JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2022, Vol. 57 ›› Issue (11): 1-9.doi: 10.6040/j.issn.1671-9352.0.2022.341

   

Fusion-separation of information and explicit characteristics of implicit attributes

CHEN Shu-zhen1,3, LI Shou-wei2, SHI Kai-quan1*   

  1. 1. School of Mathematics, Shandong University, Jinan 250100, Shandong, China;
    2. School of Business, Shandong Normal University, Jinan 250014, Shandong, China;
    3. Department of Computer and Information Security Management, Fujian Police College, Fuzhou 350007, Fujian, China
  • Published:2022-11-10

Abstract: Based on the cross feature between the dynamic mathematical model with attribute conjunction and information fusion, the composite concept of information fusion and information separated generation is presented: information fusion-separation; Then, the fusion metric, separation metric and information fusion separation attribute theorem are given; The explicit principle of recessive attribute is given; The encryption-decryption of information fusion-separation and its secure acquisition are given. By using these theoretical results, the application of security authentication in case reconnaissance, evidence acquisition and case conclusion are given.

Key words: Dynamic mathematical model, fusion-separation of information, elliptic curve, security authentication of case, application

CLC Number: 

  • O144
[1] 史开泉. 大数据结构-逻辑特征与大数据规律[J]. 山东大学学报(理学版), 2019, 54(2):1-29. SHI Kaiquan. Big data structure-logic characteristics and big data law[J]. Journal of Shandong University(Natural Science), 2019, 54(2):1-29.
[2] 史开泉. P-集合, 逆P-集合与信息智能融合-过滤辨识[J]. 计算机科学, 2012, 39(4):1-13. SHI Kaiquan. P-sets, inverse P-sets and the intelligent fusion-filter identification of information[J]. Computer Science, 2012, 39(4):1-13.
[3] 史开泉. P-集合[J]. 山东大学学报(理学版), 2008, 43(11):77-84. SHI Kaiquan. P-sets[J]. Journal of Shandong University(Natural Science), 2008, 43(11):77-84.
[4] SHI Kaiquan. P-sets and its applications[J]. Advances in Systems Science and Applications, 2009, 9(2):209-219.
[5] 史开泉. P-集合与它的应用特性[J]. 计算机科学, 2010, 37(8):1-8. SHI Kaiquan. P-sets and its applied characteristics[J]. Computer Science, 2010, 37(8):1-8.
[6] 史开泉. P-推理与信息的P-推理发现-辨识[J]. 计算机科学, 2011, 38(7):1-9. SHI Kaiquan. P-reasoning and P-reasoning discovery-identification of information[J]. Computer Science, 2011, 38(7):1-9.
[7] FAN Chengxian, LIN Hongkang. P-sets and the reasoning-identification of disaster information[J]. International Journal of Convergence Information Technology, 2012, 7(1):337-345.
[8] LIN Hongkang, FAN Chengxian. The dual form of P-reasoning and identification of unknown attribute[J]. International Journal of Digital Content Technology and its Applications, 2012, 6(1):121-131.
[9] 张丽, 崔玉泉, 史开泉. 外 P-集合与数据内-恢复[J]. 系统工程与电子技术, 2010, 32(6):1233-1238. ZHANG Li, CUI Yuquan, SHI Kaiquan. Outer P-sets and data internal recovery[J]. Systems Engineering and Electronics, 2010, 32(6):1233-1238.
[10] 李豫颖, 林宏康, 史开泉. 数据离散区间特征与数据发现-应用[J]. 系统工程与电子技术, 2011, 33(10):2258-2262. LI Yuying, LIN Hongkang, SHI Kaiquan. Characteristics of data discrete interval and data discovery-application[J]. Systems Engineering and Electronics, 2011, 33(10):2258-2262.
[11] 张凌, 汤积华, 史开泉. 内P-信息融合与它的属性合取特征[J]. 山东大学学报(理学版), 2014, 49(2):93-97. ZHANG Ling, TANG Jihua, SHI Kaiquan. The fusion of internal packet information and its feature of attribute conjunction[J]. Journal of Shandong University(Natural Science), 2014, 49(2):93-97.
[12] 史开泉, 张丽. 内 P-集合与数据外-恢复[J]. 山东大学学报(理学版), 2009, 44(4):8-14. SHI Kaiquan, ZHANG Li. Internal P-set and data outer-recovery[J]. Journal of Shandong University(Natural Science), 2009, 44(4):8-14.
[13] 张冠宇, 周厚勇, 史开泉. P-集合与双P-数据恢复-辨识[J]. 系统工程与电子技术, 2010, 32(9):1919-1924. ZHANG Guanyu, ZHOU Houyong, SHI Kaiquan. P-sets and the recovery-identification double[J]. Systems Engineering and Electronics, 2010, 32(9):1919-1924.
[14] ZHANG Ling, REN Xuefang. P-sets and (f,(-overf))-heredity[J]. Quantitative Logic and Soft Computing, 2010, 2(1):735-743.
[15] 赵树理, 吴松丽, 史开泉. 内 P-推理信息恢复与属性潜藏推理发现[J]. 计算机科学, 2013, 40(4):209-213. ZHAO Shuli, WU Songli, SHI Kaiquan. Internal P-reasoning information recovery and attribute hiding searching discovery[J]. Computer Science, 2013, 40(4):209-213.
[16] 史开泉. 函数 P-集合[J]. 山东大学学报(理学版), 2011, 46(2):62-69. SHI Kaiquan. Function P-sets[J]. Journal of Shandong University(Natural Science), 2011, 46(2):62-69.
[17] SHI Kaiquan. Function P-sets[J]. International Journal of Machine Learning and Cybernetics, 2011, 2(4):281-288.
[18] 史开泉. P-信息规律智能融合与软信息图像智能生成[J]. 山东大学学报(理学版), 2014, 49(4):1-17. SHI Kaiquan. P-information law intelligent fusion and soft information image intelligent generation[J]. Journal of Shandong University(Natural Science), 2014, 49(4):1-17.
[19] 汤积华, 张凌, 史开泉. 信息规律智能融合与它的智能融合分离[J]. 计算机科学, 2015, 42(2):204-209. TANG Jihua, ZHANG Ling, SHI Kaiquan. Intelligent fusion of information law and its inner separation[J]. Computer Science, 2015, 42(2):204-209.
[20] 任雪芳, 张凌, 史开泉. 两类动态信息规律模型及其在信息伪装、风险识别中的应用[J]. 计算机科学,2018,45(9):230-236. REN Xufang, ZHANG Ling, SHI Kaiquan. Two types of dynamic information law models and their applications in information camouflage and risk identification[J]. Computer Science, 2018, 45(9):230-236.
[21] 陈保会, 张凌, 史开泉. P-信息智能动态融合与信息规律状态智能识别[J]. 山东大学学报(理学版), 2018, 53(2):83-87. CHEN Baohui, ZHANG Ling, SHI Kaiquan. Intelligent dynamic fusion of packet information and the intelligent state recognition ofinformation law[J]. Journal of Shandong University(Natural Science), 2018, 53(2):83-87.
[22] TANG Jihua, ZHANG Ling, SHI Kaiquan, et al. Outer P-information law reasoning andits application in intelligent fusion and separating of information law[J]. Microsystem Technologies, 2018, 24(10):4389-4398.
[23] 史开泉. P-增广矩阵与信息的智能动态发现-辨识[J]. 山东大学学报(理学版), 2015, 50(10):1-12. SHI Kaiquan. P-augmented matrix and dynamic intelligent discovery-identification of information[J]. Journal of Shandong University(Natural Science), 2015, 50(10):1-12.
[24] LIN Hongkang, FAN Chengxian. Embedding camouflage of inverse P-information and application[J]. International Journal of Convergence Information and Technology, 2012, 7(20):471-480.
[25] FAN Chengxian, HUANG Shunliang. Inverse P-reasoning discovery identification of inverse P-information[J]. International Journal of Digital Content Technology and Its Applications, 2012, 6(20):735-744.
[26] SHI Kaiquan. Function inverse P-sets and the hiding information generated by function inverse P-information law fusion[C] //Proceedings of the 13th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society. Sanya: Digital Servicesand Information Intelligence, 2014: 224-237.
[27] ZHANG Ling, REN Xuefang, SHI Kaiquan, et al. Inverse packet matrix reasoning model-based the intelligent dynamic separation and acquisition of educational information[J]. Microsystem Technologies, 2018, 24(10):4415-4421.
[28] REN Xuefang, ZHANG Ling, SHI Kaiquan, et al. Inverse P-augmented matrix method-based the dynamic findings of unknown information[J]. Microsystem Technologies, 2018, 24(10):4187-4192.
[29] ZHANG Ling, REN Xuefang, SHI Kaiquan. Inverse P-information law models and the reality-camouflage intelligent transformations of information image[C] //Proceedings of the 2016 International Conference on Network and Information Systems for Computers. Washington: IEEE, 2016: 337-341.
[30] 任雪芳, 张凌, 史开泉. 基数余-亏与逆 P-增广矩阵[J]. 山东大学学报(理学版), 2015, 50(10):13-18, 26. REN Xuefang, ZHANG Ling, SHI Kaiquan. Surplus-deficiency of cardinal number and inverse P-augmented matrices[J]. Journal of Shandong University(Natural Science), 2015, 50(10):13-18, 26.
[31] 张凌, 任雪芳. 基数余-亏定理与数据外-内挖掘-分离[J]. 山东大学学报(理学版), 2015, 50(8):90-94. ZHANG Ling, REN Xuefang. Surplus-deficient theorem of cardinal number and data internal-outer mining-separation[J]. Journal of Shandong University(Natural Science), 2015, 50(8):90-94.
[32] 任雪芳, 张凌, 史开泉. 逆P-集合的边界特征与系统状态监测[J]. 计算机科学, 2016, 43(10):211-213, 255. REN Xuefang, ZHANG Ling, SHI Kaiquan. Boundary characteristics of inverse P-sets and system condition monitoring[J]. Computer Science, 2016, 43(10):211-213, 255.
[33] 任雪芳, 张凌. 逆 P-集合的扰动定理与数据的扰动挖掘[J]. 山东大学学报(理学版), 2016, 51(12):54-60. REN Xuefang, ZHANG Ling. Perturbation theorems of inverse P-sets and perturbation-based data mining[J]. Journal of Shandong University(Natural Science), 2016, 51(12):54-60.
[34] KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177):203-209.
[35] MENEZES A J, VANSTONE S A. Elliptic curve cryptosystems and their implementation[J]. J Cryptology, 1993, 6(4):209-224.
[1] LI Shou-wei, SHI Kai-quan. Inverse separated fuzzy set ((-overA)F,(-overA)(-overF)) and secure acquisition of fuzzy information [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2022, 57(9): 1-14.
[2] SHI Kai-quan, LI Shou-wei. Separated fuzzy set (A(-overF),AF) and the intelligent fusion of fuzzy information [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2022, 57(7): 1-13.
[3] LI Rui-feng, YI Zheng-ge, YUAN Wen-yong, YANG Xiao-yuan, NIU Ke. ECDSA-based auditing scheme for cloud storage [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2022, 57(5): 57-65.
[4] Ying LI,Jun HU. Hierarchical trusted cryptography service framework based on distributed message drive [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2020, 55(3): 19-27.
[5] Feng-sheng XU,Xiu-qing YU,Li-hua ZHANG. Intelligent fusion of information and reasoning generation of its P-augmented matrix [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(9): 22-28.
[6] . Ternary Montgomery algorithm on Hessian curve over GF(3m) [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2019, 54(1): 96-102.
[7] ZHANG Fang-guo. Elliptic curves in cryptography: past, present and future… [J]. J4, 2013, 48(05): 1-13.
[8] . Scheme of hierarchical content extraction signature based on non-credible PKG identity-based signature [J]. J4, 2012, 47(9): 7-14.
[9] ZHANG Fei1, CHEN Ping1, ZHANG Li2.  P-separation of P-sets and its applications [J]. J4, 2010, 45(3): 71-75.
[10] REN Xue-fang,DU Ying-ling,QIU Yu-feng . Dynamic inference and recognition of S-rough sets knowledge [J]. J4, 2008, 43(4): 21-27 .
[11] SHI Kai-quan . P-sets [J]. J4, 2008, 43(11): 77-84 .
[12] ZHANG Li-jiang,WANG Wei,WEI Pu-wen . (1, t) encryption based on the Weil pairing [J]. J4, 2007, 42(10): 9-12 .
[13] SHI Kai-quan and YU Wen-qiong . Rough system and its rough dependency [J]. J4, 2006, 41(1): 45-51 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!