1) RST attacks
RST攻击
1.
In this paper a general multi-bit watermarking scheme for digital image that can resist to RST attacks is proposed.
该文提出了一种具有普适性的能够抵抗RST攻击的多比特数字图像水印方案,采用的主要措施有:(1)提出一种基于几何矩的图像标准化方案以抵抗几何攻击;(2)采用扩谱方法构造二维CDMA水印信号,实现多比特水印嵌入;(3)根据HVS特性自适应调整水印的嵌入强度,在鲁棒性和不可见性之间达到平衡;(4)利用MAP和相关方法估计和检测水印信号。
2.
Geometric distortions of the watermarked image were estimated accurately and its inverse transformation was corrected by geometric moments,of the original and the watermarked images,used for pattern recognition,to ensure synchronization between embedding and detecting of the watermark and improve the resistance to RST attacks.
针对这个难点,本文采用了广泛应用于模式识别中的几何矩技术,利用3个原始图像的几何矩和遭受攻击后图像的几何矩信息准确地估计出水印图像所经历的几何攻击,然后对其逆变换校正,确保了水印嵌入与检测的同步,极大的提高了水印算法抵抗RST攻击的能力。
2) against RST attack
抗RST攻击
1.
Image watermarking scheme against RST attack based on SIFT feature;
一种基于SIFT特征的抗RST攻击水印方案
3) real space charge transfer
RST
1.
The multilogic function devices based on the RST (real space charge transfer) structure are being used to realize such logic functions as XOR,“OR” and “NAND.
RST(实空间电荷转移)逻辑器件已能够实现“异或” 、“或” 以及“与非”功能。
2.
The RST (real space charge transfer) devices with the logic functions of XOR,“OR” and “NAND are already available.
文中通过利用耗尽层阻断沟道的方法,讨论了一种基于RST结构原理实现“或非”逻辑功能的器件结构。
4) Aggression
[英][ə'ɡreʃn] [美][ə'grɛʃən]
攻击
1.
Relationship Between Rorschach Aggression Variables and Explicit Hostility;
罗夏测验攻击变量与外显攻击敌意的关系
2.
Rorschach Aggression Variables:A Study of Reliability and Validity;
罗夏测验攻击变量的信度效度研究
3.
Correlation between Personality and Rorschach Aggression Variables;
人格特征与罗夏测验攻击变量的相关性研究
5) Attack
[英][ə'tæk] [美][ə'tæk]
攻击
1.
The prevention technology for ARP virus attack;
浅谈ARP病毒攻击的防御技术
2.
Prevention of attack on overflowing loopholes in buffer of Linux system;
对Linux系统缓冲区溢出漏洞攻击的防范
6) attacking
[英][ə'tæk] [美][ə'tæk]
攻击
1.
This paper deeply analyses the principle and possiblility of buffer overflow attacking,and buffer overflow s potential dangers according to program code with buffer overflow.
针对C程序语言本身存在的不进行数组边界检查,容易产生缓冲区溢出,进而产生系统瘫痪等缺陷,对缓冲区溢出的原理和溢出攻击进行了详细的阐述。
2.
This paper briefly introduces the general outline of the Okamato E cash scheme and one attacking method against this scheme,discusses the attacking principles and provides some mends and reinforcements for the Okamato E cash schem
本文简要综述了电子货币的发展研究过程 ,分析了Okamoto电子货币体系的特点 ,剖析了一种攻击方法 ,对攻击方法做出了理论分析 ,在此基础上探讨了几种抵御攻击的方案 ,最后提出了一种改进的电子货币系
3.
This paper, based on the theory of IPv6, analyzes the security problem of IPv6 and a couple of classic attacking methods and briefly describes the research on information security.
论文从移动IPv6的基本原理入手,分析移动IPv6存在的安全隐患及几种典型的攻击方法,并对其安全性进行了简单的探讨。
补充资料:1,2-cde]pentaphene-9,18-dione, bromo-Benzo[rst]phenanthro[10,1,2-cde]
CAS:1324-17-0
分子式:C34H15BrO2
中文名称:溴代苯并[RST]菲并[10,1,2-CDE]戊芬-9,18-二酮
英文名称:1,2-cde]pentaphene-9,18-dione, bromo-Benzo[rst]phenanthro[10,1,2-cde]
threnebrilliantviolet
vat violet 9
Benzo[rst]phenanthro[10,1,2-cde]pentaphene-9,18-dione,bromo-
分子式:C34H15BrO2
中文名称:溴代苯并[RST]菲并[10,1,2-CDE]戊芬-9,18-二酮
英文名称:1,2-cde]pentaphene-9,18-dione, bromo-Benzo[rst]phenanthro[10,1,2-cde]
threnebrilliantviolet
vat violet 9
Benzo[rst]phenanthro[10,1,2-cde]pentaphene-9,18-dione,bromo-
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条