Location:
Search - linear attacks
Search list
Description: StirMark可以从多方面测试水印算法的鲁棒性,用于测试的攻击手段包括线性滤波、非线性滤波、剪切/拼接攻击、同步性等。-StirMark from numerous tests robust watermark algorithm, used in testing the means of attack, including linear filter, non-linear filtering, shear / splicing attacks, such as synchronization.
Platform: |
Size: 1007705 |
Author: 杨琴 |
Hits:
Description: StirMark可以从多方面测试水印算法的鲁棒性,用于测试的攻击手段包括线性滤波、非线性滤波、剪切/拼接攻击、同步性等。-StirMark from numerous tests robust watermark algorithm, used in testing the means of attack, including linear filter, non-linear filtering, shear/splicing attacks, such as synchronization.
Platform: |
Size: 1007616 |
Author: 杨琴 |
Hits:
Description: 对称密码体制的发展趋势将以分组密码为重点。分组密码算法通常由密钥扩展算法和加密(解密)算法两部分组成。密钥扩展算法将b字节用户主密钥扩展成r个子密钥。加密算法由一个密码学上的弱函数f与r个子密钥迭代r次组成。混乱和密钥扩散是分组密码算法设计的基本原则。抵御已知明文的差分和线性攻击,可变长密钥和分组是该体制的设计要点。-Symmetric cryptosystem trends will focus on block cipher. Block cipher algorithm is usually extended by the key algorithm and encryption (decryption) algorithm is composed of two parts. Key Expansion Algorithm will b-byte master key customers to expand into r sub-key. Encryption algorithm from a weak cryptography on the function f and r sub r th iteration key component. The spread of chaos and key block cipher algorithm is the basic principle of design. Explicitly known to resist differential and linear attacks, variable length keys and grouping of the system design features.
Platform: |
Size: 3072 |
Author: 王晓明 |
Hits:
Description: A Novel Audio Watermarking Algorithm for
Copyright Protection of Digital Audio
Abstract
Digital watermark technology is now drawing attention
as a new method of protecting digital content from unauthorized
copying. This paper presents a novel audio watermarking
algorithm to protect against unauthorized copying
of digital audio. The proposed watermarking scheme includes
a psychoacoustic model of MPEG audio coding to
ensure that the watermarking does not affect the quality of
the original sound. After embedding the watermark, our
scheme extracts copyright information without access to the
original signal by using a whitening procedure for linear
prediction filtering before correlation. Experimental results
show that our watermarking scheme is robust against
common signal processing attacks and it introduces no audible
distortion after watermark insertion.
Platform: |
Size: 269312 |
Author: ashraf |
Hits:
Description: This paper presents a simple but fast and effective method
to detect TCP SYN flooding attacks. Linear prediction analysis is
proposed as a new paradigm for DoS attack detection. The proposed
SYN flooding detection mechanism makes use of the exponential backoff
property of TCP used during timeouts. By modeling the difference
of SYN and SYN+ACK packets, we are successfully able to detect an
attack within short delays. We use this method at leaf routers and
firewalls to detect the attack without the need of maintaining any state.
Platform: |
Size: 3526656 |
Author: ahmed |
Hits:
Description: Anomaly based DDoS detection involves deviation DDoS scenario is helpful in narrowing down set of
from thresholds set in normal condition. This suspected attackers got after characterization of
deviation can be used for estimating number of attack sources is over. Predicted number of most
attackers. We use ns-2 as simulation test bed for suspicious sources can be chosen for filtering or
launching DDoS attacks using well known DDoS Rate-Limiting to suppress the effect of attack.
attack tools with varied number of attackers. A new We use GT-ITM [6], an ISP level topology generator
relationship is established between estimated number and ns-2 [7] as test bed for simulations. Linear
of attackers and drift from normal value using regression [8] is used for establishing relationship
Platform: |
Size: 2022400 |
Author: ahmed |
Hits:
Description: This mfile representates audio attacks :
1. LPF 6k
2. BPF 1-6k
4. Mono
5. Noise
6. Sample Rate Change
7. Time Scale
8. Linear Speed Change
9. Pitch Shifting
10. Equalizer
11. Echo
12. Cropping
13. MPEG-1
14. MPEG-2
15. MPEG-4
16. Dolby
Platform: |
Size: 10240 |
Author: Gelar |
Hits: