Computer Science ›› 2016, Vol. 43 ›› Issue (Z11): 417-421.doi: 10.11896/j.issn.1002-137X.2016.11A.095

Previous Articles     Next Articles

Chinese Character Generation Model for Cloud Information Security

ZHANG Li, LI Qing-sheng and LIU Quan   

  • Online:2018-12-01 Published:2018-12-01

Abstract: This paper presented a Chinese generation model for cloud information security. By defining the effective Chinese character strokes output method and the Chinese character structure dynamic generation scheme,the model,which includes the structure and the style of Chinese character,can be used for the information security and protection.Compared with the Chinese character coding system,the description system makes it easier to store the Chinese characters into the Web and monitor output in the client .It overcomes the shortcomings that caused by lacking of service information security in entire encoding of modern Chinese characters.It provides an effective strategy and method for cloud storage and cloud data security services,and at same time,it also provides a deeper cloud Chinese character information service basis for the system of information in the cloud.

Key words: Chinese character,Strokes,Font description,Font generation,Information security

[1] Mandolkar V M.RSE for Electronic Text document Protection[C]∥2010 2nd International Conference on Computer Engineering and Technology.2010:30-43
[2] Meng Ying-jie,Si Lei,Shi Yao.A Chinese Texts Zero-Watermarking Algorithm Based on Vector Graphics [J].Journal of Computer Research and Development,2009,46(supp):22-26
[3] Meng Ying-jie,Guo Tao,Guo Zhi-hua,et al.Chinese Text Zero-watermrk Based on Sentence’s Entropy[C]∥Proceedings of the International Conference on Multimedia Technology(ICMT 2010).IEEE Computer Society,2010:864-867
[4] Yamada T.Use of both invisible and emergable watermarks to deter illegal copying of images[C]∥17th International Confe-rence in Knowledge Based and Intelligent Information and Engineering Systems KES 2013.2013:401-410
[5] 栗青生,张莉,熊晶.基于云端信息保护的汉字计算模型[J].计算机科学,2015,42(11):73-79
[6] 栗青生,熊晶,吴琴霞,等.基于特征加权的汉字点笔画生成研究[J].北京大学学报(自然科学版),2014,50(1):153-160
[7] 吴琴霞,栗青生,高峰.基于语义构件的甲骨文字库自动生成技术研究[J].北京大学学报(自然科学版),2014,50(1):161-166
[8] 吴琴霞,栗青生.基于动态描述库的汉字字形自动生成技术研究[J].科学技术与工程,2013,13(15):4425-4431
[9] 栗青生,吴琴霞,杨玉星.甲骨文字形动态描述库及其字形生成技术研究[J].北京大学学报(自然科学版),2013,49(1):61-67
[10] 栗青生,吴琴霞,王蕾.基于甲骨文字形动态描述库的甲骨文输入方法[J].中文信息学报,2012(4):45-63

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .