免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 3148 | 回复: 4
打印 上一主题 下一主题

周四、五参加BS7799内审员培训 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2005-05-22 08:41 |只看该作者 |倒序浏览
大家有什么需要的?

论坛徽章:
0
2 [报告]
发表于 2005-05-23 16:05 |只看该作者
你能给我们提供什么啊?\r\n不太懂你的意思!

论坛徽章:
0
3 [报告]
发表于 2005-05-25 13:02 |只看该作者

把培训都录下来吧

最起码培训文档应该传上来吧

论坛徽章:
0
4 [报告]
发表于 2005-05-27 13:49 |只看该作者
2.2 Watermark Verification\r\nA watermarking scheme with detection consists of four polynomial-time algorithms\r\nGENKEY , GENW, embed function E, and detection function D.\r\nGENKEY and GENW are probabilistic and generate a key-pair (kemb, kdet) and\r\na watermark W. The algorithm E(I,W, kemb) imperceptibly embeds the watermark\r\nW into the cover-data I, using the key kemb. This results in stego-data IW\r\n(watermarked version of I). The algorithm D(I_,W, I, kdet) returns a boolean\r\nvalue, which states whether the cover data I_ contains the watermark W relative\r\nto the reference data I, using key kdet. A symmetric watermarking scheme\r\nneeds the same key kw) for detection as for embedding. Unkeyed watermarking\r\nschemes need no key for embedding or detection. Watermarking schemes whose\r\ndetect algorithms D do not require the input of reference data I are called blind,\r\nin contrast to non-blind schemes.\r\nWe can consider three watermark mechanisms for digital data D_, which\r\nare the (1) watermark(W) casting mechanism, (2) signature(D∗ signing\r\nmechanism, and (3) signature hiding and verification mechanism. In this Fig. 2,\r\nwe can easily understand two mechanisms among these three mechanism. We\r\ncan embed some mark W on digital data D_. So, it is the common watermark\r\nembedding and verification(recovery) mechanism(mark casting mechanism).\r\nThe other one is the cryptographic mechanism as we can attach digital signature\r\nD∗ on digital data D_ for authentication(signing mechanism). From these two\r\nmechanism, we can consider new hybrid mechanism(signature hiding and veri-\r\nfication mechanism). As we can think signature as its watermark information,\r\nwe can hide this signature on its digital data for verifying ownership and\r\nauthentication. So, we can construct hybrid mechanism on digital watermark\r\nverification and authentication system.

论坛徽章:
0
5 [报告]
发表于 2005-06-03 15:09 |只看该作者
看来是骗人的,根本没有看到什么东西留下来啊
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP