P-Sets and the Reduction-Identification of F-Information Camouflage

Article Preview

Abstract:

P-sets is a set pair composed of internal P-set and outer P-set, which has the dynamic characteristic. The generation concept, camouflage measure theorem and reduction theorem of F- information camouflage are given, and next the reduction-identification criterion and identification method of F-information camouflage. Using the above theory results, the application of the identification-reduction of F-information camouflage.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

4201-4204

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Kaiquan Shi, P-sets and its applications[J]. An International Journal Advances in Systems Science and Applications, 2009, 9(2): 209-219.

Google Scholar

[2] Kaiquan Shi, P-sets[J]. Journal of Shandong University (Natural Science), 2008, 43(11): 77-84(in Chinese).

Google Scholar

[3] Li Zhang, Yuquan Cui, Kaiquan Shi, Outer P-sets and data internal-recovery[J]. System Engineering and Electronics, 2010, 32(6): 1233-1238(in Chinese).

Google Scholar

[4] Yuying Li, Li Zhang, Kaiquan Shi, Generation and recovery of compressed data and redundant data[J]. Quantitative Logic and Soft Computing, 2010, 1(2): 661-672.

DOI: 10.1007/978-3-642-15660-1_67

Google Scholar

[5] Yang Wang, Hongqin Geng, Kaiquan Shi, The mining of dynamic information based on P- sets and its application[J]. An International Journal Advances in Systems Science and Applications, 2010, 10(2): 234-240.

Google Scholar

[6] Kaiquan Shi, Xiuhong Li, Camouflaged information identification and its application [J]. An International Journal Advances in Systems Science and Applications, 2010, 10(2): 157-167.

Google Scholar

[7] Ruohui Liu, Baocang Liu, Kaiquan Shi, outer P-set and F-information camouflage[J]. System Engineering and Electronics, 2011, 33(1): 116-119.

Google Scholar

[8] Hongqin Geng, Guanyu Zhang, Kaiquan Shi, F-information camouflage and camouflage- recovery identification[J]. Computer Science, 2011, 38(2): 241-245.

Google Scholar

[9] Koblitz N, Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(17): 203-209.

DOI: 10.1090/s0025-5718-1987-0866109-5

Google Scholar

[10] Stallings W, Cryptography and network security principles and practice, London: Prentice-Hall Int Ltd, 1999, 193-206.

Google Scholar