助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   隐藏数据 的翻译结果: 查询用时:0.046秒
图标索引 在分类学科中查询
所有学科
数学
宏观经济管理与可持续发展
更多类别查询

图标索引 历史查询
 

隐藏数据
相关语句
  hiding data
     Study of Preferable Quantity of Hiding Data in An Image
     图像为载体的信息隐藏数据量研究
短句来源
     The magnitude between two pixels is utilized for hiding data,and simultaneously fragile watermark is embedded in the central pixel of every 3×3 block.
     文章提出了一种在调色板图像中同时嵌入脆弱水印和隐藏数据的新算法,在分成多个3×3的图像块的中心区域嵌入脆弱水印,同时利用块中象素间的相互关系来隐藏数据
短句来源
     Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure,avoiding detection and hiding data is the most common computer crime means.
     恶意篡改文件的类型属性以掩盖文件真实结构达到诱骗用户访问、回避检测、隐藏数据等目的是计算机犯罪行为中最常用的手段。
短句来源
  hidden data
     With the development of modern data hiding technique, the protection of various information based on similar nature-color-protection principle will greatly reduce the danger of hidden data.
     随着现代数据隐藏技术的发展,对各种信息使用类似自然界保护色原理的办法来处理,极大的缩小了这些隐藏数据的危险性。
短句来源
  “隐藏数据”译为未确定词的双语例句
     Through the experiment and analysis,this scheme has high security,big,quick and difficult to detect.
     通过试验和分析发现该方案具有安全性好、隐藏数据量大、速度快不易被检测等优点。
短句来源
     Data were embedded into the Least Significant Bit-plane (LSB) of high frequency CDF (2,2) integer wavelet coefficients,which accorded with the principle of Human Visual System (HVS).
     在图像的小波子带系数的最低位(LSB)嵌入隐藏数据,将数据嵌入到小波CDF(2,2)的高频子带系数中,符合人的视觉系统原理(HVS)。
短句来源
     A new attacking principle is given to the newest typical MP3 embedding software MP3Stego V1 1 16 The principle is to make the embedded data invalid and keep the quality of original MP3 and its statistic distribution unaffected Any information cannot be extracted from attacked MP3 Three attacking methods are presented to attack the MP3Stego V1 1 16 The experiment results demonstrate their validity
     针对普遍使用的MP3水印嵌入的最新软件MP3Stego1 1 16版 ,提出一种攻击思想 :在不降低隐蔽音频质量、不改变其统计分布规律的条件下 ,使嵌入在音频上的隐藏数据失效 ,从而无法正确提取水印 根据这种思想 ,结合MP3Stego1 1 16软件 ,提出三种直接有效的攻击方法 ,并进行了听觉、统计分布、信噪比和相关性等的检验
短句来源
     Embedding is based on motion detection and utilizes a human visual system, so the invisibility and the capacity are good.
     该方案采用三维小波变换 ,依据运动检测和人视觉模型自适应的嵌入水印 ,保证隐藏数据的视觉不可见性和一定的容量。
短句来源
     According to the detection ofmovement and the model of human visual system, the watermark is embedded inblock sequence of video scene. Before embedding watermark some coefficients of3D-DCT and scaling coefficients are selected. It ensures the invisibility and capacityof watermark.
     根据视频序列的特点对视频块序列采用 3D-DCT 变换(三维离散余弦变换),并依据运动检测和人眼视觉模型分成块序列自适应的嵌入水印,在块序列的 3D-DCT 变换系数中选择合适的系数分布和强度因子嵌入水印,保证了隐藏数据的视觉不可见性和一定的容量。
短句来源
更多       
  相似匹配句对
     DATA
     数据
短句来源
     DATA & INFORMATION
     数据
短句来源
     Hidden/Cach
     《隐藏
短句来源
     Data Hiding in Digital Images
     数字图像中的数据隐藏
短句来源
     Data Hiding Algorithm Based on Harmonic Amalgamation
     基于融合的数据隐藏算法
短句来源
查询“隐藏数据”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  masked data
At the decoding end, the network is used to monitor the audio channel for presence of masked data.
      
A breakpoint can be put on any PC range, and a watchpoint can be put on any address range or masked data value.
      
Combinational logic design for AES subbyte transformation on masked data.
      
First, the masked data set should have the same first and second moments as the original data set.
      
However, in Table 1 we have provided a masked data set which can be used for exploration.
      
更多          
  hiding data
However, the damage caused by hiding data in compressed messages reduces image quality more than the damage caused by hiding data in uncompressed messages.
      
Cap represents the capacity for hiding data besides the compressed location map and the compressed changeable bits.
      
Embedding capacity is increased by hiding data using biorthogonal decompositions and using Mary modulation.
      
Following this paradigm leads to the idea of transform embedding, hiding data in the frequency domain.
      
From a performance point of view, the interconnection architecture should be as invisible as possible in hiding data transmission time from the CPU.
      
更多          
  hidden data
It is demonstrated that hidden data transmission in such a channel is possible.
      
The objective of this work is to demonstrate that an appropriate treatment of quantum similarity matrices can reveal hidden data grouping related to relevant structural features and even to biological properties of interest.
      
First, one out of everyM pseudo-random locations is selected usingthreshold selection to embed one bit of hidden data.
      
It may enable us to detect the interesting and hidden data on useful drugs especially in the field of cardiovascular disease.
      
Authentication watermark is a hidden data inserted into an image that can be applied to detect any unauthorized change of the image.
      
更多          


Object oriented paradigm of software development can be summarized as from“by what to do”to“for which to do”,as compared with the traditional paradigm like functional decomposition,which is often characterized as from“what to do”to“how to do”.Object Oriented Method (OOM) has gained high evaluations in recent decade.Its origin can be traced to SIMULA language presented in 1967.Comparisons of OOM with conventional structural method and data oriented method and its detailed analysis are presented in this paper.Effects...

Object oriented paradigm of software development can be summarized as from“by what to do”to“for which to do”,as compared with the traditional paradigm like functional decomposition,which is often characterized as from“what to do”to“how to do”.Object Oriented Method (OOM) has gained high evaluations in recent decade.Its origin can be traced to SIMULA language presented in 1967.Comparisons of OOM with conventional structural method and data oriented method and its detailed analysis are presented in this paper.Effects of OOM on the inception of software developing method are also discussed according to the history and development of OOM.It will surely be helpful to the researches on OOM fundamental theory,itsrealization technology and applications.$

通过提出一个理想的OO模型讨论OOM基于信息隐藏、数据抽象、数据类型的动态汇集及性质继承等特征的本质 ,经对比分析 ,从OOM的历史和发展探讨这一方法对软件开发方法学产生的影响

Now media distribution changes from press technology to digital technology. Meanwhile, valuable digital content can do electronic commerce in the Internet, however, the problem of Internet content copyright protection has still been unanswered. There are two approaches for the copyright protection technology, one is digital watermark as a hiding information in the digital media. the other one is based on the encryption technology for copyright protection and copyright management. This paper briefly discusses...

Now media distribution changes from press technology to digital technology. Meanwhile, valuable digital content can do electronic commerce in the Internet, however, the problem of Internet content copyright protection has still been unanswered. There are two approaches for the copyright protection technology, one is digital watermark as a hiding information in the digital media. the other one is based on the encryption technology for copyright protection and copyright management. This paper briefly discusses the prerequirement of digital copyright protection and main thread model. At last, it chooses Netscape Navigator as the computing platform and use plugin as the secure kernel for copyright protection.

信息的传播从印刷媒体向数字媒体过渡 .有价值的信息内容可以在网上进行电子商务的等价交换 .但是对于 Internet内容版权保护的问题是一个还没有很好解决的问题 .主要有两类版权保护的计算方法 ,一类是将版权作为在媒体中隐藏的数据对象 (称为水印 )的版权保护的方法 ;另一类是采用加密将版权保护和版权管理分布式处理计算的方法 ,文中讨论了网络上知识产权保护的问题以及主要的威胁模型 .由于是选定具体的计算环境Netscape Navigator,并采用浏览器的插件作为安全内核 ,确保内容的控制使用 .

This paper present a novel kind of voice hiding algorithm based on quantization coding. A secret voice is encrypted and then hidden into another voice, which can be transmitted securely on Internet. Our experiments show that the algorithm can securely hide high capacity of information while inaudible. And it also can be used to hide other information such as text, image into voice.

本文提出了一种基于量化编码技术的语音隐藏算法。该算法可以将一种秘密语音伪装成另外一种语音以便于从公网上安全的传输,实验结果表明,该算法具有隐藏数据量大、安全性高、隐藏效果好等优点。且该算法可以用于在语音中隐藏文本、图像等信息数据。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关隐藏数据的内容
在知识搜索中查有关隐藏数据的内容
在数字搜索中查有关隐藏数据的内容
在概念知识元中查有关隐藏数据的内容
在学术趋势中查有关隐藏数据的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社