CN109286607B - Method for encrypting digital elevation model based on surveying and mapping control point achievement table - Google Patents

Method for encrypting digital elevation model based on surveying and mapping control point achievement table Download PDF

Info

Publication number
CN109286607B
CN109286607B CN201810889027.9A CN201810889027A CN109286607B CN 109286607 B CN109286607 B CN 109286607B CN 201810889027 A CN201810889027 A CN 201810889027A CN 109286607 B CN109286607 B CN 109286607B
Authority
CN
China
Prior art keywords
value
control point
file
bit
effective
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810889027.9A
Other languages
Chinese (zh)
Other versions
CN109286607A (en
Inventor
陈瑞良
吉小赟
西之华
陈雨杉
刘明
罗伟国
陈微
刘立华
张智禹
王坤瑞
张月国
万忠海
韩天培
姚辉文
邵鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China National Petroleum Corp
China Petroleum Pipeline Engineering Corp
Original Assignee
China National Petroleum Corp
China Petroleum Pipeline Engineering Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China National Petroleum Corp, China Petroleum Pipeline Engineering Corp filed Critical China National Petroleum Corp
Priority to CN201810889027.9A priority Critical patent/CN109286607B/en
Publication of CN109286607A publication Critical patent/CN109286607A/en
Application granted granted Critical
Publication of CN109286607B publication Critical patent/CN109286607B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method for encrypting a digital elevation model based on a surveying and mapping control point result table, which comprises the following steps: a sending end selects a mapping control point result table; selecting a control point in the table to generate a pixel size encryption password; selecting a plurality of control points to generate a digital elevation encryption password; and writing the selected control point number into the encrypted file. Selecting a digital elevation model to be encrypted, and converting the digital elevation model into an ASCII format; reading coordinate data in an ASCII file header; calculating the relative relation between the coordinate values and the coordinate values of the selected control points and writing the relative relation into an encrypted file; encrypting the pixel size in the file header and writing the encrypted file; and encrypting the ASCII file digital elevation values and writing the encrypted ASCII file digital elevation values into an encrypted file. The receiving end reads the control point number in the encrypted file to generate a decryption password, and an original ASCII file is obtained according to the inverse operation of the encryption operation of the transmitting end; the ASCII file is converted to the original format. The invention has the beneficial effects that: the transmission speed is fast, the secrecy degree is high, the use is convenient, and the key generation is convenient.

Description

Method for encrypting digital elevation model based on surveying and mapping control point achievement table
Technical Field
The invention relates to the technical field of surveying and mapping technology and information security, in particular to a method for encrypting a digital elevation model based on a surveying and mapping control point result table.
Background
In the existing mapping and information security field, the problem of transmitting a digital elevation model is often encountered. The survey and drawing management work country secret directory is published in the regulations of survey and drawing management work country secret range (document issue of national survey and drawing office, national survey and office of national security [2003] 17), in which the regulations: "1: 1 ten thousand, 1: the 5 ten thousand high-precision digital elevation model belongs to the state of absolute security, and relates to the point location name and the coordinate of military and national security key departments; the point location coordinate 'belonging to the national secret' with the precision of national economic important engineering facilities better than +/-100 meters is involved. Although transmission related to national high-precision digital elevation models cannot be met frequently, data, drawings and elevation models related to point location coordinates with national economic important engineering facility precision better than +/-100 meters are common. Especially, the digital elevation model transmission of station yards, valve rooms, crossing points, tunnels and national strategic reserves of national trunk oil and gas pipe networks is common, especially, intelligent pipeline construction and pipeline full-life cycle management are implemented at present, and particularly, various data with national coordinates, such as the digital elevation model with the national geographic coordinates, need to be transmitted in real time.
The early-stage surveying and mapping are carried out in engineering construction, particularly national key engineering construction, a surveying and mapping control point result table is formed, a national unified coordinate system is required to be adopted for the control point according to national relevant laws and regulations, even if an independent coordinate system is adopted, the control point is also required to be in relation with the national coordinate system, and the control point belongs to a secret with higher precision grade.
According to relevant regulations, all the data belonging to the national secrets cannot be absolutely transmitted on the internet, and the currently mainly adopted mode is manual acquisition and transmission, and the transmission mode has the defects of low transmission speed, high cost, incapability of realizing real-time transmission, easiness in file loss, damage, theft and disclosure and incapability of meeting the requirements of intelligent construction; the method also adopts modes of compression, fixed password increase, encryption algorithm and the like, belongs to the packaging of confidential documents, and is easy to crack and divulge a secret; and the method adopts a mode of directly replacing the file name without any change of the content, and the confidentiality is lowest, and related regulations are violated.
Disclosure of Invention
In order to solve the above problems, an object of the present invention is to provide a method for encrypting a digital elevation model based on a mapping control point result table, which can realize network transmission of a digital elevation model data file with national geographic coordinates, and has the advantages of automation and real-time transmission process, and no secret leakage in the transmission process.
The invention provides a method for encrypting a digital elevation model based on a mapping control point result table, which comprises the following steps:
step 1, a file sending end selects a digital elevation model file to be encrypted, and converts the digital elevation model file into an ASCII (American standard code for information interchange) file;
step 2, the file sending end selects a surveying and mapping control point result table as a password generation file for digital elevation model file transmission;
step 3, randomly selecting 1 control point in the mapping control point result table, and writing the selected control point number into an encrypted file;
step 4, calculating relative relation data of coordinate values of the coordinate points in the ASCII file header and the coordinate values of the selected control points, and writing the relative relation data into the encrypted file;
step 5, generating a 15-bit pixel size encryption password by using the selected control point data;
step 6, encrypting pixel size data in an ASCII file header by using the generated 15-bit pixel size encryption password, and writing the result into an encrypted file;
step 7, randomly selecting 10 digital elevation values from the ASCII file and taking the average value of the 10 digital elevation values to obtain the integral part digit of the average value, wherein the digit is used as the digit of the digital elevation encryption password;
step 8, calculating the number of control points to be selected according to the effective digital digits required by generating 100 digital elevation encryption passwords;
step 9, randomly selecting a specified number of control points in the control point result table, and taking out effective numbers in the ordinate value X, the abscissa value Y and the elevation value H of all the control points, wherein the effective numbers comprise effective numbers after decimal points but do not comprise the decimal points;
step 10, generating 100 digital elevation encryption passwords by using all the obtained effective digits according to a certain sequence;
step 11, encrypting the digital elevation value by using a digital elevation encryption password and writing the encrypted digital elevation value into an encrypted file;
step 12, transmitting the encrypted file to a file receiving end through the Internet or other ways;
step 13, the file receiving end reads the control point data corresponding to the control point number in the encrypted file by using the stored control point result table and according to the control point number recorded by the file sending end, and generates a decryption password;
step 14, decrypting according to the inverse operation of the encryption operation of the file sending end, wherein the decryption includes coordinate data in an ASCII file header, pixel size data and all digital elevation values, and obtaining an original ASCII file;
and step 15, converting the ASCII file into an initial format to finish the encryption transmission of the digital elevation model.
As a further improvement of the present invention, in step 4, the method for calculating the relative relationship data between the coordinate values of the coordinate points in the ASCII file header and the coordinate values of the selected control points comprises:
the ordinate increment Δ X ═ X-X;
the abscissa increment Δ Y is Y-Y;
wherein X is the longitudinal coordinate value of the coordinate point in the ASCII file header, Y is the abscissa coordinate value of the coordinate point in the ASCII file header, X is the longitudinal coordinate value of the control point, and Y is the abscissa coordinate value of the control point.
As a further improvement of the invention, the method of step 5 specifically comprises the following steps:
selecting effective digits of longitudinal coordinate values of the 1-bit control points in a reverse order, namely selecting the last 1-bit effective digit of the X value as the 1 st bit of the encryption password;
selecting effective digits of the abscissa values of the 1-bit control points in a reverse order, namely selecting the last 1-bit effective digit of the Y value as the 2 nd bit of the encryption password;
selecting effective digits of the elevation values of the 1-bit control points in a reverse order, namely selecting the last 1-bit effective digit of the H value as the 3 rd bit of the encryption password;
selecting an effective number of a longitudinal coordinate value of the 1-bit control point in a reverse order, namely selecting a 2 nd effective number of the reciprocal of the X value as a 4 th bit of the encryption password;
selecting effective digits of the abscissa values of the 1-bit control points in a reverse order, namely selecting the 2 nd-from-last effective digit of the Y value as the 5 th bit of the encryption password;
selecting effective digits of elevation values of 1 control point in a reverse order, namely selecting the 2 nd-from-last effective digit of the H value as the 6 th digit of the encryption password;
……,
by analogy, 6 effective digits are selected from the ordinate value X and the abscissa value Y respectively, 3 effective digits are selected from the elevation value, and a 15-digit encryption password is formed together.
As a further improvement of the invention, the method of step 6 specifically comprises the following steps:
converting the 15-bit encrypted password into an encrypted value, wherein the encrypted value is a small numerical value, the first 3 bits of the small numerical value are 0.00, and the 15-bit password value is used from the 4 th bit to the last bit;
and adding the pixel size value and the encryption value, and writing the result into the encrypted file.
As a further improvement of the invention, the method of step 8 specifically comprises the following steps:
firstly, calculating effective digital digits required by generating 100 digital elevation encryption passwords, namely multiplying the digits of a single password by 100;
each control point calculates the number of control points to be selected according to 20-bit effective digits;
namely: the number of control points selected is (number of digits of a single password 100)/20.
As a further improvement of the present invention, the method of step 10 specifically comprises:
sequentially selecting all effective numbers in the ordinate value X, the abscissa value Y and the elevation value H of the selected control point; or the like, or, alternatively,
the effective numbers of the ordinate value, the abscissa value and the elevation value of one control point are selected circularly or reversely, 1 bit is selected each time until all the effective numbers of one control point are selected, and then the effective number of the next control point is selected; or the like, or, alternatively,
respectively selecting the effective numbers of the ordinate value, the abscissa value and the elevation value of one control point in a circulating mode or in a reverse circulating mode, selecting 1 bit each time until all the effective numbers of one control point are selected, and then selecting the effective number of the next control point; or the like, or, alternatively,
a plurality of control points circularly select or reversely circularly select respective effective digits of longitudinal coordinate values, horizontal coordinate values and elevation values, and 1 bit, 2 bits or 3 bits are taken each time until all the effective digits of all the control points are selected; or the like, or, alternatively,
and respectively and circularly selecting the effective numbers of the longitudinal coordinate value, the horizontal coordinate value and the elevation value of each control point or reversely and circularly selecting the effective numbers of the longitudinal coordinate value, the horizontal coordinate value and the elevation value of each control point, and taking 1 bit, 2 bits or 3 bits each time until all the effective numbers of all the control points are selected.
As a further improvement of the invention, the method of step 11 specifically comprises the following steps:
and reading the digital elevation values in sequence, adding the digital elevation values to the encryption passwords in sequence, and writing the result into an encryption file, wherein 100 encryption passwords are recycled.
As a further improvement of the present invention, the method of step 14 specifically comprises:
and removing the relative relation between the coordinate values of the coordinate points in the ASCII file header and the coordinate values of the selected control points:
ordinate: x- Δ X;
the abscissa: y- Δ Y;
in the formula, delta X is an ordinate increment, delta Y is an abscissa increment, X is a control point ordinate value, and Y is a control point abscissa value;
decrypting the pixel size data: subtracting the pixel size encryption password from the pixel size encryption result according to the corresponding decimal place number;
and (3) decryption of the digital elevation value: and respectively subtracting the digital elevation encryption passwords from the encrypted digital elevation values in sequence.
The invention has the beneficial effects that:
1. high security
For the general encryption method, most of the encryption is performed by using a fixed key or various algorithms to form a key, and the encryption can be decrypted theoretically no matter how complex the algorithm is. The method utilizes the result table of the surveying and mapping control point to generate the key, firstly, the result table is a secret file, can not be obtained by non-project core personnel, is not transmitted in public channels such as a network and the like, and in addition, a simple algorithm is carried out on data in the result table, so that the result table cannot be obtained and cannot be decoded even if the encrypted file and the encrypted algorithm are intercepted; the control points selected by the encrypted digital elevation model are different and the sequence is different each time, the generated secret keys are also different, namely the secret key of the encrypted digital elevation model is random each time, and therefore, the confidentiality degree is high.
2. Convenient to use
The construction, especially the national key construction, is mapped in the early stage to form a mapping control point result table, which exists in a construction site, a mapping unit, a design unit or a construction management department and does not need to be specially manufactured, so that only a simple program needs to be compiled, and the encryption and decryption speed is very high.
3. Solves the problems existing in the prior transmission digital elevation model
The transmission mode has the defects of low transmission speed, high cost, incapability of realizing real-time transmission, easiness in file loss, damage and stealing and secret leakage, and incapability of meeting the requirement of intelligent construction; the method also adopts modes of compression, fixed password increase, encryption algorithm and the like, belongs to the packaging of confidential documents, and is easy to crack and divulge a secret; and the method adopts a mode of directly replacing the file name without any change of the content, and the confidentiality is lowest, and related regulations are violated.
4. Key generation convenience
The invention transmits the original data of the generated key on line or puts the original data in a secret place in advance, the sending end can generate the key at any time, and the receiving end can quickly generate the key for decryption as long as receiving the encrypted digital elevation model and the control point number.
Drawings
Fig. 1 is a schematic flow chart of a method for encrypting a digital elevation model based on a mapping control point result table according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail below with reference to specific embodiments and with reference to the attached drawings.
The method for encrypting the digital elevation model based on the mapping control point result table comprises the following steps: a sending end selects a mapping control point result table; randomly selecting 1 control point from a surveying and mapping control point result table; reading out all effective digits of the control point and generating a pixel size encryption password; then randomly selecting a plurality of control points, reading out the effective numbers of all the control points and generating a digital elevation encryption password; and writing the selected control point number into the encrypted file. Selecting a digital elevation model file to be encrypted, and converting the file into an ASCII format; reading coordinate data in an ASCII file header; calculating relative relation data of the coordinate values and the coordinate values of the selected control point and writing the relative relation data into an encrypted file; encrypting pixel size data in a file header by using a pixel size encryption password and writing the pixel size data into an encrypted file; and encrypting all digital elevation values of the ASCII file by using the generated digital elevation encryption password, and writing the encrypted digital elevation into the encrypted file. Transmitting the encrypted file to a receiving end, generating various decryption passwords by the receiving end by utilizing a stored control point result table and reading control point numbers in the encrypted file, and obtaining an original ASCII file according to the inverse operation of the encryption operation of the transmitting end; and converting the ASCII file into an initial format to finish the encryption transmission of the digital elevation model.
The method is shown in fig. 1, and specifically comprises the following steps:
step 1, a file sending end selects a digital elevation model file to be encrypted, and the digital elevation model file is converted into an ASCII file in an ASCII format.
The data of the digital elevation model is usually in a GeoTIFF format, and can be converted into an ASCII format by globalmpper software for calculation and encryption, i.e., converted from a file with an extension of ". tif" to a file with an extension of ". asc".
In this embodiment, the specific operation steps are as follows: opening Globalmapper software; opening DEM Data, clicking "Open Your Own Data Files" under the menu of "File", selecting corresponding DEM Data (GeoTIFF format), and clicking "Open". After the File is opened, click on "Export →" under the "File" menu, Select "Export Elevation Grid Format … …", Select "Arc ASCII Grid" in the "Select Export Format" dialog box that pops up, and click on "OK". Clicking OK on a data storage dialog box popped up later to finish the conversion of DEM data. The converted ASCII format file may be opened directly, for example:
Figure BDA0001756427480000061
Figure BDA0001756427480000071
836.199 838.837 838.571 835.617 832.148 828.874 823.868 815.593806.904 800.557 795.996 792.708 791.236
834.264 838.33 839.052 835.943 832.113 829.524 823.82 814.58 807.724803.11 799.057 795.227 791.787
834.188 837.462 838.816 838.918 836.431 834.143 828.917 819.808814.224 810.171 806.766 801.165 797.804
836.812 840.223 844.258 847.182 847.277 844.403 838.384 828.549821.165 816.614 812.189 809.334 809.636
838.123 843.025 848.751 851.812 851.741 848.5 842.803 834.715 827.322820.235 816.521 816.913 821.136
840.077 845.92 851.326 854.68 853.977 850.5 844.972 838.634 834.145829.494 825.624 826.313 830.18
and 2, selecting a surveying and mapping control point result table by the file sending end to serve as a password generation file for digital elevation model file transmission.
In this embodiment, the selected mapping control point result table (data is virtual data, not real national coordinates, but only used for example) is as follows:
and 3, randomly selecting 1 control point in the surveying and mapping control point result table, and writing the selected control point number into the encrypted file.
In this embodiment, an AC005 point is selected, and the point number is written into the encrypted file, so that the file receiving end knows which control point is used to calculate the coordinate relative relationship and generate the pixel size encryption password.
And 4, calculating relative relation data of coordinate values of the coordinate points in the ASCII file header and the selected coordinate values of the control points, and writing the relative relation data into the encrypted file. The method for calculating the relative relationship data between the coordinate value of the coordinate point in the ASCII file header and the coordinate value of the selected control point comprises the following steps:
the ordinate increment Δ X ═ X-X;
the abscissa increment Δ Y is Y-Y;
wherein X is the longitudinal coordinate value of the coordinate point in the ASCII file header, Y is the abscissa coordinate value of the coordinate point in the ASCII file header, X is the longitudinal coordinate value of the control point, and Y is the abscissa coordinate value of the control point.
In this embodiment, 1420.90 and-12094.71 are written to the encrypted document:
the ordinate increment Δ X ═ X-X; Δ X-2838109.97-2836689.07-1420.90
The abscissa increment Δ Y is Y-Y; and delta Y is 39765552.67-39777647.38 is-12094.71.
And 5, generating a 15-bit pixel size encryption password by using the selected control point data. The method specifically comprises the following steps:
selecting effective digits of longitudinal coordinate values of the 1-bit control points in a reverse order, namely selecting the last 1-bit effective digit of the X value as the 1 st bit of the encryption password;
selecting effective digits of the abscissa values of the 1-bit control points in a reverse order, namely selecting the last 1-bit effective digit of the Y value as the 2 nd bit of the encryption password;
selecting effective digits of the elevation values of the 1-bit control points in a reverse order, namely selecting the last 1-bit effective digit of the H value as the 3 rd bit of the encryption password;
selecting an effective number of a longitudinal coordinate value of the 1-bit control point in a reverse order, namely selecting a 2 nd effective number of the reciprocal of the X value as a 4 th bit of the encryption password;
selecting effective digits of the abscissa values of the 1-bit control points in a reverse order, namely selecting the 2 nd-from-last effective digit of the Y value as the 5 th bit of the encryption password;
selecting effective digits of elevation values of 1 control point in a reverse order, namely selecting the 2 nd-from-last effective digit of the H value as the 6 th digit of the encryption password;
selecting an effective number of a longitudinal coordinate value of the 1-bit control point in a reverse order, namely selecting a 3 rd-from-last effective number of the X value as a 7 th bit of the encryption password;
selecting effective digits of the abscissa values of the 1-bit control points in a reverse order, namely selecting the last 3-bit effective digit of the Y value as the 8 th bit of the encryption password;
selecting effective digits of elevation values of 1 control point in a reverse order, namely selecting the last 3-digit effective digit of the H value as the 9 th digit of the encryption password;
selecting an effective number of a longitudinal coordinate value of the 1-bit control point in a reverse order, namely selecting a 4 th effective number from the last number of the X value as a 10 th bit of the encryption password;
selecting effective digits of the abscissa values of the 1-bit control points in a reverse order, namely selecting the 4 th effective digit of the Y value as the 11 th digit of the encryption password;
selecting an effective number of a longitudinal coordinate value of the 1-bit control point in a reverse order, namely selecting a 5 th effective number from the last number of the X value as a 12 th bit of the encryption password;
selecting effective digits of the abscissa values of the 1-bit control points in a reverse order, namely selecting the 5 th effective digit of the Y value as the 13 th digit of the encryption password;
selecting an effective number of a longitudinal coordinate value of the 1-bit control point in a reverse order, namely selecting a 6 th effective number from the last number of the X value as a 14 th bit of the encryption password;
and selecting the effective number of the abscissa value of the 1-bit control point in the reverse order, namely selecting the 6 th effective number of the reciprocal of the Y value as the 15 th bit of the encryption password.
In the method, 6 effective digits are selected from the ordinate value X and the abscissa value Y respectively, and 3 effective digits are selected from the elevation value to form a 15-digit encryption password together.
In this embodiment, the password is generated using AC005 coordinate values:
AC005 2838109.97 39765552.67 1650.26
the generated 15-bit encryption password is: 776962920051585.
and 6, encrypting pixel size data in the ASCII file header by using the generated 15-bit pixel size encryption password, and writing the result into an encrypted file. The method specifically comprises the following steps: converting the 15-bit encrypted password into an encrypted value, wherein the encrypted value is a small numerical value, the first 3 bits of the small numerical value are 0.00, and the 15-bit password value is used from the 4 th bit to the last bit; and adding the pixel size value and the encryption value, and writing the result into the encrypted file.
In this embodiment, the encrypted value of the pixel size is: 0.00776962920051585
Adding the pixel size value and the encryption value, and writing the obtained number into the encrypted document, namely:
0.00027777777777769+0.00776962920051585=0.00804740697829354。
and 7, randomly selecting 10 digital elevation values in the ASCII file and taking the average value of the 10 digital elevation values to obtain the integral part digit of the average value, wherein the digit is used as the digit of the digital elevation encryption password.
The median in this example is 3.
And 8, calculating the number of the control points to be selected according to the effective digital digits required by the generation of the 100 digital elevation encryption passwords. The method specifically comprises the following steps:
firstly, calculating effective digital digits required by generating 100 digital elevation encryption passwords, namely multiplying the digits of a single password by 100;
each control point calculates the number of control points to be selected according to 20-bit effective digits;
namely: the number of control points selected is (number of digits of a single password 100)/20.
In this embodiment, the number of control points selected is (3 × 100)/20 is 15.
And 9, randomly selecting a specified number of control points in the control point result table, and taking out effective numbers in the ordinate value X, the abscissa value Y and the elevation value H of all the control points, wherein the effective numbers comprise effective numbers after the decimal point but do not comprise the decimal point.
In this embodiment, the selected control points are as follows:
Figure BDA0001756427480000101
the order of the control points is as follows: AC005AC003AC002AC004 … …, and the recording result is written into the encrypted file.
And step 10, generating 100 digital elevation encryption passwords by using all the obtained effective digits according to a certain sequence. The method for sequentially generating comprises the following specific steps:
1. and sequentially selecting all effective numbers in the ordinate value X, the abscissa value Y and the elevation value H of the selected control point.
2. And circularly selecting the effective numbers of the ordinate value, the abscissa value and the elevation value of one control point or reversely and circularly selecting 1 bit each time until all the effective numbers of one control point are selected, and then selecting the effective number of the next control point. For example:
in one control point, circularly selecting effective digits of longitudinal coordinate values, circularly selecting effective digits of horizontal coordinate values, circularly selecting effective digits of elevation values, selecting 1 bit each time until all effective digits of one control point are selected, and then selecting effective digits of the next control point; or the like, or, alternatively,
in one control point, effective digits of longitudinal coordinate values are selected in a reverse circulation mode, effective digits of transverse coordinate values are selected in a reverse circulation mode, effective digits of elevation values are selected in a reverse circulation mode, 1 digit is selected each time until all effective digits of one control point are selected, and then effective digits of the next control point are selected.
3. And respectively selecting the effective numbers of the ordinate value, the abscissa value and the elevation value of one control point in a circulating mode or in a reverse circulating mode, wherein 1 bit is selected each time until all the effective numbers of one control point are selected, and then selecting the effective number of the next control point. For example:
in one control point, circularly selecting effective digits of longitudinal coordinate values, reversely and circularly selecting effective digits of transverse coordinate values, circularly selecting effective digits of elevation values, selecting 1 bit each time until all effective digits of one control point are selected, and then selecting effective digits of the next control point; or the like, or, alternatively,
in one control point, circularly selecting effective digits of longitudinal coordinate values, circularly selecting effective digits of horizontal coordinate values, reversely and circularly selecting effective digits of elevation values, selecting 1 bit each time until all effective digits of one control point are selected, and then selecting effective digits of the next control point; or the like, or, alternatively,
in one control point, effective digits of longitudinal coordinate values are selected in a reverse circulation mode, effective digits of transverse coordinate values are selected in a circulation mode, effective digits of elevation values are selected in a circulation mode, 1 digit is selected each time until all effective digits of one control point are selected, and then effective digits of the next control point are selected; or the like, or, alternatively,
in one control point, circularly selecting effective digits of longitudinal coordinate values, reversely and circularly selecting effective digits of transverse coordinate values, reversely and circularly selecting effective digits of elevation values, selecting 1 bit each time until all effective digits of one control point are selected, and then selecting effective digits of the next control point; or the like, or, alternatively,
in one control point, effective digits of longitudinal coordinate values are selected in a reverse circulation mode, effective digits of horizontal coordinate values are selected in a circulation mode, effective digits of elevation values are selected in a reverse circulation mode, 1 digit is selected each time until all effective digits of one control point are selected, and then effective digits of the next control point are selected; or the like, or, alternatively,
in one control point, effective digits of longitudinal coordinate values are selected in a reverse circulation mode, effective digits of transverse coordinate values are selected in a reverse circulation mode, effective digits of elevation values are selected in a circulation mode, 1 digit is selected each time until all effective digits of one control point are selected, and then effective digits of the next control point are selected.
4. And circularly selecting the effective numbers of the longitudinal coordinate value, the horizontal coordinate value and the elevation value of each control point together or reversely and circularly selecting the effective numbers of the longitudinal coordinate value, the horizontal coordinate value and the elevation value, wherein 1 bit, 2 bits or 3 bits are selected each time until all the effective numbers of all the control points are selected.
5. And respectively and circularly selecting the effective numbers of the longitudinal coordinate value, the horizontal coordinate value and the elevation value of each control point or reversely and circularly selecting the effective numbers of the longitudinal coordinate value, the horizontal coordinate value and the elevation value of each control point, and taking 1 bit, 2 bits or 3 bits each time until all the effective numbers of all the control points are selected.
Of course, the cycle pattern may be many and is not limited to the above method.
In this embodiment, X, Y, H values are read in one control point inner loop, and 1 bit is read each time, and the X positive sequence, the Y negative sequence and the H positive sequence are taken. And sequentially generating an integer value key group by using all the obtained valid numbers, wherein the key group consists of 100 keys, each key is an integer value generated by 3 valid numbers, and the generated key group is as follows:
271 866 325 850 152 056……
and 11, encrypting the digital elevation value by using the digital elevation encryption password and writing the encrypted digital elevation value into an encrypted file. The method specifically comprises the following steps: and reading the digital elevation values in sequence, adding the digital elevation values to the encryption passwords in sequence, and writing the result into an encryption file, wherein 100 encryption passwords are recycled.
In this embodiment, the sequential reading height value is: 836.199838.837838.571835.617832.148828.874 … …, respectively adding the encryption passwords in sequence: 1107.1991704.8371163.5711685.617984.148884.874 … …, writing it to the encrypted document.
And step 12, transmitting the encrypted file to a file receiving end through the Internet or other ways.
And step 13, the file receiving end reads the control point data corresponding to the control point number in the encrypted file by using the stored control point result table and according to the control point number recorded by the file sending end, and generates a decryption password.
And step 14, decrypting according to the inverse operation of the encryption operation of the file sending end, wherein the decryption comprises coordinate data in an ASCII file header, pixel size data and all digital elevation values, and obtaining an original ASCII file. The method specifically comprises the following steps:
and removing the relative relation between the coordinate values of the coordinate points in the ASCII file header and the coordinate values of the selected control points:
ordinate: x- Δ X;
the abscissa: y- Δ Y;
in the formula, delta X is an ordinate increment, delta Y is an abscissa increment, X is a control point ordinate value, and Y is a control point abscissa value;
decrypting the pixel size data: subtracting the pixel size encryption password from the pixel size encryption result according to the corresponding decimal place number;
and (3) decryption of the digital elevation value: and respectively subtracting the digital elevation encryption passwords from the encrypted digital elevation values in sequence.
In this embodiment, the relative relationship between the coordinate values in the ASCII file header and the selected control point coordinate values is released:
ordinate: x- Δ X-2838109.97-1420.90-2836689.07;
the abscissa: y- Δ Y-39765552.67 + 12094.71-39777647.38;
pixel size decryption: 0.00804740697829354-0.00776962920051585 ═ 0.00027777777777769
And (3) decryption of the digital elevation value: 1107.1991704.8371163.5711685.617984.148884.874 … …, the cipher values 271866325850152056 … … are subtracted to obtain the original elevation values 836.199838.837838.571835.617832.148828.874 … ….
And step 15, converting the ASCII file into an initial format to finish the encryption transmission of the digital elevation model.
In this embodiment, the GlobalMapper software is opened, the Open yourOwn DataFiles in the "File" menu are clicked, the corresponding DEM data (ASCII Format) is selected, the Open state is clicked, "Export →" in the "File" menu is clicked, "Export Elevation Grid Format … … is selected, the" GeoTIFF "is selected in the pop-up" Select Export Format "dialog box, and the OK is clicked. Clicking OK on a data storage dialog box popped up later to finish the conversion of DEM data.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. A method for encrypting a digital elevation model based on a mapping control point result table is characterized by comprising the following steps:
step 1, a file sending end selects a digital elevation model file to be encrypted, and converts the digital elevation model file into an ASCII (American standard code for information interchange) file;
step 2, the file sending end selects a surveying and mapping control point result table as a password generation file for digital elevation model file transmission;
step 3, randomly selecting 1 control point in the mapping control point result table, and writing the selected control point number into an encrypted file;
step 4, calculating relative relation data of coordinate values of the coordinate points in the ASCII file header and the coordinate values of the selected control points, and writing the relative relation data into the encrypted file;
step 5, generating a 15-bit pixel size encryption password by using the selected control point data;
step 6, encrypting pixel size data in an ASCII file header by using the generated 15-bit pixel size encryption password, and writing the result into an encrypted file;
step 7, randomly selecting 10 digital elevation values from the ASCII file and taking the average value of the 10 digital elevation values to obtain the integral part digit of the average value, wherein the digit is used as the digit of the digital elevation encryption password;
step 8, calculating the number of control points to be selected according to the effective digital digits required by generating 100 digital elevation encryption passwords;
step 9, randomly selecting a designated number of control points in the control point result table, taking out effective numbers in the ordinate value X, the abscissa value Y and the elevation value H of all the control points, wherein the effective numbers comprise effective numbers after decimal points but do not comprise decimal points, and writing the number of the selected control point into an encrypted file;
step 10, generating 100 digital elevation encryption passwords by using all the obtained effective digits according to a certain sequence;
step 11, encrypting the digital elevation value by using a digital elevation encryption password and writing the encrypted digital elevation value into an encrypted file;
step 12, transmitting the encrypted file to a file receiving end through a transmission path, wherein the transmission path comprises the Internet;
step 13, the file receiving end reads the control point data corresponding to the control point number in the encrypted file by using the stored control point result table and according to the control point number recorded by the file sending end, and generates a decryption password;
step 14, decrypting according to the inverse operation of the encryption operation of the file sending end, wherein the decryption includes coordinate data in an ASCII file header, pixel size data and all digital elevation values, and obtaining an original ASCII file;
and step 15, converting the ASCII file into an initial format to finish the encryption transmission of the digital elevation model.
2. The method of claim 1, wherein in step 4, the data for calculating the relative relationship between coordinate values of the coordinate points in the ASCII file header and the selected coordinate values of the control points is calculated by:
the ordinate increment Δ X ═ X-X;
the abscissa increment Δ Y is Y-Y;
wherein X is the longitudinal coordinate value of the coordinate point in the ASCII file header, Y is the abscissa coordinate value of the coordinate point in the ASCII file header, X is the longitudinal coordinate value of the control point, and Y is the abscissa coordinate value of the control point.
3. The method according to claim 1, characterized in that the method of step 5 is specifically:
selecting effective digits of longitudinal coordinate values of the 1-bit control points in a reverse order, namely selecting the last 1-bit effective digit of the X value as the 1 st bit of the encryption password;
selecting effective digits of the abscissa values of the 1-bit control points in a reverse order, namely selecting the last 1-bit effective digit of the Y value as the 2 nd bit of the encryption password;
the effective number of the elevation value of the 1-bit control point is selected in a reverse order, namely the last 1-bit effective number of the H value is selected as the 3 rd bit of the encryption password;
selecting effective digits of longitudinal coordinate values of the 1-bit control points in a reverse order, namely selecting the 2 nd-from-last effective digit of the X value as the 4 th bit of the encryption password;
the effective number of the abscissa value of the 1-bit control point is selected in the reverse order, namely the 2 nd from last effective number of the Y value is selected as the 5 th bit of the encryption password;
the effective number of the elevation value of the 1-bit control point is selected in a reverse order, namely the 2 nd from last effective number of the H value is selected as the 6 th bit of the encryption password;
by analogy, 1-bit effective digit of each coordinate value is selected for the selected control point in reverse order according to the selection sequence of the ordinate value, the abscissa value and the elevation value, 6-bit effective digits are selected from the ordinate value and the abscissa value respectively, and 3-bit effective digits are selected from the elevation value to jointly form a 15-bit encryption password.
4. The method according to claim 1, characterized in that the method of step 6 is specifically:
converting the 15-bit encrypted password into an encrypted value, wherein the encrypted value is a small numerical value, the first 3 bits of the small numerical value are 0.00, and the 15-bit password value is used from the 4 th bit to the last bit;
and adding the pixel size value and the encryption value, and writing the result into the encrypted file.
5. The method according to claim 1, characterized in that the method of step 8 is specifically:
firstly, calculating effective digital digits required by generating 100 digital elevation encryption passwords, namely multiplying the digits of a single password by 100;
each control point calculates the number of control points to be selected according to 20-bit effective digits;
namely: the number of control points selected is (number of digits of a single password 100)/20.
6. The method according to claim 1, characterized in that the method of step 11 is embodied as:
and reading the digital elevation values in sequence, adding the digital elevation values to the encryption passwords in sequence, and writing the result into an encryption file, wherein 100 encryption passwords are recycled.
7. The method according to claim 1, characterized in that the method of step 14 is embodied as:
and removing the relative relation between the coordinate values of the coordinate points in the ASCII file header and the coordinate values of the selected control points:
ordinate: x- Δ X;
the abscissa: y- Δ Y;
in the formula, delta X is an ordinate increment, delta Y is an abscissa increment, X is a control point ordinate value, and Y is a control point abscissa value;
decrypting the pixel size data: subtracting the pixel size encryption password from the pixel size encryption result according to the corresponding decimal place number;
and (3) decryption of the digital elevation value: and respectively subtracting the digital elevation encryption passwords from the encrypted digital elevation values in sequence.
CN201810889027.9A 2018-08-07 2018-08-07 Method for encrypting digital elevation model based on surveying and mapping control point achievement table Active CN109286607B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810889027.9A CN109286607B (en) 2018-08-07 2018-08-07 Method for encrypting digital elevation model based on surveying and mapping control point achievement table

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810889027.9A CN109286607B (en) 2018-08-07 2018-08-07 Method for encrypting digital elevation model based on surveying and mapping control point achievement table

Publications (2)

Publication Number Publication Date
CN109286607A CN109286607A (en) 2019-01-29
CN109286607B true CN109286607B (en) 2020-11-03

Family

ID=65182953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810889027.9A Active CN109286607B (en) 2018-08-07 2018-08-07 Method for encrypting digital elevation model based on surveying and mapping control point achievement table

Country Status (1)

Country Link
CN (1) CN109286607B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116167091B (en) * 2023-04-24 2023-06-30 南京麦堤微林信息科技有限公司 Mapping data encryption method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106370A (en) * 2013-02-16 2013-05-15 中国人民解放军信息工程大学 Information camouflage and reduction method applied to digital elevation model (DEM)
CN105005961A (en) * 2015-06-30 2015-10-28 中国人民解放军信息工程大学 Information disguising and reducing methods suitable for triangulated irregular netting digital elevation model
CN106372815A (en) * 2016-10-04 2017-02-01 南怀方 Digital elevation model-based mineral resources reserve evaluation method and application
CN106712968A (en) * 2017-02-22 2017-05-24 北京智慧云测科技有限公司 Secret key acquiring method, digital signature method and devices
CN108234521A (en) * 2018-02-08 2018-06-29 中国石油天然气集团公司 A kind of secrecy coordinate transmission method, system and System Utilization Procedure

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9137011B2 (en) * 2013-05-07 2015-09-15 Empire Technology Development Llc Rapid data encryption and decryption for secure communication over open channels with plausible deniability

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103106370A (en) * 2013-02-16 2013-05-15 中国人民解放军信息工程大学 Information camouflage and reduction method applied to digital elevation model (DEM)
CN105005961A (en) * 2015-06-30 2015-10-28 中国人民解放军信息工程大学 Information disguising and reducing methods suitable for triangulated irregular netting digital elevation model
CN106372815A (en) * 2016-10-04 2017-02-01 南怀方 Digital elevation model-based mineral resources reserve evaluation method and application
CN106712968A (en) * 2017-02-22 2017-05-24 北京智慧云测科技有限公司 Secret key acquiring method, digital signature method and devices
CN108234521A (en) * 2018-02-08 2018-06-29 中国石油天然气集团公司 A kind of secrecy coordinate transmission method, system and System Utilization Procedure

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"基于已有基础地理信息数据的加密方法";刘英等;《测绘标准化》;20160615;全文 *

Also Published As

Publication number Publication date
CN109286607A (en) 2019-01-29

Similar Documents

Publication Publication Date Title
CN109617682B (en) Ciphertext domain reversible information hiding method based on histogram left-right shifting
CN112511304A (en) Power data privacy communication method based on hybrid encryption algorithm
GB2600038A (en) A Method for Solving a Millionaire Problem Based on Homomorphic Encryption
CN104751065A (en) Encryption method for geographic information product file
CN109325367A (en) Information hiding method, device, equipment and computer readable storage medium
CN105916141B (en) A kind of realization system and method for self synchronous Zu Chongzhi's enciphering and deciphering algorithm
CN111510464A (en) Epidemic situation information sharing method and system for protecting user privacy
CN109286607B (en) Method for encrypting digital elevation model based on surveying and mapping control point achievement table
CN104881838A (en) A meaningful non-augmented image storage and reconstruction method based on GF (23) (K, N)
CN109600620A (en) Video file guard method
CN106875323B (en) Information hiding method and device based on image encryption
CN101009548A (en) Data encryption method based on encryption technology
CN105471577A (en) Anti-leakage key encryption method based on 3D modeling
CN101924630B (en) Rapid encoding and decoding method for wireless local area network
CN111314270B (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
CN104202147A (en) Encryption method based on geographic information product features
CN106228503A (en) The digital watermark embedding of satellite remote-sensing image SHP dot file and extracting method
CN109448821B (en) Network transmission method of digital orthophoto map
CN103294937A (en) Software protection system and software protection method
CN101534191A (en) Dynamic encrypting method realizing one secrete key for one file
CN108712424B (en) Method for encrypting text based on mapping control point result table
CN103746793A (en) Number form text encryption and decryption methods
KR101076747B1 (en) Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module
Feng-ying et al. A new image encryption algorithm based on the Logistic chaotic system
CN101604362A (en) The computer system and the method that are used for software cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100120 Beijing Xicheng District six laying Kang

Applicant after: CHINA NATIONAL PETROLEUM Corp.

Applicant after: CHINA PETROLEUM PIPELINE ENGINEERING Co.,Ltd.

Applicant after: DESIGN BRANCH OF CHINA PETROLEUM PIPELINE ENGINEERING Corp.

Address before: 100120 Beijing Xicheng District six laying Kang

Applicant before: China National Petroleum Corp.

Applicant before: CHINA PETROLEUM PIPELINE ENGINEERING Co.,Ltd.

Applicant before: DESIGN BRANCH OF CHINA PETROLEUM PIPELINE ENGINEERING Corp.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201009

Address after: 100007 Beijing, Dongzhimen, North Street, No. 9, No.

Applicant after: CHINA NATIONAL PETROLEUM Corp.

Applicant after: CHINA PETROLEUM PIPELINE ENGINEERING Co.,Ltd.

Applicant after: CHINA PETROLEUM PIPELINE ENGINEERING Corp.

Address before: 100120 Beijing Xicheng District six laying Kang

Applicant before: CHINA NATIONAL PETROLEUM Corp.

Applicant before: CHINA PETROLEUM PIPELINE ENGINEERING Co.,Ltd.

Applicant before: DESIGN BRANCH OF CHINA PETROLEUM PIPELINE ENGINEERING Corp.

GR01 Patent grant
GR01 Patent grant