Research on Database Watermarking Algorithm Based on Genetic Algorithm

2014 ◽  
Vol 687-691 ◽  
pp. 1297-1299
Author(s):  
Ai Xia Han ◽  
Yan Chen

With the rapid development of network information technology, much attention has been paid to the database content security problems,such as how to prevent data theft, illegal copying, certification of copyright, etc. In order to protect the database copyright, digital watermarking technology is becoming a new research hotspot. In this paper, first of all, on the basis of summary current development of data and database watermarking technology, and then introduces genetic algorithm in data watermark technology, finally validates the effectiveness of the model with an example.

2018 ◽  
Vol 246 ◽  
pp. 03017
Author(s):  
Kai Fan ◽  
Hang Yang ◽  
Aidong Xu

Nowadays, with the rapid development of science and technology, network information technology is widely applied to various enterprise departments. In order to meet the increasing social needs, power companies have also built power network information systems. The establishment of the network information system has been put into use, which has greatly improved the efficiency of the power enterprise. However, the security risks of network information systems have followed. Once the network is damaged by the attack, it will cause the power system to fail to operate normally, which will inevitably cause significant losses. Power system information security issues threaten the security of the power system and the entire power industry. Studying the information security of power systems, how to protect the power information network from threats, how to ensure the safe and stable supply of electricity to the whole society, and striving to develop a safe and effective power network information system is an important issue facing the development of information technology.


2021 ◽  
Vol 5 (4) ◽  
pp. 4-7
Author(s):  
Weiguo Xie

With the vigorous development of network information technology, e-book borrowing service came into being and showed a vigorous development trend. Therefore, in order to strengthen the service function, the library needs to gradually improve the e-book borrowing service, so as to provide readers with high-quality service content, so that the library can give full play to its function of disseminating scientific and cultural knowledge. Therefore, in this article research, we first discuss the main reading methods of e-books, then investigate the current reading situation of e-books and traditional paper books in the library, and then put forward corresponding development strategies to effectively promote the rapid development of the library and strengthen the level of e-book borrowing service.


2014 ◽  
Vol 701-702 ◽  
pp. 83-87
Author(s):  
Shou Wen Ji ◽  
Xi Wu ◽  
Yun Fei Wang ◽  
Gang Su

With the rapid development of modern logistics technology and automation of information technology, the AS/RS has been more and more widely used in the field of medicine logistics. In order to more effectively manage AS/RS, improve the rationality of the layout, reduce the number of goods handling and storage costs, it demands to optimize the cargo space allocation for goods .This article adopts multi-objective genetic algorithm to solve the optimization problem of cargo space allocation modeling, and use Jointown pharmaceutical logistics center as an example to further verify the analysis, getting the ideal optimization results and the simulation image.


2020 ◽  
Vol 9 (4) ◽  
pp. 247
Author(s):  
Ling Zhen

With the rapid development of network information technology, China's education has witnessed earth-shaking changes. In the teaching of Business English Correspondence, the application of information technology can greatly stimulate students' interest and enthusiasm for learning and make up for the shortcomings of traditional teaching models. In order to continuously improve the efficiency and quality of classroom teaching, this article focuses on the construction of the teaching model for Business English Correspondence with the application of information technology.


2014 ◽  
Vol 644-650 ◽  
pp. 6132-6135
Author(s):  
Ying Luo ◽  
Xiang Qing Zhang

With rapid development of network information technology, the application of network teaching mode has been promoted rapidly in higher education, and the status of college teachers in modern teaching has been changed significantly. In the network age, college teachers should realize the transformation of their role and improve their own modern educational and teaching ability as soon as possibly, to meet the requirement of the new situation.


2021 ◽  
Vol 235 ◽  
pp. 03058
Author(s):  
Gan Li

The current development of China’s convention and exhibition economy is showing a new normal, under the background of the rapid development of information technology and the era of experience economy, the transformation and upgrading of the convention and exhibition industry will inevitably develop in the direction of informatization and intelligence, that is “smart exhibition”. This article takes the theoretical research related to the development status of smart exhibition as the starting point, studies and analyzes the connotation, elements and structure of smart exhibition, discusses the basic framework of smart exhibition, reveals the operation mechanism of smart exhibition, and forms some basic viewpoints and theories about smart exhibition.


2015 ◽  
Vol 2015 ◽  
pp. 1-6 ◽  
Author(s):  
Yuwei Peng ◽  
Mingliang Yue

With the rapid development of GIS and computer techniques, vector map data has been widely used in many fields. Since the production of map data is very costly, illegal copying will result in huge loss for data owners. In order to protect the copyright of vector data, digital watermarking has been employed in recent years. In this paper, a zero-watermarking scheme for vector map data is proposed. In the proposed scheme, FVDR (feature vertex distance ratio) is constructed based on the feature vertices of objects. The feature data, FVDR, is combined with watermark to generate the zero-watermark. Due to the specially designed cover data, the proposed scheme is robust to geometrical attacks, vertex attacks, and object attacks. The results of extensive experiments also demonstrate the robustness of the proposed scheme.


2013 ◽  
Vol 475-476 ◽  
pp. 1240-1245
Author(s):  
Can Long Wu ◽  
Shu Ying Zhan ◽  
Chun Qing Zeng

With the rapid development of modern information technology, some high technologies (such as the multimedia technology, the communication technology, the network information technology and so on) have been widely applied to various fields of education. Not only has the impacts for ideas and concepts of the traditional education and changes the teaching content, means, methods and forms of organization, but it also brings an extensive and profound impact for the role of teachers. The intensive study and exploration of these issues and impacts and providing the corresponding countermeasures will undoubtedly provide the important idea and reference value for the school to achieve the modernization of education.


Author(s):  
S. Thabasu Kannan ◽  
S. Azhagu Senthil

Now-a-days watermarking plays a pivotal role in most of the industries for providing security to their own as well as hired or leased data. This paper its main aim is to study the multiresolution watermarking algorithms and also choosing the effective and efficient one for improving the resistance in data compression. Computational savings from such a multiresolution watermarking framework is obvious. The multiresolutional property makes our watermarking scheme robust to image/video down sampling operation by a power of two in either space or time. There is no common framework for multiresolutional digital watermarking of both images and video. A multiresolution watermarking based on the wavelet transformation is selected in each frequency band of the Discrete Wavelet Transform (DWT) domain and therefore it can resist the destruction of image processing.   The rapid development of Internet introduces a new set of challenging problems regarding security. One of the most significant problems is to prevent unauthorized copying of digital production from distribution. Digital watermarking has provided a powerful way to claim intellectual protection. We proposed an idea for enhancing the robustness of extracted watermarks. Watermark can be treated as a transmitted signal, while the destruction from attackers is regarded as a noisy distortion in channel.  For the implementation, we have used minimum nine coordinate positions. The watermarking algorithms to be taken for this study are Corvi algorithm and Wang algorithm. In all graph, we have plotted X axis as peak signal to noise ratio (PSNR) and y axis as Correlation with original watermark. The threshold value ά is set to 5. The result is smaller than the threshold value then it is feasible, otherwise it is not.


2020 ◽  
Author(s):  
Ke Zeng ◽  
Weiguo Zhu ◽  
Caiyou Wang ◽  
Liyan Zhu

BACKGROUND The rapid spread of COVID-19 has created a severe challenge to China’s healthcare system. Hospitals across the country reacted quickly under the leadership of the Chinese government and implemented a range of informatization measures to effectively respond to the COVID-19. OBJECTIVE To understand the impact of the pandemic on the medical business of Chinese hospitals and the difficulties faced by hospital informatization construction. To discuss the application of hospital informatization measures during the COVID-19 pandemic. To summarize the practical experience of hospitals using information technology to fight the pandemic. METHODS Performing a cross-sectional on-line questionnaire survey in Chinese hospitals, of which the participants are invited including hospital information staff, hospital administrators, medical staff, etc. Statistical analyzing the collected data by using SPSS version 24. RESULTS A total of 804 valid questionnaires (88.45%) are collected in this study from 30 provinces in mainland China, of which 731 (90.92%) were filled out by hospital information staff. 473 (58.83%) hospitals are tertiary hospitals while the remaining 331 (41.17%) are secondary hospitals. The majority hospitals (82.46%) had a drop in their business volume during the pandemic and a more substantial drop is found in tertiary hospitals. 70.40% (n=566) of hospitals have upgraded or modified their information systems in response to the epidemic. The proportion of tertiary hospitals that upgraded or modified systems is significantly higher than that of secondary hospitals. Internet hospital consultation (70.52%), pre-check and triage (62.56%), telemedicine (60.32%), health QR code (57.71%), and telecommuting (50.87%) are the most used informatization anti-pandemic measures. There are obvious differences in the application of information measures between tertiary hospitals and secondary hospitals. Among these measures, most of them (41.17%) are aiming at serving patients and most of them (62.38%) are universal which continue to be used after pandemic. The informatization measures are mostly used to control the source of infection (48.19%), such as health QR Code, etc. During the pandemic, the main difficulties faced by the hospital information department are “information construction projects are hindered” (58.96%) and “increased difficulty in ensuring network information security” (58.58%). There are significant differences in this issue between tertiary hospitals and secondary hospitals. The shortcomings of hospital informatization that should be made up for are “shorten patient consultation time and optimize consultation process” (72.51%), “Ensure network information security” (72.14%) and “build internet hospital consultations platform” (59.95%). CONCLUSIONS A significant number of innovative medical information technology have been used and played a significant role in all phases of COVID-19 prevention and control in China. Since the COVID-19 brought many challenges and difficulties for informatization work, hospitals need to constantly improve their own information technology skills to respond to public health emergencies that arise at any moment.


Sign in / Sign up

Export Citation Format

Share Document