那位大哥能帮我翻译下面这段英文,不要机器翻译的,谢!!给分!!

TheverificationphaseofLAW,whichisrunatthereceiverside,isshowninFig.2(b)andcomprisesof... The verification phase of LAW, which is run at the receiver side, is shown in Fig. 2(b) and comprises of two steps: a) authentication watermark verification, and if the verification step is successful, b) original image recovery. Note that in conformance with the altered ordering at the embedder, the order of these two steps is interchanged, at the receiver too, in relation to the earlier framework of Fig. 1. In the first step, authentication information is extracted from part and is used to validate the integrity of data in part . If a third party has tampered with the image data after the watermark insertion, the extracted authentication information does not match the image data and image is deemed nonauthentic. Otherwise, the watermarked image is considered authentic, i.e., unaltered since the watermark insertion. In the latter case, original image may be reconstructed from the data in part by reversing the lossless data embedding step and restoring the part of the image that is modified by the authentication watermark. Note that, upon successful verification, integrity of the final reconstructed image is ensured by the uniqueness of the reconstruction process.
Advantages of the LAW Framework: The reversal in the order of authentication and lossless watermarking steps (with respect to earlier methods) results in reduced computational burden and additional functionality, described as follows.
• Computational advantages in the verification phase.
As opposed to earlier methods, the LAW framework validates the images before attempting to reconstruct the original image. As a result, the image reconstruction step may be skipped when either a) the verification step fails, or b) the watermarked image meets the quality criteria and the perfect original is not needed. The computational savings are often substantial due to the complexity of the reconstruction step.
• Computational advantages in the embedding phase.
In client/server applications where a single image is served to multiple clients with different signatures (or time-stamps), the LAW framework has additional com- putational advantages. In this case, the server performs the—often costly—pre-embedding step only once and in- serts different signatures as requested by clients.
• Public/private-key support.
The LAW framework also supports the public-valida- tion/private-recovery property of, without the need for a second signature. When a public-key authentication signature is used in conjunction with a private-key depen- dent lossless watermark, the framework supports public validation of the watermarked image, but limits access to the perfect original.
展开
挂在盒子上°
2010-05-10
知道答主
回答量:4
采纳率:0%
帮助的人:0
展开全部
确认阶段的法律,这是在接收器,被显示在图二(b),包括两个步骤:1)验证,若认证水印的核查计划的第一步是成功的,b)原始图像复原。值得注意的是,在符合embedder订购的改变,这两个步骤,在接收交换关系,在早期的框架的图1。在第一步,认证信息提取部分和用来验证数据的完整性部分。如果第三方的图像资料已损坏后,提取水印、认证信息不匹配的图像数据、图像被视为nonauthentic。否则,水印图像被认为是真实的,例如,改变自水印插入。在后一种情况下,原始图像的数据可以通过在水印信息嵌入图片的步骤和恢复的部分,由认证水印。注意,在成功的验证,完整的最后的图像是由独特的重建的过程。
法律框架下的优势:反转顺序的认证和无损水印步骤(方面)结果之前减少计算量和额外的功能,描述如下。
8226;计算的优点及在验证阶段。
相对于早些时候,法律框架验证方法的图像重建前不需要原始图像。作为结果,图像重建一步时,可以跳过验证步骤)失败,或者该水印图像符合质量标准和完美的原是不需要的。计算的储蓄都大量由于复杂的重建的一步。
8226;计算的优点及在嵌套的阶段。
在客户机/服务器应用到一个单一的形象是用来多个客户与不同的签名(或time-stamps)、法律体系还额外com - putational优势。在这个案例中,该服务器执行the-often costly-pre-embedding一步只有一次,在- serts不同客户的要求签名。
8226;公众和私钥/支持。
法律框架也支持public-valida -兴物业的private-recovery /,而不需要另一个签名。当一个密钥验证签名是用于与私钥depen——邓特无损,框架支持公众水印图像水印的验证,但限制存取到完美的正本。
推荐律师服务: 若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询

为你推荐:

下载百度知道APP,抢鲜体验
使用百度知道APP,立即抢鲜体验。你的手机镜头里或许有别人想知道的答案。
扫描二维码下载
×

类别

我们会通过消息、邮箱等方式尽快将举报结果通知您。

说明

0/200

提交
取消

辅 助

模 式