隱密技術 的英文怎麼說

中文拼音 [yǐnshù]
隱密技術 英文
stealth technology
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 隱密 : privacy
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加以及各國立法對的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路的迅猛發展和網路在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機信息(例如軍事機信息、商業機信息、個人私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路在日常工作中的應用。當前,基於voip的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加措施
  3. In this dissertation we make a study of subliminal channels that conclude the progress, the application, the model, the construction, the stego - key, the capacity, the security, the way to realize subliminal - freeness, and so on

    本文對閾下通道進行了比較全面的總結和研究,包括閾下通道的發展狀況,應用前景,閾下通道的模型,構造方法,鑰,容量,安全性以及封閉方法等。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. As a new branch of information security, information hiding technology including digital watermarking and steganography aims to protect intellectual property rights of multimedia contents and to send secret messages under the cover of a carrier signal

    信息藏是信息安全領域中的一項新興,主要有數字水印和數字寫兩大分支,分別用於多媒體數據的版權保護和蔽通信。
  6. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全患,基於對目前國內外電子郵件安全的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、碼管理的應用需求等進行了詳細的分析和設計。
  7. To the common requirement of invisibility of the two, the paper presents a information hiding strategy which first uses cluster analysis methods ( this paper uses k - means algorithm ) to classify the image to get the nature of the image, and then uses one embedding algorithm, accounting the improvement on the conceal effect using image ' s character

    接著對信息的兩個重要分支與數字水印,闡述其各自特點及異同點,針對二者在不可見性上的共同要求,從利於圖像自身的特性增強掩效果的思路出發,提出先用聚類分析的方法(本文採用了k -均值演算法)對圖像的像素點進行分類以充分發掘圖像自然的內在特性,再結合嵌入演算法的信息藏策略。
  8. The technology of image information includes information encryption and information hiding two parts. the video information encryption is mainly researched in this paper

    信息安全主要包括信息加和信息藏兩部分,本文主要研究視頻信息加
  9. A 3d - dct - based information hiding algorithm for color images

    的秘信息
  10. A virus that uses encryption to hide itself from virus scanners. that is, it jumbles up it ' s program code to make it difficult to detect

    一個用加藏自己而不被掃描器發現的病毒。這意味著它把攪亂了它的程序代碼,從而使它難以被發現。
  11. In order to compute the multiple or clustered eigenvalues effectively, a dynamic deflation technique for the implicitly restarted block lanczos method is presented, and its application to the implicitly restarted block lanczos method is discussed

    為了有效地計算重特徵值或集特徵值,本文討論了動態收縮式重新開始塊lanczos方法的應用,提出了式重新開始塊lanczos方法的動態收縮
  12. Recently, the research of digital watermarking is emphasized, and the stegnaography that is applied to the secret communication is also focused

    目前信息大部分的研究工作集中在數字水印,而用於秘通信的也逐漸引起人們的興趣。
  13. At present time, most of the studies focus on digital watermarking techniques, and few are done on steganography, one of the most important directions in the field of information hiding

    目前大部分的研究工作集中於數字水印,而用於秘通信的掩則較少有人涉及。本文對信息藏領域的另一個重要方向? ?掩進行了研究,著重討論了其在數字圖像中的應用。
  14. A subliminal channel is a covert communication channel to send a message to an authorized receiver. this channel is constructed in the output crypto - data of an applied public - key cryptosystem such as digital signature, authentication, and so on. the message can not be discovered by any unauthorized receivers

    閾下通道是指在基於公鑰的數字簽名、認證等應用碼體制的輸出碼數據中建立起來的一種蔽通道,除指定的接收者外,任何其他人均不知道碼數據中是否有閾下消息存在。
  15. In recent years, some new concepts of information security have been proposed, especially in the application of intellectual property right protection, copyright protection and tamper - proofing. information hiding and digital watermarking are new measures of digital media protection, which are processes of embedding hidden messages within digital media such as text, images, video and audio. the hidden messages could be copyright information, user distributor identification number, company logo, personal signature, control bits, or any information considered useful for a specific application

    信息藏與數字水印就是一種新的數字媒體保護措施,它是將特定的信息(如版權信息、秘消息等)嵌入到圖像、語音、視頻及文本文件等各種數字媒體中,以達到標識、注釋及版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且具有特定的恢復方法,此信息對非法接收者應該是不可見、不可察覺的。
  16. The major content of the hiding technique is sought to the algorithms that insert the secret information into the host information

    信息的研究內容主要是尋求向載體對象中添加信息的演算法。
  17. This service is compatible with windows and macintosh operating systems, and its state - of - the - art encryption technology ensures privacy

    此服務適用於windows及macintosh作業系統,其最先進的加保證私不外泄。
  18. Give precise criterions and descriptions of some important concepts and disposals of data - hiding technique such as cover, stego - object, hiding information, data embedding, data extraction, stego - key, stego - analysis, insensibility, covert communication, digital watermarking, robustness and etc. then propose a general mathematical model of data hiding which cover most models proposed in other papers and establish the basis for further theory analysis

    本論文獨立完成的主要成果有: ( 1 )對信息中的一些重要概念和處理給出了準確的規范和描述,主要有秘載體、秘對象、秘信息、數據嵌入、數據提取、鑰、秘分析、不可感知性、秘通信、數字水印、魯棒性等。
  19. " the essential difference between this technology and cryptology is that the latter conceals the content of information itself while the former conceals the very existence of information

    之不同點在於:藏信息的「內容」 ,而信息藏信息的「存在性」 。
  20. After analyzing the relationship among embedding parameters adjustment, attack elusion and performance evaluation, we construct an " evaluation - automatic adjustment " message embedding framework. some key issues of performance evaluation are investigated in this thesis : 1 ) evaluation of the image degradation

    本文分析了藏演算法參數調節、攻擊規避和性能評估之間的關系,提出了以「性能評估?自動調節」為核心的信信號框架。
分享友人