计算机科学 ›› 2016, Vol. 43 ›› Issue (Z11): 417-421.doi: 10.11896/j.issn.1002-137X.2016.11A.095

• 信息安全 • 上一篇    下一篇

一种云端信息安全字形的生成模型

张莉,栗青生,刘泉   

  1. 湖北经济学院工商管理学院 武汉430205,浙江传媒学院电子信息学院 杭州310018,武汉理工大学信息工程学院 武汉430070
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金资助

Chinese Character Generation Model for Cloud Information Security

ZHANG Li, LI Qing-sheng and LIU Quan   

  • Online:2018-12-01 Published:2018-12-01

摘要: 提出了一种云端信息安全字形的生成模型。该模型将汉字的字形抽象为汉字结构模式和汉字的风格模式,然后通过定义有效的汉字结构输出和汉字笔画生成方案,动态地生成了可用于信息安全保护的信息安全字形。该模型实现了汉字字形的Web存储和在客户端的特征字形的输出的监控,克服了现代汉字由于整字编码而导致的汉字信息在云端安全服务方面的不足,为汉字信息的云端存储和云端数据安全服务保护提供了一种有效的策略和方法;同时,也为设计更深层次的云端汉字信息服务系统奠定了基础。

关键词: 汉字,笔画,字形描述,字形生成,信息安全

Abstract: This paper presented a Chinese generation model for cloud information security. By defining the effective Chinese character strokes output method and the Chinese character structure dynamic generation scheme,the model,which includes the structure and the style of Chinese character,can be used for the information security and protection.Compared with the Chinese character coding system,the description system makes it easier to store the Chinese characters into the Web and monitor output in the client .It overcomes the shortcomings that caused by lacking of service information security in entire encoding of modern Chinese characters.It provides an effective strategy and method for cloud storage and cloud data security services,and at same time,it also provides a deeper cloud Chinese character information service basis for the system of information in the cloud.

Key words: Chinese character,Strokes,Font description,Font generation,Information security

[1] Mandolkar V M.RSE for Electronic Text document Protection[C]∥2010 2nd International Conference on Computer Engineering and Technology.2010:30-43
[2] Meng Ying-jie,Si Lei,Shi Yao.A Chinese Texts Zero-Watermarking Algorithm Based on Vector Graphics [J].Journal of Computer Research and Development,2009,46(supp):22-26
[3] Meng Ying-jie,Guo Tao,Guo Zhi-hua,et al.Chinese Text Zero-watermrk Based on Sentence’s Entropy[C]∥Proceedings of the International Conference on Multimedia Technology(ICMT 2010).IEEE Computer Society,2010:864-867
[4] Yamada T.Use of both invisible and emergable watermarks to deter illegal copying of images[C]∥17th International Confe-rence in Knowledge Based and Intelligent Information and Engineering Systems KES 2013.2013:401-410
[5] 栗青生,张莉,熊晶.基于云端信息保护的汉字计算模型[J].计算机科学,2015,42(11):73-79
[6] 栗青生,熊晶,吴琴霞,等.基于特征加权的汉字点笔画生成研究[J].北京大学学报(自然科学版),2014,50(1):153-160
[7] 吴琴霞,栗青生,高峰.基于语义构件的甲骨文字库自动生成技术研究[J].北京大学学报(自然科学版),2014,50(1):161-166
[8] 吴琴霞,栗青生.基于动态描述库的汉字字形自动生成技术研究[J].科学技术与工程,2013,13(15):4425-4431
[9] 栗青生,吴琴霞,杨玉星.甲骨文字形动态描述库及其字形生成技术研究[J].北京大学学报(自然科学版),2013,49(1):61-67
[10] 栗青生,吴琴霞,王蕾.基于甲骨文字形动态描述库的甲骨文输入方法[J].中文信息学报,2012(4):45-63

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!