篡改數字 的英文怎麼說

中文拼音 [cuàngǎishǔ]
篡改數字 英文
juggle the figures
  • : 動詞(奪取, 多指篡位) usurp; seize
  • : Ⅰ動詞1 (改變) change; transform 2 (修改) revise; alter; modify 3 (改正) rectify; correct 4 ...
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • 篡改 : (用作偽的手段改動或曲解) distort; misrepresent; tamper with; falsify
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  1. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、據來源和完整性,防止據被竊取、和破壞,從而達到保護據的目的。
  2. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的通信網路中,簽名作為據認證技術中的一項關鍵技術,可以解決否認、偽造、及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份認證和不可抵賴性。
  3. In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection

    水印是一種新的媒體保護技術,它是將特定的信息(如版權信息、秘密消息等)嵌入到圖象、語音、視頻等各種媒體中,以達到版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且有特定的恢復方法,此信息對非法接收者應該是不可見的,本文主要對水印的一般框架,靜止圖象dct系的理論容量,圖象水印的嵌入和檢測,媒體防以及水印的攻擊等問題進行了研究,提出了兩個新的水印算演算法。
  4. It is also possible to recover portions of the image which have been tampered. experiments on real images verify the effectiveness of the proposed technique. ( 3 ) since the current self - embedding watermarking techniques are too fragile to resist noise or jpeg compression, we proposed a self - embedding method based on jpeg images which plays an important role in current internet environment

    ( 3 )由於現有的空域自嵌入水印演算法大多是對位圖圖像嵌入水印,在抗jpeg壓縮方面顯得過于脆弱,因此本文實現了一種直接對jpeg圖像進行自嵌入的水印演算法,具有檢測及修復功能,對于當今網路時代來講具有重要意義。
  5. However, owing to its opening, the information which is published on internet subject to many attacks, such as unauthorized wiretapping, intercepting, destroying, copyright infringing, abusing, hacker attaching and virus infecting, etc. because digital information on internet can be copied, modified and transmitted, copyright infringing on internet is becoming more and more serious ; now information tech is used more and more in the society, domain that internet concerns spreads fast, it play an important role in many fields, such as bank, business, government, army and so on. in these fields, demand of keeping secret is increasingly imminent

    然而正是由於它的開放性給在internet上發布、傳輸的信息帶來了巨大的威脅:網上的信息會被非法竊聽、截取、或破壞;由於internet上的化信息可以被很方便地復制、修和傳播,因特網上侵權問題越來越嚴重;並且,隨著社會日益信息化, internet所涉及的領域越來越廣,在諸多領域起了非常重要的作用,如銀行系統、商業系統、政府部門和軍事領域,這些領域對信息的安全保密要求也日益迫切。
  6. These digital media including images, characters, audio and video digitalized works are easy to store, design, transmit and duplicate, and accelerate communication and transmission of knowledge and information. while it offered convenience to some illegal persons who can distort, attack and pirate the achievement maliciously at the same time

    這些化的圖形、文以及音頻、視頻作品的易存儲加工、易傳輸復制的優點加快了知識與信息的交流與傳播,但同時也為一些非法者提供了惡意、攻擊、盜用他人勞動成果的便利條件。
  7. This method adds digital signature to the dna sequences, and find the juggling by checking it before using the data

    該方法將簽名嵌入dna序列,在使用前通過校驗簽名來發現
  8. The revolution in digital technology has increased the ease of manipulation, reproduction, retransmission, and distribution of digital information. however, it is also offers the potential for illegal duplication and manipulation

    化技術的革命在為信息的處理、復制、轉發以及銷售提供便利的同時,它也為非法復制和非法提供了可能。
  9. For example, if you want to have a digitally encrypted signature of a document to ensure that it isn t tampered with, a rearrangement of the attributes would break the signature, even though as far as xml 1. 0 is concerned, the document has not really changed

    比如,如果希望用加密的簽名保護文檔不被變屬性的順序會破壞簽名,盡管對xml 1 . 0來講文檔實際上並沒有變。
  10. Hashing data is useful when you want to prevent tampering by checking that data has not been altered : given identical input strings, hashing algorithms always produce identical short output values that can easily be compared

    如果要通過檢查據是否已更來避免據被,哈希據非常有用:如果輸入元串相同,哈希演算法總是生成相同的短輸出值,可以很容易進行比較。
  11. Powerful publicly available image processing software packages such as adobe photoshop, microsoft paint and paintshop pro make digital forgery a reality. it is possible to carefully tamper an digital image while leaving barely detectable traces by using these tools. so, the problem is how to ensure the integrity of image content

    目前,圖像編輯軟體已經廣泛普及,如adobephotoshop 、 microsoftpaint 、 paintshoppro等,利用這些軟體很容易對一幅圖像進行,使得對圖像內容的完整性提出質疑。
  12. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於證書和簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函實現系統的據加密模塊,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  13. Wth the advancement of computer technology and the progresses of iriformation technology, especially the sharp increase of the intemet users and fast development of the multimedia technology digitalized products have become more and more popular it is much easer for transmitting, copying, tampering and pilfering of digital data

    隨著計算機技術的發展和相關信息技術的進步,特別是internet用戶的急劇增加和多媒體技術的飛速發展,化產品越來越普及。由於化產品的傳播、復制、和竊取比較容易,所以如何有效的保護產品的版權和防止產品的盜版就變得越來越緊迫。
  14. This algorithm overcomes the limitation of those proposed algorithm previously in synthetical analysis ability

    同時,該演算法很好的克服了之前水印演算法對的綜合分析能力弱的缺陷。
分享友人