A method of utilizing JPEG compression information hiding for resisting tampering

碩士 === 國立中山大學 === 資訊工程學系研究所 === 107 === Certificate can prove something that other people can trust it. Certificate must be verified by CA(Certificate Authority) and not tampered by attackers. How to make it work is a necessary issue. Using hash function can make certificate be verified. This method...

Full description

Bibliographic Details
Main Authors: Chun-Yi Ho, 何俊毅
Other Authors: John Y. Chiang
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/m65w6z