搜索资源列表
fsfdwt
- 采用独立分量分析的音频数字水印DWT算法,包括水印的嵌入、提取、和常用的几种攻击测试。-Using independent component analysis of the audio digital watermark DWT algorithm, including the watermark embedding, extraction, and commonly used to test several attacks.
SIP6
- 】SIP协议是会话初始协议,因为其自身和应用环境的特点面临着许多安全威胁。论文针对其中一种主要安 全威胁— — 注册劫持,用两种方法实现此种攻击,并实验对带有摘要认证的SIP的注册劫持攻击,最后提出防范注册 劫持攻击的安全机制。-SIP protocol is Session Initiation Protocol, as its own characteristics and application of environment is faced with many security
SIP8
- 目前,会话初始协议(SIP)大部分认证机制只提供了服务器到客户端的认证,H ITI P摘要 认证便是其中的一种。分析了这种机制容易遭受服务器伪装攻击和密码窃取攻击的缺陷,提出了一 种弥补这些缺陷的安全认证机制。试验表明该算法具备较高的效率。-At present, the Session Initiation Protocol (SIP) authentication mechanism most only provide a server to the client authentic
SIP10
- 分析了会话发起协议及其特点,指出了SIP网络面临的一些典型攻击和安全威胁,并针 对SIP网络面临的安全风险提出了基于PKI公钥基础设施的SIP协议安全的解决方案,完善 了SIP的安全机制,使SIP能进一步为用户提供更加多样、安全的服务。-Analysis of the Session Initiation Protocol and its characteristics, pointing out that the SIP network is facing some of the ty
SIP11
- VoIP的许多独特的优点使它越来越受企业的欢迎。由于VoIP~行在IP网络中,在 IP网络上常见的攻击与威胁也同样会出现在VoIP中,还有一些专门针对VoIP的攻击,如 窃听、注册攻击、窃取服务等。企业在建,.9.VolP网络时,应充分考虑VoIP的安全性。文章以 SIP信令为例,介绍在VoIP架构中如何保护SIP信息及VoIP媒体流,介绍了一些方法和安全 技术来为VoIP提供加密和认证功能,为企业的VoIP安全性设计提出建议,作为参考。-VoIP s many unique a
dct_total_ss
- 扩频域数字水印算法源代码,可以抗一般的攻击行为-Spread Spectrum Watermarking Algorithm source code, attacks against the general
Audio_Water_fftbased
- An fft base audio watermarking algorithm, robust against various attacks
DCT_SVDWatermark
- SVD-DCT based audio watermarking robust to compression, filtering, cropping, Jitter, and other attacks
sift
- sift的C++版,在sift上找出鲁棒性最强的几个特征点,然后以这个点为圆心,以自适应性的尺度为半径画圆,这个非常适合运用于数字水印领域,适用于抵抗数字水印的几何攻击-sift the C++ version, sift out on several features of the robustness of the strongest point, then this point as the center, the scale of self-adaptive radius circle,
testbed
- This mfile representates audio attacks : 1. LPF 6k 2. BPF 1-6k 4. Mono 5. Noise 6. Sample Rate Change 7. Time Scale 8. Linear Speed Change 9. Pitch Shifting 10. Equalizer 11. Echo 12. Cropping 13. MPEG-1 14. MPEG-2 15. MPE
npcr-unci
- The number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI) are two most common quantities used to uate the strength of image encryption algorithms/ciphers with respect to differential attacks. Conventionall
