• 제목/요약/키워드: Chinese software

검색결과 221건 처리시간 0.021초

A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters

  • Feng, Bin;Wang, Zhi-Hui;Wang, Duo;Chang, Ching-Yun;Li, Ming-Chu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권1호
    • /
    • pp.269-281
    • /
    • 2014
  • Compared to hiding information into digital image, hiding information into digital text file requires less storage space and smaller bandwidth for data transmission, and it has obvious universality and extensiveness. However, text files have low redundancy, so it is more difficult to hide information in text files. To overcome this difficulty, Wang et al. proposed a reversible information hiding scheme using left-right and up-down representations of Chinese characters, but, when the scheme is implemented, it does not provide good visual steganographic effectiveness, and the embedding and extracting processes are too complicated to be done with reasonable effort and cost. We observed that a lot of traditional and simplified Chinese characters look somewhat the same (also called lookalike), so we utilize this feature to propose a novel information hiding scheme for hiding secret data in lookalike Chinese characters. Comparing to Wang et al.'s scheme, the proposed scheme simplifies the embedding and extracting procedures significantly and improves the effectiveness of visual steganographic images. The experimental results demonstrated the advantages of our proposed scheme.

Analysis of the Open Source Software Sector in China

  • Wu Qiong;Klincewicz Krzysztof;Miyazaki Kmiko
    • 기술혁신연구
    • /
    • 제14권2호
    • /
    • pp.117-141
    • /
    • 2006
  • The paper describes the status and context of the Chinese Open Source Software (OSS) industry and ecosystem based on the analysis of the components of the China OSS Promotion Union. The analysis involves comparisons of several main Chinese developers of Linux operating system and makers of open source counterpart of the popular Microsoft Office package as well as several main Chinese OSS communities. Comparisons concern the technological and business aspect. The findings reveal peculiarities of the divergence of innovative activities of Chinese companies, as well as indicate that the strong government support may at the same time limit the technology selection under rigid competition, especially as foreign open source companies are found to be more focused on hobbyist developers and are able to maintain larger independent communities. Implications of the paper include the need to coordinate global development efforts and adjust science & technology policies in order to stimulate both the development and the diffusion of open source among Chinese companies and individual hobbyists.

  • PDF

Many-to-One Encryption and Authentication Scheme and Its Application

  • Lin, Xi-Jun;Wu, Chuan-Kun;Liu, Feng
    • Journal of Communications and Networks
    • /
    • 제10권1호
    • /
    • pp.18-27
    • /
    • 2008
  • This paper is to study a subclass of group-oriented cryptographic scheme: Many-to-one encryption and authentication scheme. The many-to-one encryption and authentication scheme is to solve a practical problem, i.e., the scenario that the number of the receivers is very small compared with the number of the senders and a receiver may serve millions of senders. Compared with the traditional methods, the burdens of the receiver and the KGC are reduced greatly. How to revoke a sender from his receiver's legitimate sender group is also proposed and it is efficient compared with some traditional methods. The proposed scheme is proven in the random oracle models. The computational complexity of our scheme is independent of the number of the senders. At the end of the paper, an example is given to show how to use our scheme in online software registration and update.

Development and Implementation of Multi-source Remote Sensing Imagery Fusion Based on PCI Geomatica

  • Yu, ZENG;Jixian, ZHANG;Qin, YAN;Pinglin, QIAO
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2003년도 Proceedings of ACRS 2003 ISRS
    • /
    • pp.1334-1336
    • /
    • 2003
  • On the basis of comprehensive analysis and summarization of the image fusion algorithms provided by PCI Geomatica software, deficiencies in image fusion processing functions of this software are put forwarded in this paper. This limitation could be improved by further developing PCI Geomatica on the user’ side. Five effective algorithms could be added into PCI Geomatica. In this paper, the detailed description of how to customize and further develop PCI Geomatica by using Microsoft Visual C++ 6.0, PCI SDK Kit and GDB technique is also given. Through this way, the remote sensing imagery fusion functions of PCI Geomatica software can be extended.

  • PDF

An Implementation of Web-Based Chinese Letters Learning System Using Edutainment System

  • Lee, Eun-Ah;Kim, Tai-Suk
    • 한국멀티미디어학회논문지
    • /
    • 제7권6호
    • /
    • pp.806-813
    • /
    • 2004
  • Internet users are increasingly depending on acquiring and spreading a variety of information from home pages and they are also making use of education systems based on the internet. This study suggests an efficient method to make learners study Chinese Letters with ease and fun through the internet. The detailed methods of attaining Chinese letters Using Edutainment system are divided into 5 elements as follows. Utilizing the transition process of the letters, using games, applying animation and through switching over from Chinese letters to Korean letters and vice versa including making use of the sound of letters and their meanings.

  • PDF

Generic Constructions for Strong Designated Verifier Signature

  • Feng, Deng-Guo;Xu, Jing;Chen, Wei-Dong
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.159-172
    • /
    • 2011
  • A designated verifier signature is a special type of digital signature, which convinces a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party. A strong designated verifier signature scheme enhances the privacy of the signer such that no one but the designated verifier can verify the signer's signatures. In this paper we present two generic frame works for constructing strong designated verifier signature schemes from any secure ring signature scheme and any deniable one-pass authenticated key exchange protocol, respectively. Compared with similar protocols, the instantiations of our construction achieve improved efficiency.

중국 안티바이러스 제품 분석을 통한 정보유출 가능성 연구 (Possibility of Information Leakage through Analysis of Chinese Antivirus Software)

  • 박원형
    • 한국정보통신학회논문지
    • /
    • 제25권10호
    • /
    • pp.1369-1374
    • /
    • 2021
  • 최근, 중국산 네트워크 장비(화웨이 5G), 앱(틱톡 등) 및 각종 중국산 제품들에 대한 보안 안전성에 대한 논란이 제기되고 있으며, 중국 제품이나 소프트웨어를 사용하는 사람들의 정보를 수집하여 불법적인 사건들이 발생하고 있다. 특히, 2020년 국방부 조사결과에 따르면 해안 경계시스템으로 사용하는 군 감시 장비로 납품 받은 중국산 CCTV에서 악성코드가 발견되어 원격으로 중국 서버로 특정 정보가 전송되는 사고가 발생 하였다. 이러한 중국 보안 제품들의 안전성 문제는 기업이나 개인의 문제보다는 조직적으로 국가에서 주도하는 것을 의심해 볼 수 있다. 본 논문에서는 중국산 안티바이러스 소프트웨어인 360 Total Security(이하 360 TS)에 대한 네트워크 및 프로세스 수준의 분석을 수행한다. 또한, 국산 클라우드 기반 백신 V3 Lite제품과 비교 분석 한다. 이를 통해 중국 보안솔루션의 안전성을 점검하여 정보유출 및 위험성을 제시 한다.

Business Collaboration Support for Offshore Software Development

  • Moriyasu, Takashi;Zu, Guowei;Tsuji, Hiroshi
    • Industrial Engineering and Management Systems
    • /
    • 제9권3호
    • /
    • pp.275-284
    • /
    • 2010
  • Offshore software development (OSD) is international business collaboration. OSD projects often encounter intercultural and inter-linguistic problems disturbing the projects. Business documents are formal media of information and knowledge for OSD. While OSD documents should convey common understanding of the OSD products, the documents may contain unsuitable expressions which draw misunderstanding of the required products and offensive issues for the collaboration. Intercultural and inter-linguistic differences cause mistakes and inappropriate expressions. OSD from Japan to China is the largest in Asia, and Japanese language is often used in OSD documents. Large similarity is found between Japanese and Chinese in their languages, while many differences exist even for the same word. The similarity induces to write unsuitable expressions for both sides of OSD. To introduce risks for OSD projects caused by unsuitable or inappropriate expressions in OSD documents, we propose to apply a proofreading system of Japanese documents for OSD. Japanese consignor uses the system to refine OSD documents written by Japanese engineers for Chinese readers, and Chinese consignee uses it to refine Japanese documents written by Chinese Engineers as derivatives of OSD projects. Effectiveness of applying the proofreading system is discussed for actual projects.

기존 한글 키보드를 이용한 훈민정음 기반의 한글 병음 중국어 입력기 개발 (Aparatus and Method for Inputting Chinese Based on Hunminjeongeum Using Korean Input Keyboard)

  • 신은주;최자령;임순범
    • 한국멀티미디어학회논문지
    • /
    • 제23권4호
    • /
    • pp.549-557
    • /
    • 2020
  • Chinese is the most spoken language in the world. However, because Chinese is a hieroglyphic language, using Chinese in a digital environment is very inconvenient. Chinese users are using Pinyin for Chinese input, but the phonetic representation of the Latin alphabet is not good. Hunminjeongeum has an excellent phonetic representation which can improve Chinese usage in digital environment. Therefore, it is possible to improve the use of Chinese by Chinese users in digital environment and to help Korean users who are learning Chinese. Therefore, this paper proposes a Chinese input method using Hunminjeongeum. In addition, we develop an input software using this input method and verify its effectiveness by evaluating usability.

A Study on the Factors Affecting E-logistics Systems in the Chinese Logistics Industry

  • Yu, Liu;Bae, Jung-Han
    • International Commerce and Information Review
    • /
    • 제2권1호
    • /
    • pp.25-48
    • /
    • 2009
  • With the rapid growth of e-logistics in the global logistics industry, it is important to gain further insight into this growing segment of Chinese logistics industry. The current situation in China consists of many small and medium-sized logistics firms. Furthermore, e-logistics is still relatively undeveloped in the majority of the Chinese logistics companies and presently there are still many problems unresolved. This paper attempted to review the concepts and theoretical background of e-logistics systems from previous studies. After acknowledging the essential issues related to e-logistics systems, a research model based on the theory acceptance model was designed and tested. The key factors to the e-logistics system (reliability, maintainability, software, facility and transportation) were validated through the modeling and testing process. Included in the modelling and testing process are other related factors of e-logistics process, logistics information system and added value as dependent variables in this model. The results of this study confirm that the e-logistics Process is affected by transportation, while maintainability and software factors influence logistics information system. reliability, maintainability, facility and transportation are significant factors associated with added value. This research aimed to provide theoretical and practical contribution to Chinese logistics companies and to give some insights into e-logistics system as a whole. The paper also provided some useful theoretical implication and practical guidelines for the development of e-logistics system in the chinese logistics industry.

  • PDF