首页
登录
职称英语
No document is safe any more. Faking once the domain of skilled deceivers th
No document is safe any more. Faking once the domain of skilled deceivers th
游客
2023-07-17
64
管理
问题
No document is safe any more. Faking once the domain of skilled deceivers that used expensive engraving (雕刻) and printing equipment, has gone mainstream since the price of desktop-publishing systems has dropped. In ancient times, faking was a hanging offence. Today, desktop counterfeiters have little reason to worry about prison, because the systems they use are universal and there is no means of tracing forged documents to the machine that produced them. This, however, may soon change thanks to technology development by George Chiu, an anti-faking engineer.
His approach is based on detecting imperfections in the print quality of documents. Old-school court scientists were able to trace documents to particular typewriters based on quirks (弯曲) of the individual keys. He employs a similar approach, exploiting the fact that the rotating drums and mirrors inside a printer are imperfect pieces of engineering which leave unique patterns of banding in their products.
Although these patterns are invisible to the naked eye, they can be detected and analyzed by computer programs, and it is these that Dr. Chiu has spent the past year devising. So far, he cannot trace individual printers, but he can tell pretty reliably which make and model of printer was used to create a document.
That, however, is only the beginning. While it remains to be seen whether it will be possible to trace a counterfeit (伪造的) document back to its guilty creator on the basis of manufacturing imperfections, Dr. Chiu is now working out ways to make those imperfections deliberate. He wants to modify the printing process so that unique, invisible signatures can be incorporated into each machine produced which would make any document traceable.
Ironically, it was after years of collaborating with printing companies to reduce banding and thus increase the quality of prints, that he came up with the idea of introducing artificial banding that could encode identification information into a document. Using the banding patterns of printers to secure documents would be both cheap to implement and hard, if not impossible, for those without specialist knowledge and hardware to hide out.
Not surprising, the American Secret Service is monitoring the progress of this research very closely, and is providing guidelines to help Dr. Chiu to travel in what the service thinks is the right direction, which is fine for catching criminals. But how the legal users of printers will react to Big Brother being able to track any document back to its source remains to be seen. [br] According to Dr. Chiu, what makes it possible to track down any paper is to .
选项
A、make all the imperfections of machines deliberately
B、find out the creator of the counterfeit document
C、allow more imperfectly designed printers to be sold
D、mark all the printers in a special and secret way
答案
D
解析
推理判断题。原文说“他想对印刷过程进行调整,以便使独一无二的、肉眼看不见的标记被植入每一台机器中,这样任何文件都能够被追踪。”由此可以推知,让任何文件都能被追踪的方式是以特殊和秘密的方式在打印机上做出标记。D)与之相符,故为正确答案。
转载请注明原文地址:https://tihaiku.com/zcyy/2844307.html
相关试题推荐
Atop-leveldomainisthepartofanInternetaddressafterthedot.Themos
Atop-leveldomainisthepartofanInternetaddressafterthedot.Themos
Atop-leveldomainisthepartofanInternetaddressafterthedot.Themos
Atop-leveldomainisthepartofanInternetaddressafterthedot.Themos
Atop-leveldomainisthepartofanInternetaddressafterthedot.Themos
Atop-leveldomainisthepartofanInternetaddressafterthedot.Themos
Atop-leveldomainisthepartofanInternetaddressafterthedot.Themos
Nodocumentissafeanymore.Fakingoncethedomainofskilleddeceiversth
Nodocumentissafeanymore.Fakingoncethedomainofskilleddeceiversth
Awell-documentedbodyofinformationexists.Itshowsthatnoisecan【C1】___
随机试题
[originaltext]W:Hello,John,youmustbepleased.Afterall,howmanystudents
Childrenmodelthemselveslargelyontheirparents.Theydoso【C1】______thro
根据《电子文件归档与管理规范》规定,不允许()作为归档电子文件长期保存的载体。
国务院要求,强化部门安全生产职责,落实一岗双责,做到安全责任、()“五到位”,
右边四个图形中,只有一个是由左边的四个图形拼合(只能通过上、下、左、右平移)而成
3/2接线型式断路器保护配置方案()。(A)对于边断路器保护,当重合闸需要检同
下面几项不属于抵债资产的保管方式的是()。 A.亲自保管B.上收保管 C
在平衡计分卡框架中,关于一个企业核心竞争力的评价,应该主要关注平衡计分卡的( )
资源税的纳税人包括( )。A.在中国境内开采并销售煤炭的个人 B.在中国境内
预计资产负债表需要以计划期开始日的资产负债表为基础,它是编制全面预算的终点。(
最新回复
(
0
)