數字的秘密 的英文怎麼說

中文拼音 [shǔde]
數字的秘密 英文
the secret of numbers
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : 4次方是 The fourth power of 2 is direction
  • : 秘Ⅰ形容詞(秘密的) secret; mysterious Ⅱ動詞(保守秘密) keep sth secret; hold sth back Ⅲ名詞(使...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  • 秘密 : secret; clandestine; confidential
  1. In addition, applications of secret sharing in signature and multi - party decryption are studied, and secure and efficient crypto - algorithms are proposed

    另外,研究安全共享體制在簽名、多方解應用,設計構造了安全有效碼演算法。
  2. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術飛速發展,圖像、音頻和視頻產品愈來愈需要一種有效版權保護方法,另外通信系統在網路環境下信息安全問題也日益顯露出來.圖像水印技術為上述問題提供了一個潛在解決方案.所謂水印技術就是將、序列號、文、圖像標志等版權信息嵌入到多媒體據中,以起到版權保護、通信、據文件真偽鑒別和產品標志等作用.本文提出了一種新基於奇異值分解水印演算法並且對該方法理論基礎給出分析.實驗結果表明這種方法要比目前提出流行演算法魯棒
  3. Though the authorities have publicly admitted to only 300 deaths, they have privately reported 100, 000 mortalities to international agencies, and even that figure is not credible, say experts

    專家說中國官方只承認300頭豬死亡,但他們向國際組織報告死亡率是十萬頭,就算是這個也並不可靠。
  4. In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection

    水印是一種新媒體保護技術,它是將特定信息(如版權信息、消息等)嵌入到圖象、語音、視頻等各種媒體中,以達到版權保護等目,同時,這種信息對宿主媒體影響不足以引起人們注意且有特定恢復方法,此信息對非法接收者應該是不可見,本文主要對水印一般框架,靜止圖象dct系理論容量,圖象水印嵌入和檢測,媒體防篡改以及水印攻擊等問題進行了研究,提出了兩個新水印算演算法。
  5. Recently, the research of digital watermarking is emphasized, and the stegnaography that is applied to the secret communication is also focused

    目前信息隱藏技術大部分研究工作集中在水印技術,而用於通信術也逐漸引起人們興趣。
  6. At present time, most of the studies focus on digital watermarking techniques, and few are done on steganography, one of the most important directions in the field of information hiding

    目前大部分研究工作集中於水印技術,而用於通信術則較少有人涉及。本文對信息隱藏領域另一個重要方向? ?掩技術進行了研究,著重討論了其在圖像中應用。
  7. Digital watermarking is the technology which embeds copyright information including product id, text content or image logo into multimedia for copyright protection, secret communication and discrimination of the data files

    所謂水印技術就是將信息如產品序列號、文本內容、圖像標志等版權信息嵌入到多媒體據中,以起到版權保護、通信、據文件真偽鑒別等作用。
  8. Digital watermarks may be all kinds of information which can be embedded into multimedia data, just as digits, serial numbers, text, image symbols, so it can be used in copyright protection, marker production, covert communication, data ownership confirmation, data authentication

    水印是指嵌入到多媒體據中信息,可以是、序列號、文、圖像標志等各類信息,以起到版權保護、標志產品、通信、證實據歸屬權、鑒別據真偽等作用。
  9. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    網路據傳輸安全主要解決在網路環境下用戶之間身份驗證、據加傳輸以及實現簽名三個方面問題:用戶身份驗證保證了通信源點和目正確性;據加傳輸保證了據在網路中間節點不會泄露通信簽名可以保證發送信息一方不能對自己發送過信息進行否認。
  10. First, it was strictly platonic till nature intervened and an attachment sprang up between them, till bit by bit matters came to a climax and the matter became the talk of the town till the staggering blow came as a welcome intelligence to not a few evildisposed however, who were resolved upon encouraging his downfall though the thing was public property all along though not to anything like the sensational extent that it subsequently blossomed into

    對于為不少居心險惡執意要使他垮臺人們來說,那可是個求之不得消息。此事一直是個公開,然而並沒有達到后來渲染成那樣聳人聽聞程度。既然他們二人已經連結在一起,既然她已經公開承認他是她心上人,還有什麼必要從房頂上來向民眾宣布呢?
  11. In recent years, some new concepts of information security have been proposed, especially in the application of intellectual property right protection, copyright protection and tamper - proofing. information hiding and digital watermarking are new measures of digital media protection, which are processes of embedding hidden messages within digital media such as text, images, video and audio. the hidden messages could be copyright information, user distributor identification number, company logo, personal signature, control bits, or any information considered useful for a specific application

    信息隱藏與水印技術就是一種新媒體保護措施,它是將特定信息(如版權信息、消息等)嵌入到圖像、語音、視頻及文本文件等各種媒體中,以達到標識、注釋及版權保護等目,同時,這種信息對宿主媒體影響不足以引起人們注意且具有特定恢復方法,此信息對非法接收者應該是不可見、不可察覺
  12. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信據加系統,該系統將對稱加演算法3des與非對稱加演算法rsa相結合對據加,用公鑰演算法rsa和單向散列函md5實現對文件簽名,有效地實現了網路通信系統中信息加簽名、身份認證等功能,保證了發送方所發送信息性、鑒別性、完整性及不可否認性。
  13. Give precise criterions and descriptions of some important concepts and disposals of data - hiding technique such as cover, stego - object, hiding information, data embedding, data extraction, stego - key, stego - analysis, insensibility, covert communication, digital watermarking, robustness and etc. then propose a general mathematical model of data hiding which cover most models proposed in other papers and establish the basis for further theory analysis

    本論文獨立完成主要成果有: ( 1 )對信息隱藏技術中一些重要概念和處理給出了準確規范和描述,主要有隱載體、隱對象、信息、據嵌入、據提取、隱鑰、隱分析、不可感知性、隱通信、水印、魯棒性等。
  14. Finally, a new threshold and confirmer signature scheme for group or organization is proposed by using the multiplicative secret sharing and rsa public key cryptosystem, whose confirming and denying protocols are constructed by using the idea of zero - knowledge proof

    提出適合於團體和組織門限證實簽名方案。新方案以乘法共享和rsa加演算法為基礎,採用一次性零知識證明思想構建簽名證實協議和否認協議。
  15. That is because most digital signatures require the parties in a transaction to have compatible software ? the signer needs to have an encryption algorithm called a “ private key ” on his computer, and everybody else needs a “ public key ” to unlock the signature

    這是因為大多簽名要求交易當事方具有可兼容軟體,簽名者需要在他計算機上具有稱為「私人鑰」演算法,每個人同時還需要一個「公共鑰」來解開簽名。
  16. And you need maybe a secret word or a secret number to get in, but we say a password, it ' s the word that lets you pass in, so you would need a password, which of course also might be anything

    (上網時)你可能還需要有一個單詞或,我們稱它們為「 password 」 。有了碼你才能進入網路,你可以選任何母或詞匯作為你碼。
  17. The security of the threshold multiple secret sharing scheme is based on the security of rsa signature, i. e. the difficulty of factoring large integers

    門限多重共享方案安全性依賴于rsa簽名安全性,即大分解困難性。
  18. Exactly how it uses the web can be syntactically specified as demonstrated in the technical discussion that follows, but that kind of discussion ignores the meta - question of what url to use

    擁有可以通過標準碼技術認證鑰是一種標準方法。我們將討論解決認證問題常見方法,包括簽名系統。
分享友人