助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   抗合谋 的翻译结果: 查询用时:0.019秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
更多类别查询

图标索引 历史查询
 

抗合谋
相关语句
  anti-collusion
     Research on Anti-Collusion Digital Fingerprinting Technology
     抗合谋数字指纹技术研究
短句来源
     Anti-collusion Fingerprinting Algorithm for Images Based on Human Visual Model
     基于视觉模型的抗合谋数字指纹
短句来源
     Meanwhile,it proves that IPP codes have better tracing algorithm than TA codes,so as to reduce the tracing time during the anti-collusion process.
     同时,还证明了所构建IPP码具有相对TA码更为高效的跟踪算法,从而在抗合谋过程中可以节省跟踪非法指纹的时间。
短句来源
     An Anti-collusion Digital Fingerprint Coding Scheme
     一种抗合谋的数字指纹编码方案
短句来源
     A Robust Anti-collusion Coding in Digital Fingerprinting System
     一种稳健的抗合谋数字指纹编码
短句来源
更多       
  “抗合谋”译为未确定词的双语例句
     New threshold signature schemes withstanding the conspiracy attack were proposed by Jan and Gan, respectively.
     Jan等和Gan分别提出了抗合谋攻击的门限签名方案。
短句来源
     The fingerprints are coded by Turbo code before embedding and added to the wavelet domain which is suitable for the visual human visual. In the receiving end,the Turbo iterative decoding is adopted to extract the fingerprints.
     该算法将Turbo码技术应用于数字指纹系统中,将B IBD抗合谋码和Turbo码纠错编码结合起来,在指纹嵌入之前对指纹进行Turbo编码,然后把指纹嵌入到符合人眼视觉特性的小波域中,在接收端采用Turbo码迭代译码算法对指纹序列进行提取。
短句来源
     's and Gan's (t,n) threshold signature scheme withstanding the conspiracy attack are insecure, respectively.
     (1999)和Gan(2004)提出的具有抗合谋攻击的(t,n)门限数字签名方案;
短句来源
     Camenisch's provably secure coalition-resistant group signature scheme based on discrete logarithm problem and A.
     Camenisch基于离散对数问题的能抗合谋攻击的群签名方案为基础,根据A.
短句来源
     By assigning each user his corresponding private key proxy quantity, the collusion-resistance security of the proposed scheme is enhanced.
     在分配用户密钥时,通过分配用户密钥相应的密钥代理量,增强了方案的抗合谋攻击安全性。
更多       
  相似匹配句对
     Anti-H.
     H .
短句来源
     Intervention with anti-H.
     H.
短句来源
     Research on Anti-Collusion Digital Fingerprinting Technology
     合谋数字指纹技术研究
短句来源
     Anti-collusion Fingerprinting Algorithm for Images Based on Human Visual Model
     基于视觉模型的合谋数字指纹
短句来源
     Audit Collusion Model and AM Mechanism
     审计“合谋”模型和AM机制
短句来源
查询“抗合谋”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  anti-collusion
Design and Analysis of High-Capacity Anti-Collusion Hiding Codes
      
A new methodology for the design of high-capacity anti-collusion hiding codes in a large-scale fingerprint-based traitor tracing system is proposed in this work.
      
By exploiting this analogy, we develop an anti-collusion code called OSIFT (Orthogonal Spreading followed by the Inverse Fourier Transform).
      
In this paper we have proposed anti-collusion codes, which provide collusion resistance for fingerprinting multimedia.
      
In this paper, we explore the possibility of employing QIM for anti-collusion fingerprinting applications.
      
更多          


Digital fingerprinting has appeared as a new technique for copyright protection of digital contents. How to defense collusive attack is one of the key problems when designing fingerprinting algorithms. In this paper, based on the binary random coding methods, a fingerprinting algorithm and the corresponding tracing algorithm are proposed by using a pseudo-random sequence to control the embedding of the fingerprint bits. Both theoretical analysis and experimental results show that under reasonable collusion size,...

Digital fingerprinting has appeared as a new technique for copyright protection of digital contents. How to defense collusive attack is one of the key problems when designing fingerprinting algorithms. In this paper, based on the binary random coding methods, a fingerprinting algorithm and the corresponding tracing algorithm are proposed by using a pseudo-random sequence to control the embedding of the fingerprint bits. Both theoretical analysis and experimental results show that under reasonable collusion size, by the fingerprinting algorithm, the owner can trace the traitors quite efficiently and the probability to accuse an innocent buyer can be made as close as to 0. Furthermore, because the owner need not know the buyers?fingerprints, the method can serve as a good coding algorithm in the design of asymmetric fingerprinting schemes.

抗合谋攻击是数字指纹技术中需要解决的关键问题之一.基于二进制随机编码,通过使用伪随机序列对指纹比特的重复嵌入进行控制,提出了一种有效的抗合谋攻击的数字指纹编码算法及其相应的跟踪算法.理论分析和实验结果表明,在适当的合谋尺寸下,该算法能够对非法分发者进行有效跟踪,同时无辜用户被诬陷的概率可以根据要求接近于0.由于在该算法中发行商无须知道用户原来的码字,因此可以说该算法是设计非对称指纹的一个很好的备选算法.

New threshold signature schemes withstanding the conspiracy attack were proposed by Jan and Gan, respectively. However, it would show that their schemes are insecure by presenting a conspiracy attack. Any set of the group could impersonate another set of members to sign any message without holding the responsibility. In case of disputes later, the designated clerk could open the forgery threshold signature, and all the members who were impersonated have no way to deny the signature. To overcome the weakness,...

New threshold signature schemes withstanding the conspiracy attack were proposed by Jan and Gan, respectively. However, it would show that their schemes are insecure by presenting a conspiracy attack. Any set of the group could impersonate another set of members to sign any message without holding the responsibility. In case of disputes later, the designated clerk could open the forgery threshold signature, and all the members who were impersonated have no way to deny the signature. To overcome the weakness, a modification to the proposed schemes could satisfy the security requirement. Further, a variant with traceable signers based on the modified scheme is proposed.

Jan等和Gan分别提出了抗合谋攻击的门限签名方案。给出了一种合谋攻击方案表明他们的方案是不安全的,任何一组成员可以合谋假冒另一组成员对任何消息生成有效的门限签名而不需负任何责任。一旦事后发生纠纷,指定的秘书可以打开签名,而被假冒的成员无法否认签名。为克服他们的方案的安全性缺陷,给出了一个改进方案。并且,基于改进的方案,提出了一个可以追查签名者身份的、抗合谋攻击的门限签名方案。

This paper focus on protection against illegal production of copyrighted digital images and provides a fingerprinting scheme that employs the thought of joint fingerprinting and decryption(JFD) and the idea of concatenated codes,which has a good performance on user capacity and anti-collusion property.Based on the wavelet transform,the original image is embedded with double-part fingerprints.A tracing method is also proposed,and the tracing efficiency is shown through simulation.

针对数字图像的版权保护问题设计并提出了一种新的数字指纹方案。该方案融合了将解密与指纹相结合(JFD)的思想以及利用关联码生成指纹的思路,在可容纳用户人数以及抗合谋特性方面都体现出了优越性。它在对原始图像进行小波变换的基础上将指纹分两级进行嵌入,同时给出了相应的指纹跟踪算法,并且通过仿真实验分析了其跟踪效率。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关抗合谋的内容
在知识搜索中查有关抗合谋的内容
在数字搜索中查有关抗合谋的内容
在概念知识元中查有关抗合谋的内容
在学术趋势中查有关抗合谋的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社