哪位英语高手能帮我翻译下面这段英文,不要机器翻译的,谢!!给分!!
AdvantagesoftheLAWFramework:Thereversalintheorderofauthenticationandlosslesswatermark...
Advantages of the LAW Framework: The reversal in the order of authentication and lossless watermarking steps (with respect to earlier methods [9]–[14]) results in reduced computational burden and additional functionality, described as follows.
• Computational advantages in the verification phase.
As opposed to earlier methods, the LAW framework validates the images before attempting to reconstruct the original image. As a result, the image reconstruction step may be skipped when either a) the verification step fails, or b) the watermarked image meets the quality criteria and the perfect original is not needed. The computational savings are often substantial due to the complexity of the reconstruction step.
• Computational advantages in the embedding phase.
In client/server applications where a single image is served to multiple clients with different signatures (or time-stamps), the LAW framework has additional com- putational advantages. In this case, the server performs the—often costly—pre-embedding step only once and in- serts different signatures as requested by clients.
• Public/private-key support.
The LAW framework also supports the public-valida- tion/private-recovery property of [16], without the need for a second signature. When a public-key authentication signature is used in conjunction with a private-key depen- dent lossless watermark, the framework supports public validation of the watermarked image, but limits access to the perfect original.
• Accurate tamper localization.
Another advantage of the new framework is the ability to support efficient and accurate tamper localization. Most (nonreversible) authentication watermarks (e.g., [13], [17]–[19]) offer the ability to pin-point the image regions that have been tampered. This often involves performing the integrity verification on per block basis, where block dimensions determine the localization ac- curacy. Existing lossless authentication watermarks may provide the same functionality in a similar manner. Nev- ertheless, lossless data embedding methods used in those schemes are not as efficient when applied on small image blocks.2 As a result, accurate tamper localization (using small image blocks) has not been feasible with the ex- isting lossless authentication watermarks. In the LAW framework, lossless data embedding (pre-embedding) al- gorithm processes the whole image in a single step with high efficiency. The resultant capacity is then shared between small blocks for authentication watermarking.
• Implementation flexibility.
The LAW framework may be implemented using dif- ferent lossless data embedding and authentication wa- termarking algorithms, as long as the necessary coordi- nation between two steps is established. For instance, a wavelet based reversible embedding scheme [11] may be followed by a spatial domain LSB authentication water- mark [17]. 展开
• Computational advantages in the verification phase.
As opposed to earlier methods, the LAW framework validates the images before attempting to reconstruct the original image. As a result, the image reconstruction step may be skipped when either a) the verification step fails, or b) the watermarked image meets the quality criteria and the perfect original is not needed. The computational savings are often substantial due to the complexity of the reconstruction step.
• Computational advantages in the embedding phase.
In client/server applications where a single image is served to multiple clients with different signatures (or time-stamps), the LAW framework has additional com- putational advantages. In this case, the server performs the—often costly—pre-embedding step only once and in- serts different signatures as requested by clients.
• Public/private-key support.
The LAW framework also supports the public-valida- tion/private-recovery property of [16], without the need for a second signature. When a public-key authentication signature is used in conjunction with a private-key depen- dent lossless watermark, the framework supports public validation of the watermarked image, but limits access to the perfect original.
• Accurate tamper localization.
Another advantage of the new framework is the ability to support efficient and accurate tamper localization. Most (nonreversible) authentication watermarks (e.g., [13], [17]–[19]) offer the ability to pin-point the image regions that have been tampered. This often involves performing the integrity verification on per block basis, where block dimensions determine the localization ac- curacy. Existing lossless authentication watermarks may provide the same functionality in a similar manner. Nev- ertheless, lossless data embedding methods used in those schemes are not as efficient when applied on small image blocks.2 As a result, accurate tamper localization (using small image blocks) has not been feasible with the ex- isting lossless authentication watermarks. In the LAW framework, lossless data embedding (pre-embedding) al- gorithm processes the whole image in a single step with high efficiency. The resultant capacity is then shared between small blocks for authentication watermarking.
• Implementation flexibility.
The LAW framework may be implemented using dif- ferent lossless data embedding and authentication wa- termarking algorithms, as long as the necessary coordi- nation between two steps is established. For instance, a wavelet based reversible embedding scheme [11] may be followed by a spatial domain LSB authentication water- mark [17]. 展开
2个回答
展开全部
法律框架下的优势:反转顺序的认证和无损水印步骤(关于早期方法[9],[14])导致减少计算量和额外的功能,描述如下。
在验证计算优势•阶段。
相对于早些时候,法律框架验证方法的图像重建前不需要原始图像。作为结果,图像重建一步时,可以跳过验证步骤)失败,或者该水印图像符合质量标准和完美的原是不需要的。计算的储蓄都大量由于复杂的重建的一步。
在嵌套的计算优势•阶段。
在客户机/服务器应用到一个单一的形象是用来多个客户与不同的签名(或time-stamps)、法律体系还额外com - putational优势。在这个案例中,该服务器执行the-often costly-pre-embedding一步只有一次,在- serts不同客户的要求签名。
公众/私钥•支持。
法律框架也支持public-valida -兴物业的private-recovery /[16],而不需要另一个签名。当一个密钥验证签名是用于与私钥depen——邓特无损,框架支持公众水印图像水印的验证,但限制存取到完美的正本。
准确定位。动•
新架构的另一个好处是能够支持效率和准确率篡改定位。大多数(nonreversible)认证的水印(例如:[13]、[17 - 19][提供精确的能力已经上传图像的地区。这通常包含重复的完整性验证上,每一块基础块尺寸确定本地化ac -在法院中。现有的图片可能提供认证水印相同的功能以类似的方式。书评——ertheless烧录资料嵌入方法,这些方案都不高,当应用于小的形象blocks.2作为结果,准确定位(使用小滩涂图像块)已经不可行的前妻内部无损认证水印。在法律框架、无损压缩数据嵌入(pre-embedding)铝- gorithm进程在一个单一的整体形象和高效率。然后合成能力之间分享的小块认证的水印。
•实施的灵活性。
可能实施的法律框架,用不同的数据进行无损termarking认证佤族——嵌入和算法,只要必要的coordi -国家之间建立了两个步骤。例如,一个基于小波变换的可逆嵌入方案[11]可能随后空间域认证水-马克(LSB 17]。
在验证计算优势•阶段。
相对于早些时候,法律框架验证方法的图像重建前不需要原始图像。作为结果,图像重建一步时,可以跳过验证步骤)失败,或者该水印图像符合质量标准和完美的原是不需要的。计算的储蓄都大量由于复杂的重建的一步。
在嵌套的计算优势•阶段。
在客户机/服务器应用到一个单一的形象是用来多个客户与不同的签名(或time-stamps)、法律体系还额外com - putational优势。在这个案例中,该服务器执行the-often costly-pre-embedding一步只有一次,在- serts不同客户的要求签名。
公众/私钥•支持。
法律框架也支持public-valida -兴物业的private-recovery /[16],而不需要另一个签名。当一个密钥验证签名是用于与私钥depen——邓特无损,框架支持公众水印图像水印的验证,但限制存取到完美的正本。
准确定位。动•
新架构的另一个好处是能够支持效率和准确率篡改定位。大多数(nonreversible)认证的水印(例如:[13]、[17 - 19][提供精确的能力已经上传图像的地区。这通常包含重复的完整性验证上,每一块基础块尺寸确定本地化ac -在法院中。现有的图片可能提供认证水印相同的功能以类似的方式。书评——ertheless烧录资料嵌入方法,这些方案都不高,当应用于小的形象blocks.2作为结果,准确定位(使用小滩涂图像块)已经不可行的前妻内部无损认证水印。在法律框架、无损压缩数据嵌入(pre-embedding)铝- gorithm进程在一个单一的整体形象和高效率。然后合成能力之间分享的小块认证的水印。
•实施的灵活性。
可能实施的法律框架,用不同的数据进行无损termarking认证佤族——嵌入和算法,只要必要的coordi -国家之间建立了两个步骤。例如,一个基于小波变换的可逆嵌入方案[11]可能随后空间域认证水-马克(LSB 17]。
展开全部
Advantages of the LAW Framework: The reversal in the order of authentication and lossless watermarking steps (with respect to earlier methods [9]–[14]) results in reduced computational burden and additional functionality, described as follows.
• Computational advantages in the verification phase.
As opposed to earlier methods, the LAW framework validates the images before attempting to reconstruct the original image. As a result, the image reconstruction step may be skipped when either a) the verification step fails, or b) the watermarked image meets the quality criteria and the perfect original is not needed. The computational savings are often substantial due to the complexity of the reconstruction step.
• Computational advantages in the embedding phase.
In client/server applications where a single image is served to multiple clients with different signatures (or time-stamps), the LAW framework has additional com- putational advantages. In this case, the server performs the—often costly—pre-embedding step only once and in- serts different signatures as requested by clients.
• Public/private-key support.
The LAW framework also supports the public-valida- tion/private-recovery property of [16], without the need for a second signature. When a public-key authentication signature is used in conjunction with a private-key depen- dent lossless watermark, the framework supports public validation of the watermarked image, but limits access to the perfect original.
• Accurate tamper localization.
Another advantage of the new framework is the ability to support efficient and accurate tamper localization. Most (nonreversible) authentication watermarks (e.g., [13], [17]–[19]) offer the ability to pin-point the image regions that have been tampered. This often involves performing the integrity verification on per block basis, where block dimensions determine the localization ac- curacy. Existing lossless authentication watermarks may provide the same functionality in a similar manner. Nev- ertheless, lossless data embedding methods used in those schemes are not as efficient when applied on small image blocks.2 As a result, accurate tamper localization (using small image blocks) has not been feasible with the ex- isting lossless authentication watermarks. In the LAW framework, lossless data embedding (pre-embedding) al- gorithm processes the whole image in a single step with high efficiency. The resultant capacity is then shared between small blocks for authentication watermarking.
• Implementation flexibility.
The LAW framework may be implemented using dif- ferent lossless data embedding and authentication wa- termarking algorithms, as long as the necessary coordi- nation between two steps is established. For instance, a wavelet based reversible embedding scheme [11] may be followed by a spatial domain LSB authentication water- mark [17].
• Computational advantages in the verification phase.
As opposed to earlier methods, the LAW framework validates the images before attempting to reconstruct the original image. As a result, the image reconstruction step may be skipped when either a) the verification step fails, or b) the watermarked image meets the quality criteria and the perfect original is not needed. The computational savings are often substantial due to the complexity of the reconstruction step.
• Computational advantages in the embedding phase.
In client/server applications where a single image is served to multiple clients with different signatures (or time-stamps), the LAW framework has additional com- putational advantages. In this case, the server performs the—often costly—pre-embedding step only once and in- serts different signatures as requested by clients.
• Public/private-key support.
The LAW framework also supports the public-valida- tion/private-recovery property of [16], without the need for a second signature. When a public-key authentication signature is used in conjunction with a private-key depen- dent lossless watermark, the framework supports public validation of the watermarked image, but limits access to the perfect original.
• Accurate tamper localization.
Another advantage of the new framework is the ability to support efficient and accurate tamper localization. Most (nonreversible) authentication watermarks (e.g., [13], [17]–[19]) offer the ability to pin-point the image regions that have been tampered. This often involves performing the integrity verification on per block basis, where block dimensions determine the localization ac- curacy. Existing lossless authentication watermarks may provide the same functionality in a similar manner. Nev- ertheless, lossless data embedding methods used in those schemes are not as efficient when applied on small image blocks.2 As a result, accurate tamper localization (using small image blocks) has not been feasible with the ex- isting lossless authentication watermarks. In the LAW framework, lossless data embedding (pre-embedding) al- gorithm processes the whole image in a single step with high efficiency. The resultant capacity is then shared between small blocks for authentication watermarking.
• Implementation flexibility.
The LAW framework may be implemented using dif- ferent lossless data embedding and authentication wa- termarking algorithms, as long as the necessary coordi- nation between two steps is established. For instance, a wavelet based reversible embedding scheme [11] may be followed by a spatial domain LSB authentication water- mark [17].
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询