您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

《山东大学学报(理学版)》 ›› 2022, Vol. 57 ›› Issue (11): 1-9.doi: 10.6040/j.issn.1671-9352.0.2022.341

• •    

信息融合-分离与隐性属性的显性特征

陈淑珍1,3,李守伟2,史开泉1*   

  1. 1.山东大学数学学院, 山东 济南 250100;2.山东师范大学商学院, 山东 济南 250014;3.福建警察学院计算机与信息安全管理系, 福建 福州 350007
  • 发布日期:2022-11-10
  • 作者简介:陈淑珍(1969— ),女,硕士,副教授,研究方向为大数据分析与信息安全. E-mail:chenshuzhen@fjpsc.edu.cn*通信作者简介:史开泉(1945— ),男,教授,博士生导师,研究方向为信息融合与数学模型交叉研究. E-mail:shikq@sdu.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(71663010);山东省自然科学基金资助项目(ZR2019MG015);福建省科技厅项目(2020H6024)

Fusion-separation of information and explicit characteristics of implicit attributes

CHEN Shu-zhen1,3, LI Shou-wei2, SHI Kai-quan1*   

  1. 1. School of Mathematics, Shandong University, Jinan 250100, Shandong, China;
    2. School of Business, Shandong Normal University, Jinan 250014, Shandong, China;
    3. Department of Computer and Information Security Management, Fujian Police College, Fuzhou 350007, Fujian, China
  • Published:2022-11-10

摘要: 基于具有属性合取特征的动态数学模型与信息融合的交叉,给出了信息融合与信息分离生成的复合概念:信息融合-分离,给出了融合度量、分离度量与信息融合-分离属性定理,给出了隐性属性的显性化原理,给出了信息融合-分离的加密-解密及其安全获取。利用这些理论结果,给出它在案例侦察、证据获取与案例结论的安全认证的应用。

关键词: 动态数学模型, 信息融合-分离, 椭圆曲线, 案例安全认证, 应用

Abstract: Based on the cross feature between the dynamic mathematical model with attribute conjunction and information fusion, the composite concept of information fusion and information separated generation is presented: information fusion-separation; Then, the fusion metric, separation metric and information fusion separation attribute theorem are given; The explicit principle of recessive attribute is given; The encryption-decryption of information fusion-separation and its secure acquisition are given. By using these theoretical results, the application of security authentication in case reconnaissance, evidence acquisition and case conclusion are given.

Key words: Dynamic mathematical model, fusion-separation of information, elliptic curve, security authentication of case, application

中图分类号: 

  • O144
[1] 史开泉. 大数据结构-逻辑特征与大数据规律[J]. 山东大学学报(理学版), 2019, 54(2):1-29. SHI Kaiquan. Big data structure-logic characteristics and big data law[J]. Journal of Shandong University(Natural Science), 2019, 54(2):1-29.
[2] 史开泉. P-集合, 逆P-集合与信息智能融合-过滤辨识[J]. 计算机科学, 2012, 39(4):1-13. SHI Kaiquan. P-sets, inverse P-sets and the intelligent fusion-filter identification of information[J]. Computer Science, 2012, 39(4):1-13.
[3] 史开泉. P-集合[J]. 山东大学学报(理学版), 2008, 43(11):77-84. SHI Kaiquan. P-sets[J]. Journal of Shandong University(Natural Science), 2008, 43(11):77-84.
[4] SHI Kaiquan. P-sets and its applications[J]. Advances in Systems Science and Applications, 2009, 9(2):209-219.
[5] 史开泉. P-集合与它的应用特性[J]. 计算机科学, 2010, 37(8):1-8. SHI Kaiquan. P-sets and its applied characteristics[J]. Computer Science, 2010, 37(8):1-8.
[6] 史开泉. P-推理与信息的P-推理发现-辨识[J]. 计算机科学, 2011, 38(7):1-9. SHI Kaiquan. P-reasoning and P-reasoning discovery-identification of information[J]. Computer Science, 2011, 38(7):1-9.
[7] FAN Chengxian, LIN Hongkang. P-sets and the reasoning-identification of disaster information[J]. International Journal of Convergence Information Technology, 2012, 7(1):337-345.
[8] LIN Hongkang, FAN Chengxian. The dual form of P-reasoning and identification of unknown attribute[J]. International Journal of Digital Content Technology and its Applications, 2012, 6(1):121-131.
[9] 张丽, 崔玉泉, 史开泉. 外 P-集合与数据内-恢复[J]. 系统工程与电子技术, 2010, 32(6):1233-1238. ZHANG Li, CUI Yuquan, SHI Kaiquan. Outer P-sets and data internal recovery[J]. Systems Engineering and Electronics, 2010, 32(6):1233-1238.
[10] 李豫颖, 林宏康, 史开泉. 数据离散区间特征与数据发现-应用[J]. 系统工程与电子技术, 2011, 33(10):2258-2262. LI Yuying, LIN Hongkang, SHI Kaiquan. Characteristics of data discrete interval and data discovery-application[J]. Systems Engineering and Electronics, 2011, 33(10):2258-2262.
[11] 张凌, 汤积华, 史开泉. 内P-信息融合与它的属性合取特征[J]. 山东大学学报(理学版), 2014, 49(2):93-97. ZHANG Ling, TANG Jihua, SHI Kaiquan. The fusion of internal packet information and its feature of attribute conjunction[J]. Journal of Shandong University(Natural Science), 2014, 49(2):93-97.
[12] 史开泉, 张丽. 内 P-集合与数据外-恢复[J]. 山东大学学报(理学版), 2009, 44(4):8-14. SHI Kaiquan, ZHANG Li. Internal P-set and data outer-recovery[J]. Journal of Shandong University(Natural Science), 2009, 44(4):8-14.
[13] 张冠宇, 周厚勇, 史开泉. P-集合与双P-数据恢复-辨识[J]. 系统工程与电子技术, 2010, 32(9):1919-1924. ZHANG Guanyu, ZHOU Houyong, SHI Kaiquan. P-sets and the recovery-identification double[J]. Systems Engineering and Electronics, 2010, 32(9):1919-1924.
[14] ZHANG Ling, REN Xuefang. P-sets and (f,(-overf))-heredity[J]. Quantitative Logic and Soft Computing, 2010, 2(1):735-743.
[15] 赵树理, 吴松丽, 史开泉. 内 P-推理信息恢复与属性潜藏推理发现[J]. 计算机科学, 2013, 40(4):209-213. ZHAO Shuli, WU Songli, SHI Kaiquan. Internal P-reasoning information recovery and attribute hiding searching discovery[J]. Computer Science, 2013, 40(4):209-213.
[16] 史开泉. 函数 P-集合[J]. 山东大学学报(理学版), 2011, 46(2):62-69. SHI Kaiquan. Function P-sets[J]. Journal of Shandong University(Natural Science), 2011, 46(2):62-69.
[17] SHI Kaiquan. Function P-sets[J]. International Journal of Machine Learning and Cybernetics, 2011, 2(4):281-288.
[18] 史开泉. P-信息规律智能融合与软信息图像智能生成[J]. 山东大学学报(理学版), 2014, 49(4):1-17. SHI Kaiquan. P-information law intelligent fusion and soft information image intelligent generation[J]. Journal of Shandong University(Natural Science), 2014, 49(4):1-17.
[19] 汤积华, 张凌, 史开泉. 信息规律智能融合与它的智能融合分离[J]. 计算机科学, 2015, 42(2):204-209. TANG Jihua, ZHANG Ling, SHI Kaiquan. Intelligent fusion of information law and its inner separation[J]. Computer Science, 2015, 42(2):204-209.
[20] 任雪芳, 张凌, 史开泉. 两类动态信息规律模型及其在信息伪装、风险识别中的应用[J]. 计算机科学,2018,45(9):230-236. REN Xufang, ZHANG Ling, SHI Kaiquan. Two types of dynamic information law models and their applications in information camouflage and risk identification[J]. Computer Science, 2018, 45(9):230-236.
[21] 陈保会, 张凌, 史开泉. P-信息智能动态融合与信息规律状态智能识别[J]. 山东大学学报(理学版), 2018, 53(2):83-87. CHEN Baohui, ZHANG Ling, SHI Kaiquan. Intelligent dynamic fusion of packet information and the intelligent state recognition ofinformation law[J]. Journal of Shandong University(Natural Science), 2018, 53(2):83-87.
[22] TANG Jihua, ZHANG Ling, SHI Kaiquan, et al. Outer P-information law reasoning andits application in intelligent fusion and separating of information law[J]. Microsystem Technologies, 2018, 24(10):4389-4398.
[23] 史开泉. P-增广矩阵与信息的智能动态发现-辨识[J]. 山东大学学报(理学版), 2015, 50(10):1-12. SHI Kaiquan. P-augmented matrix and dynamic intelligent discovery-identification of information[J]. Journal of Shandong University(Natural Science), 2015, 50(10):1-12.
[24] LIN Hongkang, FAN Chengxian. Embedding camouflage of inverse P-information and application[J]. International Journal of Convergence Information and Technology, 2012, 7(20):471-480.
[25] FAN Chengxian, HUANG Shunliang. Inverse P-reasoning discovery identification of inverse P-information[J]. International Journal of Digital Content Technology and Its Applications, 2012, 6(20):735-744.
[26] SHI Kaiquan. Function inverse P-sets and the hiding information generated by function inverse P-information law fusion[C] //Proceedings of the 13th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society. Sanya: Digital Servicesand Information Intelligence, 2014: 224-237.
[27] ZHANG Ling, REN Xuefang, SHI Kaiquan, et al. Inverse packet matrix reasoning model-based the intelligent dynamic separation and acquisition of educational information[J]. Microsystem Technologies, 2018, 24(10):4415-4421.
[28] REN Xuefang, ZHANG Ling, SHI Kaiquan, et al. Inverse P-augmented matrix method-based the dynamic findings of unknown information[J]. Microsystem Technologies, 2018, 24(10):4187-4192.
[29] ZHANG Ling, REN Xuefang, SHI Kaiquan. Inverse P-information law models and the reality-camouflage intelligent transformations of information image[C] //Proceedings of the 2016 International Conference on Network and Information Systems for Computers. Washington: IEEE, 2016: 337-341.
[30] 任雪芳, 张凌, 史开泉. 基数余-亏与逆 P-增广矩阵[J]. 山东大学学报(理学版), 2015, 50(10):13-18, 26. REN Xuefang, ZHANG Ling, SHI Kaiquan. Surplus-deficiency of cardinal number and inverse P-augmented matrices[J]. Journal of Shandong University(Natural Science), 2015, 50(10):13-18, 26.
[31] 张凌, 任雪芳. 基数余-亏定理与数据外-内挖掘-分离[J]. 山东大学学报(理学版), 2015, 50(8):90-94. ZHANG Ling, REN Xuefang. Surplus-deficient theorem of cardinal number and data internal-outer mining-separation[J]. Journal of Shandong University(Natural Science), 2015, 50(8):90-94.
[32] 任雪芳, 张凌, 史开泉. 逆P-集合的边界特征与系统状态监测[J]. 计算机科学, 2016, 43(10):211-213, 255. REN Xuefang, ZHANG Ling, SHI Kaiquan. Boundary characteristics of inverse P-sets and system condition monitoring[J]. Computer Science, 2016, 43(10):211-213, 255.
[33] 任雪芳, 张凌. 逆 P-集合的扰动定理与数据的扰动挖掘[J]. 山东大学学报(理学版), 2016, 51(12):54-60. REN Xuefang, ZHANG Ling. Perturbation theorems of inverse P-sets and perturbation-based data mining[J]. Journal of Shandong University(Natural Science), 2016, 51(12):54-60.
[34] KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177):203-209.
[35] MENEZES A J, VANSTONE S A. Elliptic curve cryptosystems and their implementation[J]. J Cryptology, 1993, 6(4):209-224.
[1] 李守伟,史开泉. 逆分离模糊集合((-overA)F,(-overA)(-overF))与模糊信息安全获取[J]. 《山东大学学报(理学版)》, 2022, 57(9): 1-14.
[2] 史开泉,李守伟. 分离模糊集合(A(-overF),AF)与模糊信息智能融合[J]. 《山东大学学报(理学版)》, 2022, 57(7): 1-13.
[3] 李瑞峰,易铮阁,袁文勇,杨晓元,钮可. 基于ECDSA的云存储审计方案[J]. 《山东大学学报(理学版)》, 2022, 57(5): 57-65.
[4] 李颖,胡俊. 基于分布式消息驱动的分层可信密码服务框架[J]. 《山东大学学报(理学版)》, 2020, 55(3): 19-27.
[5] 徐凤生,于秀清,张立华. 信息智能融合与它的P-增广矩阵推理生成[J]. 《山东大学学报(理学版)》, 2019, 54(9): 22-28.
[6] 刘双根,王蓉蓉,李圣雨. GF(3m)上Hessian曲线的三进制Montgomery算法[J]. 《山东大学学报(理学版)》, 2019, 54(1): 96-102.
[7] 张方国. 椭圆曲线在密码中的应用:过去,现在,将来…[J]. J4, 2013, 48(05): 1-13.
[8] 景旭1,2,3, 何东健1*. 无完全可信PKG身份签名的分层CES方案[J]. J4, 2012, 47(9): 7-14.
[9] 周厚勇1,2 , 史开泉2 . 函数S-粗集与F隐形图像生成-辨识[J]. J4, 2009, 44(1): 91-96 .
[10] 任雪芳,杜英玲,邱育峰 . S-粗集知识的动态推理与识别[J]. J4, 2008, 43(4): 21-27 .
[11] 史开泉 . P-集合[J]. J4, 2008, 43(11): 77-84 .
[12] 张立江,王 薇,魏普文 . 基于Weil对的(1, t)加密方案[J]. J4, 2007, 42(10): 9-12 .
[13] 史开泉,余文琼 . 粗系统与它的粗依赖[J]. J4, 2006, 41(1): 45-51 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!