Welcome![Sign In][Sign Up]
Location:
Search - linear attacks

Search list

[Firewall-SecurityStirMark_3_1_79

Description: StirMark可以从多方面测试水印算法的鲁棒性,用于测试的攻击手段包括线性滤波、非线性滤波、剪切/拼接攻击、同步性等。-StirMark from numerous tests robust watermark algorithm, used in testing the means of attack, including linear filter, non-linear filtering, shear / splicing attacks, such as synchronization.
Platform: | Size: 1007705 | Author: 杨琴 | Hits:

[Firewall-SecurityStirMark_3_1_79

Description: StirMark可以从多方面测试水印算法的鲁棒性,用于测试的攻击手段包括线性滤波、非线性滤波、剪切/拼接攻击、同步性等。-StirMark from numerous tests robust watermark algorithm, used in testing the means of attack, including linear filter, non-linear filtering, shear/splicing attacks, such as synchronization.
Platform: | Size: 1007616 | Author: 杨琴 | Hits:

[Crack HackRijindael

Description: 对称密码体制的发展趋势将以分组密码为重点。分组密码算法通常由密钥扩展算法和加密(解密)算法两部分组成。密钥扩展算法将b字节用户主密钥扩展成r个子密钥。加密算法由一个密码学上的弱函数f与r个子密钥迭代r次组成。混乱和密钥扩散是分组密码算法设计的基本原则。抵御已知明文的差分和线性攻击,可变长密钥和分组是该体制的设计要点。-Symmetric cryptosystem trends will focus on block cipher. Block cipher algorithm is usually extended by the key algorithm and encryption (decryption) algorithm is composed of two parts. Key Expansion Algorithm will b-byte master key customers to expand into r sub-key. Encryption algorithm from a weak cryptography on the function f and r sub r th iteration key component. The spread of chaos and key block cipher algorithm is the basic principle of design. Explicitly known to resist differential and linear attacks, variable length keys and grouping of the system design features.
Platform: | Size: 3072 | Author: 王晓明 | Hits:

[Multimedia Develop24-03-01

Description: A Novel Audio Watermarking Algorithm for Copyright Protection of Digital Audio Abstract Digital watermark technology is now drawing attention as a new method of protecting digital content from unauthorized copying. This paper presents a novel audio watermarking algorithm to protect against unauthorized copying of digital audio. The proposed watermarking scheme includes a psychoacoustic model of MPEG audio coding to ensure that the watermarking does not affect the quality of the original sound. After embedding the watermark, our scheme extracts copyright information without access to the original signal by using a whitening procedure for linear prediction filtering before correlation. Experimental results show that our watermarking scheme is robust against common signal processing attacks and it introduces no audible distortion after watermark insertion.
Platform: | Size: 269312 | Author: ashraf | Hits:

[Industry researchDetection-of-Syn-Flooding-Attacks-using-Linear-Pr

Description: This paper presents a simple but fast and effective method to detect TCP SYN flooding attacks. Linear prediction analysis is proposed as a new paradigm for DoS attack detection. The proposed SYN flooding detection mechanism makes use of the exponential backoff property of TCP used during timeouts. By modeling the difference of SYN and SYN+ACK packets, we are successfully able to detect an attack within short delays. We use this method at leaf routers and firewalls to detect the attack without the need of maintaining any state.
Platform: | Size: 3526656 | Author: ahmed | Hits:

[Industry researchPredicting-Number-of-Attackers-Using-Regression-A

Description: Anomaly based DDoS detection involves deviation DDoS scenario is helpful in narrowing down set of from thresholds set in normal condition. This suspected attackers got after characterization of deviation can be used for estimating number of attack sources is over. Predicted number of most attackers. We use ns-2 as simulation test bed for suspicious sources can be chosen for filtering or launching DDoS attacks using well known DDoS Rate-Limiting to suppress the effect of attack. attack tools with varied number of attackers. A new We use GT-ITM [6], an ISP level topology generator relationship is established between estimated number and ns-2 [7] as test bed for simulations. Linear of attackers and drift from normal value using regression [8] is used for establishing relationship
Platform: | Size: 2022400 | Author: ahmed | Hits:

[Audio programtestbed

Description: This mfile representates audio attacks : 1. LPF 6k 2. BPF 1-6k 4. Mono 5. Noise 6. Sample Rate Change 7. Time Scale 8. Linear Speed Change 9. Pitch Shifting 10. Equalizer 11. Echo 12. Cropping 13. MPEG-1 14. MPEG-2 15. MPEG-4 16. Dolby
Platform: | Size: 10240 | Author: Gelar | Hits:

CodeBus www.codebus.net