• Title/Summary/Keyword: Chinese software

Search Result 221, Processing Time 0.039 seconds

A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters

  • Feng, Bin;Wang, Zhi-Hui;Wang, Duo;Chang, Ching-Yun;Li, Ming-Chu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.269-281
    • /
    • 2014
  • Compared to hiding information into digital image, hiding information into digital text file requires less storage space and smaller bandwidth for data transmission, and it has obvious universality and extensiveness. However, text files have low redundancy, so it is more difficult to hide information in text files. To overcome this difficulty, Wang et al. proposed a reversible information hiding scheme using left-right and up-down representations of Chinese characters, but, when the scheme is implemented, it does not provide good visual steganographic effectiveness, and the embedding and extracting processes are too complicated to be done with reasonable effort and cost. We observed that a lot of traditional and simplified Chinese characters look somewhat the same (also called lookalike), so we utilize this feature to propose a novel information hiding scheme for hiding secret data in lookalike Chinese characters. Comparing to Wang et al.'s scheme, the proposed scheme simplifies the embedding and extracting procedures significantly and improves the effectiveness of visual steganographic images. The experimental results demonstrated the advantages of our proposed scheme.

Analysis of the Open Source Software Sector in China

  • Wu Qiong;Klincewicz Krzysztof;Miyazaki Kmiko
    • Journal of Technology Innovation
    • /
    • v.14 no.2
    • /
    • pp.117-141
    • /
    • 2006
  • The paper describes the status and context of the Chinese Open Source Software (OSS) industry and ecosystem based on the analysis of the components of the China OSS Promotion Union. The analysis involves comparisons of several main Chinese developers of Linux operating system and makers of open source counterpart of the popular Microsoft Office package as well as several main Chinese OSS communities. Comparisons concern the technological and business aspect. The findings reveal peculiarities of the divergence of innovative activities of Chinese companies, as well as indicate that the strong government support may at the same time limit the technology selection under rigid competition, especially as foreign open source companies are found to be more focused on hobbyist developers and are able to maintain larger independent communities. Implications of the paper include the need to coordinate global development efforts and adjust science & technology policies in order to stimulate both the development and the diffusion of open source among Chinese companies and individual hobbyists.

  • PDF

Many-to-One Encryption and Authentication Scheme and Its Application

  • Lin, Xi-Jun;Wu, Chuan-Kun;Liu, Feng
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.18-27
    • /
    • 2008
  • This paper is to study a subclass of group-oriented cryptographic scheme: Many-to-one encryption and authentication scheme. The many-to-one encryption and authentication scheme is to solve a practical problem, i.e., the scenario that the number of the receivers is very small compared with the number of the senders and a receiver may serve millions of senders. Compared with the traditional methods, the burdens of the receiver and the KGC are reduced greatly. How to revoke a sender from his receiver's legitimate sender group is also proposed and it is efficient compared with some traditional methods. The proposed scheme is proven in the random oracle models. The computational complexity of our scheme is independent of the number of the senders. At the end of the paper, an example is given to show how to use our scheme in online software registration and update.

Development and Implementation of Multi-source Remote Sensing Imagery Fusion Based on PCI Geomatica

  • Yu, ZENG;Jixian, ZHANG;Qin, YAN;Pinglin, QIAO
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1334-1336
    • /
    • 2003
  • On the basis of comprehensive analysis and summarization of the image fusion algorithms provided by PCI Geomatica software, deficiencies in image fusion processing functions of this software are put forwarded in this paper. This limitation could be improved by further developing PCI Geomatica on the user’ side. Five effective algorithms could be added into PCI Geomatica. In this paper, the detailed description of how to customize and further develop PCI Geomatica by using Microsoft Visual C++ 6.0, PCI SDK Kit and GDB technique is also given. Through this way, the remote sensing imagery fusion functions of PCI Geomatica software can be extended.

  • PDF

An Implementation of Web-Based Chinese Letters Learning System Using Edutainment System

  • Lee, Eun-Ah;Kim, Tai-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.6
    • /
    • pp.806-813
    • /
    • 2004
  • Internet users are increasingly depending on acquiring and spreading a variety of information from home pages and they are also making use of education systems based on the internet. This study suggests an efficient method to make learners study Chinese Letters with ease and fun through the internet. The detailed methods of attaining Chinese letters Using Edutainment system are divided into 5 elements as follows. Utilizing the transition process of the letters, using games, applying animation and through switching over from Chinese letters to Korean letters and vice versa including making use of the sound of letters and their meanings.

  • PDF

Generic Constructions for Strong Designated Verifier Signature

  • Feng, Deng-Guo;Xu, Jing;Chen, Wei-Dong
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.159-172
    • /
    • 2011
  • A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer such that no one but the designated verifier can verify the signer's signatures. In this paper we present two generic frame works for constructing strong designated verifier signature schemes from any secure ring signature scheme and any deniable one-pass authenticated key exchange protocol, respectively. Compared with similar protocols, the instantiations of our construction achieve improved efficiency.

Possibility of Information Leakage through Analysis of Chinese Antivirus Software (중국 안티바이러스 제품 분석을 통한 정보유출 가능성 연구)

  • Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1369-1374
    • /
    • 2021
  • Recently, controversy has been raised over the security and safety of Chinese-made network equipment (Huawei 5G), apps (TikTok, etc.). In particular, according to the results of the Ministry of Defense investigation in 2020, malicious codes were found in CCTVs made in China that were delivered as military surveillance equipment used as a coast guard system, and specific information was remotely transmitted to a Chinese server. The safety issues of these Chinese security products can be questioned as being systematically led by the state rather than by companies or individuals. In this paper, we perform network and process level analysis of 360 Total Security(360 TS), a Chinese antivirus software. In addition, it compares and analyzes the domestic cloud-based vaccine V3 Lite product. Through this, the safety of Chinese security solutions is checked and information leakage and risks are suggested.

Business Collaboration Support for Offshore Software Development

  • Moriyasu, Takashi;Zu, Guowei;Tsuji, Hiroshi
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.275-284
    • /
    • 2010
  • Offshore software development (OSD) is international business collaboration. OSD projects often encounter intercultural and inter-linguistic problems disturbing the projects. Business documents are formal media of information and knowledge for OSD. While OSD documents should convey common understanding of the OSD products, the documents may contain unsuitable expressions which draw misunderstanding of the required products and offensive issues for the collaboration. Intercultural and inter-linguistic differences cause mistakes and inappropriate expressions. OSD from Japan to China is the largest in Asia, and Japanese language is often used in OSD documents. Large similarity is found between Japanese and Chinese in their languages, while many differences exist even for the same word. The similarity induces to write unsuitable expressions for both sides of OSD. To introduce risks for OSD projects caused by unsuitable or inappropriate expressions in OSD documents, we propose to apply a proofreading system of Japanese documents for OSD. Japanese consignor uses the system to refine OSD documents written by Japanese engineers for Chinese readers, and Chinese consignee uses it to refine Japanese documents written by Chinese Engineers as derivatives of OSD projects. Effectiveness of applying the proofreading system is discussed for actual projects.

Aparatus and Method for Inputting Chinese Based on Hunminjeongeum Using Korean Input Keyboard (기존 한글 키보드를 이용한 훈민정음 기반의 한글 병음 중국어 입력기 개발)

  • Sin, Eun-Joo;Choi, Ja-Ryoung;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.4
    • /
    • pp.549-557
    • /
    • 2020
  • Chinese is the most spoken language in the world. However, because Chinese is a hieroglyphic language, using Chinese in a digital environment is very inconvenient. Chinese users are using Pinyin for Chinese input, but the phonetic representation of the Latin alphabet is not good. Hunminjeongeum has an excellent phonetic representation which can improve Chinese usage in digital environment. Therefore, it is possible to improve the use of Chinese by Chinese users in digital environment and to help Korean users who are learning Chinese. Therefore, this paper proposes a Chinese input method using Hunminjeongeum. In addition, we develop an input software using this input method and verify its effectiveness by evaluating usability.

A Study on the Factors Affecting E-logistics Systems in the Chinese Logistics Industry

  • Yu, Liu;Bae, Jung-Han
    • International Commerce and Information Review
    • /
    • v.2 no.1
    • /
    • pp.25-48
    • /
    • 2009
  • With the rapid growth of e-logistics in the global logistics industry, it is important to gain further insight into this growing segment of Chinese logistics industry. The current situation in China consists of many small and medium-sized logistics firms. Furthermore, e-logistics is still relatively undeveloped in the majority of the Chinese logistics companies and presently there are still many problems unresolved. This paper attempted to review the concepts and theoretical background of e-logistics systems from previous studies. After acknowledging the essential issues related to e-logistics systems, a research model based on the theory acceptance model was designed and tested. The key factors to the e-logistics system (reliability, maintainability, software, facility and transportation) were validated through the modeling and testing process. Included in the modelling and testing process are other related factors of e-logistics process, logistics information system and added value as dependent variables in this model. The results of this study confirm that the e-logistics Process is affected by transportation, while maintainability and software factors influence logistics information system. reliability, maintainability, facility and transportation are significant factors associated with added value. This research aimed to provide theoretical and practical contribution to Chinese logistics companies and to give some insights into e-logistics system as a whole. The paper also provided some useful theoretical implication and practical guidelines for the development of e-logistics system in the chinese logistics industry.

  • PDF