此思路对“提取攻击”作了理论与方法上的探索性研究,主要完成了以下几方面的工作:
短句来源
  extracting attack
    The present paper point out that extracting attack, which is essentially a special kind of cryptanalysis, belongs to the crossed field of cryptanalysis and steganalysis, and can be realized by combining the thoughts and techniques of the two fields. Based on this point of view, we did groping research on the theory and methods of extracting attack, and got the following results.
    本文提出对隐写术的“提取攻击”本质上是一种特殊的密码分析,它属于密码分析与隐写分析的交叉领域,需要结合二者的技术来实现,并基于此思路对“提取攻击”作了理论与方法上的探索性研究,主要完成了以下几方面的工作:
短句来源

 

查询“提取攻击”译词为其他词的双语例句

 

查询“提取攻击”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  extracting attack
However, very few of them provide the capability of automatic extracting attack strategies from alerts.
      
Some techniques for extracting attack strategies have been proposed in recent years, but they normally require defining a larger number of rules.
      
The recent trend of research in this area is towards extracting attack strategies from raw intrusion alerts.
      
  extracting attack
However, very few of them provide the capability of automatic extracting attack strategies from alerts.
      
Some techniques for extracting attack strategies have been proposed in recent years, but they normally require defining a larger number of rules.
      
The recent trend of research in this area is towards extracting attack strategies from raw intrusion alerts.
      
  extracting attack
However, very few of them provide the capability of automatic extracting attack strategies from alerts.
      
Some techniques for extracting attack strategies have been proposed in recent years, but they normally require defining a larger number of rules.
      
The recent trend of research in this area is towards extracting attack strategies from raw intrusion alerts.
      
  extracting attack
However, very few of them provide the capability of automatic extracting attack strategies from alerts.
      
Some techniques for extracting attack strategies have been proposed in recent years, but they normally require defining a larger number of rules.
      
The recent trend of research in this area is towards extracting attack strategies from raw intrusion alerts.
      
  其他


An active steganalysis approach aiming at some steganographic algorithms of spatial LSB insertion is presented in this paper.This approach based on cryptanalysis works in the circumstance of a cover image used repeatly.Results of experiment to "hide and seek" are provided to prove that stego key can be found effectively.

该文针对图像空域LSB替换的隐写算法,在载体被重复使用的条件下,运用密码学思想对载体进行提取攻击,给出了一种主动隐写分析方法。针对“hideandseek”的提取试验结果表明,该方法可有效地恢复隐写密钥。

 
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关提取攻击的内容
在知识搜索中查有关提取攻击的内容
在数字搜索中查有关提取攻击的内容
在概念知识元中查有关提取攻击的内容
在学术趋势中查有关提取攻击的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社