Learn More
This paper introduces the IPSec security architecture and its mechanism, and gives an in-depth analysis of the IPSec security. Due to the flaws of the pre-shared key authentication method and the fact that it is vulnerable to DoS attacks, this paper proposes a dynamic pre-shared key generation method to avoid the harm to the system caused by crack of the(More)
—The methods of integrity authentication for vector maps were described at fist, then digital watermarking for vector data was introduced. Finally, a fragile watermark algorithm for vector maps was proposed, which was based on that the vector map was divided into a series of blocks, and watermark information was embedded in these blocks. The extraction(More)
Offline Chinese character recognition (OCCR), as one of the technologies to input Chinese characters automatically, is an important interface for Chinese information processing. In recent years, many achievement of the offline Chinese character recognition have been gained in both theory and technology, but those achievements can not solve all the problems.(More)
The classification and copyright protection of digital map were described in this paper. After the basic theories of digital watermarking were introduced, the technologies that have been used in vector map digital watermarking were analyzed, and its classification of algorithms was expatiated on. Finally the possible directions for further research were(More)
The methods of integrity authentication for vector graphics were described at fist, then digital watermarking for vector graphics was introduced. For vector graphics composed by linear entities, a fragile watermark algorithm was proposed, which was based on that the linear entities of vector graphics were divided into different groups, and watermark(More)
Among the newly explored research areas of digital watermarking, various types of data embedding technologies for vector graphics have drawn more and more attention. The features of vector graphics on the data expression and use were analyzed. The requirements of watermarking were discussed. Then, the related works on watermarking technologies for vector(More)
Among the newly explored research areas of digital watermarking, various types of data embedding technologies for vector graphics have drawn more and more attention. The features of vector graphics on the data expression and use were analyzed. The requirements of watermarking for vector graphics are discussed. Utilizing the characteristics of vector(More)
Geospatial data is important strategic information for economy development, social development, and even for national security; therefore, it is important to protect the copyright of spatial data files. Compared to the focus on digital rights management for e-books, streaming media, research on copyright protection for spatial data files is relatively less.(More)
this paper firstly analyzed the current complicated campus network security condition especially its’ active protection; then introduced principle of UTM (United Threat Management) ,and applied Multi-Core UTM technology in BIGC campus network at last made a related analysis and research of this project.
  • 1