Welcome![Sign In][Sign Up]
Location:
Search - tampering

Search list

[WEB Codeupds

Description: 直接序列扩频通信可以有效地抵抗来自信道中的窄带干扰。在一个直扩通信系统中,扩频是通过伪噪声序列(PN)对发送的信息数据进行调制来实现的。在接收端,原伪噪声序列和所收信号的相关运算可将窄带干扰扩展到DS信号的整个频带,使干扰等效为幅度较低频谱较平坦的噪声;同时,将DS信号解扩,恢复原始信息数据。-direct sequence spread spectrum communication can be effective resistance from the channel narrowband interference. In a DSSS system. Spreading through the sequence of pseudo-noise (PN) to send the right message to data modulation to achieve. On the receiving end, the original pseudo-noise sequence and the received signal may be related Operational narrowband interference signal DS extended to the whole band, make tampering equivalent to a lesser extent than the flat spectrum of noise; Meanwhile, the DS signal disspreaded restore the original data.
Platform: | Size: 111604 | Author: 赵艳朝 | Hits:

[Other resourceSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1406512 | Author: 周爽 | Hits:

[Graph RecognizeCircle_Reg

Description: 本程序实现焊盘孔位识别,特采用图象处理技术,具有一定的防干扰作用-the program pad Kong-identification, using special image-processing techniques, which have a certain role in the anti-tampering
Platform: | Size: 35342 | Author: 张颖 | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 238214 | Author: ghostsx | Hits:

[Documentsupds

Description: 直接序列扩频通信可以有效地抵抗来自信道中的窄带干扰。在一个直扩通信系统中,扩频是通过伪噪声序列(PN)对发送的信息数据进行调制来实现的。在接收端,原伪噪声序列和所收信号的相关运算可将窄带干扰扩展到DS信号的整个频带,使干扰等效为幅度较低频谱较平坦的噪声;同时,将DS信号解扩,恢复原始信息数据。-direct sequence spread spectrum communication can be effective resistance from the channel narrowband interference. In a DSSS system. Spreading through the sequence of pseudo-noise (PN) to send the right message to data modulation to achieve. On the receiving end, the original pseudo-noise sequence and the received signal may be related Operational narrowband interference signal DS extended to the whole band, make tampering equivalent to a lesser extent than the flat spectrum of noise; Meanwhile, the DS signal disspreaded restore the original data.
Platform: | Size: 111616 | Author: 赵艳朝 | Hits:

[VC/MFCSecure_Programming_Cookbook_for_C_and_C++

Description: Secure Programming Cookbook for C and C++ is an important new resource for developers serious about writing secure code for Unix(including Linux) and Windows environments. This essential code companion covers a wide range of topics, including safe initialization, access control, input validation, symmetric and public key cryptography, cryptographic hashes and MACs, authentication and key exchange, PKI, random numbers, and anti-tampering.-Secure Programming Cookbook for C and C is a n important new resource for developers seriou 's about writing secure code for Unix (including Linux) and Windows environments. This essenti al code companion covers a wide range of topics, including safe initialization. access control, input validation, symmetric and public key cryptography. cryptographic hashes and MACs. authentication and key exchange, PKI. random numbers, and anti-tampering.
Platform: | Size: 1405952 | Author: 周爽 | Hits:

[Graph RecognizeCircle_Reg

Description: 本程序实现焊盘孔位识别,特采用图象处理技术,具有一定的防干扰作用-the program pad Kong-identification, using special image-processing techniques, which have a certain role in the anti-tampering
Platform: | Size: 34816 | Author: 张颖 | Hits:

[Graph programD542F922

Description: 彩色图像的篡改检测及自恢复算法赵春晖,孙建军,朱海峰(哈尔滨工程大学信息与通信工程学院,黑龙江哈尔滨150001)摘要:数字水印是图像认证的有效手段之一.利用小波变换提出一种计算简单的彩色图像水印算法,将一个图像的主要内容嵌入该图像自身之中,用均值量化的方法在亮度信号中嵌入水印,实现篡改检测和定位篡改区域;用多余的色度空间嵌入亮度信号和色度信号,用于恢复被篡改的图像内容.该算法可以获取较高的峰值信噪比,具有很好的鲁棒性.实验结果表明,该算法对删除、替换等恶意图像篡改具有良好的检测、定位和自修复能力.-color image tamper detection and self-recovery algorithm Zhao Chunhui, Sun Jianjun, Zhu Haifeng (Harbin Engineering University, Information and Communication Engineering Institute, Harbin, Heilongjiang 150001) Abstract : digital watermark image authentication is one of the effective means. Using wavelet transform A simple calculation of the color image watermarking algorithm, an image of the main elements embedded in the image itself, and use of quantitative methods mean the luminance signal embedded watermark, achieve tamper detection and localization tampering with the region; use of surplus space embedded color luminance signals and chrominance signals, for the restoration of tampering with the image content. The algorithm can generate a higher signal-to-noise ratio of the peak value, h
Platform: | Size: 237568 | Author: ghostsx | Hits:

[Booksdzqz

Description: 摘要 电子证据即为电子数据证据,通常指在计算机或计算机系统运行过程中产生的以其记录 内容来证明案件事实的电磁记录物。电子证据取证包括证据获取、证据分析和证据报告三个过 程。同时,电子证据作为诉讼证据必须具备客观性、关联性、合法性的特征。当前,以数字化形 式出现的电子证据对传统的证据形式提出了挑战。 关键词 电子证据;取证技术;分析探讨-summary of electronic evidence, namely, electronic data evidence, usually refers to the computer or computer system running the course record with the contents to prove the facts of the case records from the electromagnetic . Electronic evidence, including evidence obtained evidence, the evidence analysis and report evidence of three process. Meanwhile, electronic evidence as evidence in judicial proceedings must have objectivity, relevance, legitimacy features. Currently, a digital form of electronic evidence, the evidence of the traditional form of a challenge. Keywords electronic evidence; Forensics; Analysis
Platform: | Size: 206848 | Author: air | Hits:

[Industry researchzuixinwenzhang

Description: 数字水印具有很大参考价值的文章 基于DCT变换、分块DCT混沌脆弱水印、自嵌入水印、图像篡改定位及恢复的脆弱水印等15篇最新水印技术文章-Digital Watermarking of great reference value to the article based on the DCT transform, DCT block chaotic fragile watermarking, since the embedded watermark, image tampering localization and recovery fragile watermarking, such as the latest 15 articles watermarking technology
Platform: | Size: 6259712 | Author: zhangyiyi | Hits:

[Industry researchwatermark

Description: 针对现有水印只能确定篡改位置,但不能区分篡改类型的问题,提出能区分是图像篡改还是水印篡改的方案-Existing watermark tampering could only be determined location, but should not distort the distinction between types of problems is to distinguish between image tampering or tampered watermark program
Platform: | Size: 540672 | Author: zhangyiyi | Hits:

[OS Developaspzzzs

Description: 雷客图ASP站长安全助手 功能: 1、ASP木马查找(能够查出现在几乎所有的ASP木马) 2、文件篡改检查 3、可疑文件搜索 4、Access数据库保护 5、记录入侵者信息 -Ray customer Fig ASP assistant station master security features: 1, ASP Trojan find (to find out almost all of the ASP Trojan) 2, document tampering inspection 3, suspicious file search 4, Access database protection 5, record the intruder information
Platform: | Size: 445440 | Author: tangyi | Hits:

[Communicationoracle_proxy

Description: 原创, 本程序通过代理oracle的TNS和数据通信代理,解决了在外网访问内网ORACLE数据库. 代码包括两部份, 一个是代理TNS解释,篡改返回包. 另一个只是代理内容,不改任何内容. 程序都改自以前的IRC代理程序.-Original, the process through a proxy oracle of TNS and data communications agency, to resolve the outstanding network access within the network ORACLE database. Code composed of two parts, one is the Deputy TNS explained that tampering with the return package. Another agent only content, do not change any content . procedures have changed since the previous IRC agent.
Platform: | Size: 352256 | Author: 山中鹤 | Hits:

[Crack Hackmd5

Description: 用MD5加密文件信息,使得信息在传输过程中避免受到攻击和篡改。提高了信息的安全性和稳定性。-File information using MD5 encryption, making the information during transmission to avoid being attack and tampering. Improve information security and stability.
Platform: | Size: 1067008 | Author: 周力 | Hits:

[Crack Hackmd5

Description: MD5的典型应用是对一段信息(Message)产生信息摘要(Message-Digest),以防止被篡改。比如,在UNIX下有很多软件在下载的时候都有一个文件名相同,文件扩展名为.md5的文件,在这个文件中通常只有一行文本,大致结构如:    MD5 (tanajiya.tar.gz) = 0ca175b9c0f726a831d895e269332461   这就是tanajiya.tar.gz文件的数字签名。-Typical applications MD5 is a section of information (Message) generated message digest (Message-Digest), in order to prevent tampering. For example, in UNIX there are a lot of software when downloading a file name the same file name extension is. Md5 of the file, in this document are usually only his text, more or less structure, such as: MD5 (tanajiya.tar.gz) = 0ca175b9c0f726a831d895e269332461 This is the digital signature tanajiya.tar.gz documents.
Platform: | Size: 789504 | Author: zhaoqi | Hits:

[Internet-Networkhmac

Description: hmac是一种消息验证码,我开发的这个程序可以进行任意长度的消息验证。该程序代码可以用来防止文件篡改,可以适当修改输入密码。-HMAC is a message authentication code, I developed this procedure can be of arbitrary length message authentication. The program code can be used to prevent document tampering, with appropriate modifications can enter a password.
Platform: | Size: 3072 | Author: wangweiyang | Hits:

[Special EffectsDWT

Description: 基于小波DWT域的脆弱水印,可以检测图像是否发生篡改-DWT-based wavelet domain fragile watermarking, can detect whether there has been tampering with images
Platform: | Size: 28672 | Author: Robin | Hits:

[Industry researchsift1

Description: 针对现有的图像复制遮盖篡改检测算法需要某些先验信息、对后处理操作失效且计算量大等问题, 借鉴图像匹配技术中的SIFT(scale invariant feature transform)特征匹配算法,首次提出将其用于检测复制 遮盖的篡改操作。 -Cover the existing image copy for tamper detection algorithm needs some prior information on the calculation of post-processing and the failure of large issues, draw the image matching technology in the SIFT (scale invariant feature transform) features matching algorithm, first proposed The cover copy for the detection of the tampering operation.
Platform: | Size: 466944 | Author: LIDAN | Hits:

[Software Engineeringhacking_tamper_glitch_mcu32

Description: How to hack with tampering a MCU32
Platform: | Size: 11500544 | Author: cam | Hits:

[File FormatTampering-Forensics

Description: 一种新颖的数字图像复制粘贴篡改被动取证算法的论文-A novel digital image copy and paste tampering passive forensics algorithm paper
Platform: | Size: 438272 | Author: 高皜 | Hits:
« 12 3 4 »

CodeBus www.codebus.net