A method of utilizing JPEG compression information hiding for resisting tampering
碩士 === 國立中山大學 === 資訊工程學系研究所 === 107 === Certificate can prove something that other people can trust it. Certificate must be verified by CA(Certificate Authority) and not tampered by attackers. How to make it work is a necessary issue. Using hash function can make certificate be verified. This method...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/m65w6z |