助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   篡改检测 的翻译结果: 查询用时:0.695秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
电信技术
更多类别查询

图标索引 历史查询
 

篡改检测
相关语句
  tamper detection
     Tamper detection and self recovery algorithm of color image
     彩色图像的篡改检测及自恢复算法
短句来源
     The paper mainly research on digital signature used in image authentication, and three schemes are proposed which get good results in improving probability and precision of tamper detection and resume image approximately.
     目前用于图像认证的方法主要有基于数字签名的图像认证和基于数字水印技术的图像认证。 本文主要研究基于数字签名的图像认证技术,论文中提出了三种认证方案,这三个方案分别在提高图像篡改检测概率、篡改定位精度及篡改恢复能力等方面取得了良好的结果。
短句来源
     The scheme can distinguish compression from tamper, locate tamper and get high probability of tamper detection.
     该方案不仅可以区分正常的压缩和篡改,而且可以进行篡改准确定位,同时具有很高的篡改检测概率。 方案的实现算法简单,安全性高。
短句来源
     It improves the reliability of algorithm by conducting the tamper detection in both spatial domain and frequency domain.
     实验表明,这种脆弱水印技术能够在空间域和频率域两方面共同进行篡改检测,与传统方法相比,具有更高的可靠性。
短句来源
     second, use the Hamming weight as a generation function to get the signature. Theory and simulation prove that scheme is efficient to improve the precise of tamper detection and location.
     其次利用这一特性作为数字签名的产生函数提出了一种新的基于数字签名的图像认证方案,理论及实验仿真证明了该方案可有效提高图像篡改检测概率及篡改定位精度,且具有良好的抗噪声性能。
短句来源
更多       
  “篡改检测”译为未确定词的双语例句
     Fragile Audio Watermarking Algorithm for Telltale Tamper Proofing and Authentication
     用于篡改检测及认证的脆弱音频水印算法
短句来源
     Audio re-sampling detection in audio forensics based on EM algorithm
     基于期望最大化算法的音频取证中的篡改检测
短句来源
     Applications for digital watermarking include copyright protection, fingerprinting, authentication, copy control, tamperdetection, and data hiding applications such as broadcast monitoring.
     水印的应用主要包括版权保护,指纹,认证,拷贝控制,篡改检测和数据隐藏(例如广播监控)。
短句来源
     Digital watermarking technique is an effective protection technique, which embeds copyright information into multimedia products in order to authenticate the ownership or transmit to the available information.
     数字水印技术是通过特定的算法将版权信息嵌入到多媒体数据中,且不影响原媒体的使用价值,通过专用的检测器可以提取这些嵌入的信息,从而实现版权保护、篡改检测等应用。
短句来源
     Statistical Methods for Digital Forensics
     基于统计的数字图像篡改检测方法
短句来源
更多       
  相似匹配句对
     Tamper detection and self recovery algorithm of color image
     彩色图像的篡改检测及自恢复算法
短句来源
     Statistical Methods for Digital Forensics
     基于统计的数字图像篡改检测方法
短句来源
     spectroscopy detection.
     能谱检测
短句来源
     Robust-M Detection
     Robust-M检测
短句来源
查询“篡改检测”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  tamper detection
Moreover, the probabilities of tamper detection and false detection are deduced under region tampering and collage attack separately.
      
Owing to the diminishing of false detection and the holding of tamper detection, we improve the accuracy of localization in the authentication process.
      
The tamper detection can identify the tampered region of the received watermarked image.
      
Tamper Detection and Recovery for Medical Images Using Near-lossless Information Hiding Technique
      
In this paper, we proposed two methods to tamper detection and recovery for a medical image.
      
更多          
  alteration detection
Thus, they can be used as evidence for image source identification and alteration detection.
      
Another important point concerns microsatellite alteration detection that could be regarded with strong precaution.
      
Finally, in the Master Plan Alteration Detection use-case, problems that might alter the master plan are detected.
      


As an effective method for multimedia authentication and tamper detection,fragile watermarking is drawing extensive attention recently.In this paper,we propose a novel fragile watermarking scheme based on HVS in DWT domain.By use of a specifical modulation,we embed the mark into the DWT coefficients of the original image.The features of proposed algorithm are as follows: i)The algorithm constructs a pyramid structure of the watermark for multi-resolution tamper detection; ii)According to the visual model,the...

As an effective method for multimedia authentication and tamper detection,fragile watermarking is drawing extensive attention recently.In this paper,we propose a novel fragile watermarking scheme based on HVS in DWT domain.By use of a specifical modulation,we embed the mark into the DWT coefficients of the original image.The features of proposed algorithm are as follows: i)The algorithm constructs a pyramid structure of the watermark for multi-resolution tamper detection; ii)According to the visual model,the algorithm modifies the coefficients to reduce the perceptible distortion; iii)The algorithm presents a new scheme for tamper detection by using image fusion.We propose several rules to distinguish the type of tamper between mild distortion and severe distortion.The experimental results demonstrate that the watermarks generated with the proposed algorithm can give the precise result of tamper detection when the image has been suffered from malicious tamper while tolerating JPEG lossy compression to a certain extent.

作为多媒体认证和篡改检测的一种新技术 ,易碎水印正得到越来越多的关注 .基于小波变换 ,结合量化调制过程 ,本文提出了一个易碎水印算法 .该算法具有以下特点 :( 1)构造水印金字塔 ,便于实现水印的多分辨率检测 ;( 2 )结合视觉特性量化调制 ,尽可能减小视觉失真 ;( 3 )结合图像融合技术的多分辨率检测 ,使检测结果更准确 ;( 4)抵抗一定程度的JPEG有损压缩 .为了实现篡改的检测 ,本文给出了一个攻击判别方案 ,以区分恶意攻击和偶然攻击 .实验表明 ,嵌入的水印在脆弱性和鲁棒性上达到了较好的统一 ,能够抵抗一定程度的压缩而不影响篡改检测的精确性

A novel self-embedding fragile watermarking technique is proposed for image integrity authentication, where image-dependent uncertainty is introduced to overcome the security problem existing in most algorithms. This purpose is implemented by using an image-dependent key that is obtained by combining image features with one camera key. The problem of key management is also solved because of the uniqueness of camera key. In watermark embedding, image message is used as the fragile watermark so that no reference...

A novel self-embedding fragile watermarking technique is proposed for image integrity authentication, where image-dependent uncertainty is introduced to overcome the security problem existing in most algorithms. This purpose is implemented by using an image-dependent key that is obtained by combining image features with one camera key. The problem of key management is also solved because of the uniqueness of camera key. In watermark embedding, image message is used as the fragile watermark so that no reference watermark is needed in authentication. Performance analysis is given, which shows that larger probability of tamper detection can be achieved when larger amount of image message is embedded. Possible attacks are also analyzed and the probabilities of successful attack and detection are given respectively. Finally, the experimental results are presented to demonstrate its effectiveness.

提出了一种新颖的自嵌入易损水印技术用于图像的完整性认证 提出引入基于图像的不确定性来克服其他算法中存在的安全缺陷 通过结合图像特征及相机密钥来产生基于图像的密钥来实现这一目的 相机密钥的惟一性解决了密钥的管理问题 算法把图像本身的信息作为水印嵌入 ,认证时可直接进行而不需要其他的水印参照信息 给出了性能分析 ,表明当嵌入的信息量较大时可以得到较高的篡改检测概率 分析了可能的攻击方式并给出了相应的攻击概率和检测概率 实验结果表明该算法是有效的

With the rapid growth of network, the authentication for digital information has attracted much scientific and commercial attention. A novel semi-fragile digital image watermarking algorithm, which is based on JPEG lossy compression, is proposed in this paper. Simulation experiments prove that it will not degrade the objective and subjective quality of original images, and robustness is showed to JPEG lossy compression. The scheme can be used to the detection of manipulation and image content authentication...

With the rapid growth of network, the authentication for digital information has attracted much scientific and commercial attention. A novel semi-fragile digital image watermarking algorithm, which is based on JPEG lossy compression, is proposed in this paper. Simulation experiments prove that it will not degrade the objective and subjective quality of original images, and robustness is showed to JPEG lossy compression. The scheme can be used to the detection of manipulation and image content authentication verification.

本文基于JPEG有损压缩提出了一种半脆弱性数字图像水印算法。实验测试表明,所提出的算法不会明显影响图像的主客观质量,对JPEG有损压缩具有一定的顽健性,可以有效地进行篡改检测,达到检测和标示图像内容真实性的目的。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关篡改检测的内容
在知识搜索中查有关篡改检测的内容
在数字搜索中查有关篡改检测的内容
在概念知识元中查有关篡改检测的内容
在学术趋势中查有关篡改检测的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社