CN102332079A - GIS Vector Data Camouflage and Restoration Method Based on Error Random Interference - Google Patents

GIS Vector Data Camouflage and Restoration Method Based on Error Random Interference Download PDF

Info

Publication number
CN102332079A
CN102332079A CN201110274342A CN201110274342A CN102332079A CN 102332079 A CN102332079 A CN 102332079A CN 201110274342 A CN201110274342 A CN 201110274342A CN 201110274342 A CN201110274342 A CN 201110274342A CN 102332079 A CN102332079 A CN 102332079A
Authority
CN
China
Prior art keywords
data
file
key
point
abscissa
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110274342A
Other languages
Chinese (zh)
Other versions
CN102332079B (en
Inventor
李安波
闾国年
周卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN2011102743429A priority Critical patent/CN102332079B/en
Publication of CN102332079A publication Critical patent/CN102332079A/en
Application granted granted Critical
Publication of CN102332079B publication Critical patent/CN102332079B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

本发明公开了一种基于误差随机干扰的GIS矢量数据伪装与还原方法,属于地理信息安全领域。本方法的数据伪装处理步骤主要包括:(1)打开一个GIS矢量数据图层文件,判断图层类型并计算横坐标数据中小数点后的位数N,设置8位二进制随机信息做为密钥Key,并存入密钥文件;(2)数据读取及分组;(3)针对数组队列D中的每个分组Di,进行数据的误差干扰处理;(4)循环步骤(2)(3),直至每一要素处理完毕后,保存伪装后的数据文件。本发明的方法能有效提高GIS矢量数据在数据传输、脱密处理中的安全性,可应用于GIS矢量数据的隐藏通信与安全传输。

Figure 201110274342

The invention discloses a method for disguising and restoring GIS vector data based on error random interference, which belongs to the field of geographic information security. The data masquerading processing steps of this method mainly include: (1) Open a GIS vector data layer file, determine the layer type and calculate the number of digits N after the decimal point in the abscissa data, and set 8-bit binary random information as the key Key , and stored in the key file; (2) Data reading and grouping; (3) For each group D i in the array queue D, perform data error interference processing; (4) Cycle steps (2) (3) , until each element is processed, save the camouflaged data file. The method of the invention can effectively improve the security of GIS vector data in data transmission and decryption processing, and can be applied to hidden communication and safe transmission of GIS vector data.

Figure 201110274342

Description

基于误差随机干扰的GIS矢量数据伪装与还原方法GIS Vector Data Camouflage and Restoration Method Based on Error Random Interference

技术领域 technical field

本发明属于地理信息安全领域,具体涉及一种基于误差随机干扰技术进行GIS矢量数据伪装与还原的方法。 The invention belongs to the field of geographic information security, and in particular relates to a method for disguising and restoring GIS vector data based on error random interference technology.

背景技术 Background technique

地理信息的安全防护涉及国家安全和社会利益,是当前急需解决的国家和社会重大需求问题。特别是当今空间数据共享需求逐步扩大,地理信息服务应用不断拓展的情况下,地理信息的安全问题进一步突出。作为国家空间数据基础设施主要数据内容的GIS矢量数据,其信息安全研究更是至关重要。 The security protection of geographic information involves national security and social interests, and is a major national and social demand that needs to be urgently addressed. Especially in today's situation where the demand for spatial data sharing is gradually expanding and the application of geographic information services is expanding, the security issues of geographic information are further highlighted. As the main data content of the National Spatial Data Infrastructure, GIS vector data, its information security research is even more important.

目前,信息伪装已成为信息安全研究中除密码学之外的另一重要分支。国内外相关研究文献及专利检索结果分析表明,目前,在信息伪装的研究方面,所研究的载体数据类型主要包括图像、视频、遥感影像、DEM等。但是,矢量数据由于其具有无固定存储顺序的数据组织、多样的数据格式、强大的可视化表达手段、复杂的投影变换、繁多的空间分析应用,以及精度高、冗余少等诸多方面的特性,使得针对矢量数据的信息伪装研究具有一定的特殊性和较大难度。 At present, information camouflage has become another important branch besides cryptography in information security research. The analysis of relevant research literature and patent retrieval results at home and abroad shows that at present, in the research of information camouflage, the carrier data types mainly include images, videos, remote sensing images, DEM and so on. However, vector data has many characteristics such as data organization without fixed storage order, various data formats, powerful visual expression means, complex projection transformation, various spatial analysis applications, high precision and less redundancy. This makes the information camouflage research on vector data has certain particularity and great difficulty.

发明内容 Contents of the invention

本发明的目的在于:基于误差随机干扰技术,提出一种针对GIS矢量数据的伪装与还原方法,以有效提高GIS矢量数据在数据传输、脱密处理中的安全性。 The object of the present invention is to propose a method for disguising and restoring GIS vector data based on error random interference technology, so as to effectively improve the security of GIS vector data in data transmission and decryption processing.

为了实现上述目的,本发明所采取的技术方案主要包括以下过程: In order to achieve the above object, the technical solution adopted by the present invention mainly includes the following processes:

(1)伪装过程 (1) Masquerade process

步骤一:打开一个GIS矢量数据图层文件,判断图层类型并计算横坐标数据中小数点后的位数N,设置8位二进制随机信息做为密钥Key,并存入密钥文件; Step 1: Open a GIS vector data layer file, determine the layer type and calculate the number of digits N after the decimal point in the abscissa data, set 8-bit binary random information as the key Key, and store it in the key file;

步骤二:数据读取及分组 Step 2: Data reading and grouping

(a)如果为线面类型数据,则每次读取一个要素中的所有点的横坐标,计算点的个数m,并按照                                                

Figure 2011102743429100002DEST_PATH_IMAGE001
,分为L组,组织到数组队列D中; (a) If it is line-surface type data, read the abscissa of all points in a feature each time, calculate the number m of points, and follow
Figure 2011102743429100002DEST_PATH_IMAGE001
, divided into L groups, organized into the array queue D;

(b)如果为点类型数据,则读取该文件中的所有点要素,计算点的个数m,并将相关点要素的横坐标按照,分为L组,组织到数组队列D中; (b) If it is point type data, read all the point elements in the file, calculate the number m of points, and set the abscissa of the relevant point elements according to , divided into L groups, organized into the array queue D;

步骤三:针对数组队列D中的每个分组Di,进行数据的误差干扰处理,具体方法为: Step 3: For each packet D i in the array queue D, perform data error interference processing, the specific method is:

(a)取该分组Di中第一个数据Di1的小数点前第一位的值d; (a) Take the value d of the first decimal place of the first data D i1 in the group D i ;

(b)如果0<d<(N-1),则将该分组中相应密钥信息位为1的各数据,进行小数点后的第d位与第d+1位数据交换; (b) If 0<d<(N-1), exchange the d-th bit after the decimal point with the d+1-th bit of data for each data whose corresponding key information bit is 1 in the group;

    步骤四:循环步骤二至三,直至每一要素处理完毕后,保存伪装后的数据文件;   Step 4: Repeat steps 2 to 3 until each element is processed and save the camouflaged data file;

(2)还原过程 (2) Restoration process

步骤一:打开一GIS矢量数据图层文件,判断图层类型并计算横坐标数据中小数点后的位数N,读取密钥文件并设置密钥Key; Step 1: Open a GIS vector data layer file, determine the layer type and calculate the number of digits N after the decimal point in the abscissa data, read the key file and set the key Key;

步骤二:数据分组读取 Step 2: Read data in groups

(a)如果为线面类型数据,则每次读取一个要素中的所有点坐标数据的横坐标,计算其个数m,并按照

Figure 564447DEST_PATH_IMAGE001
,分为L组,组织到数组队列D中; (a) If it is line-surface type data, read the abscissa of all point coordinate data in an element each time, calculate its number m, and follow
Figure 564447DEST_PATH_IMAGE001
, divided into L groups and organized into array queue D;

(b)如果为点类型数据,则读取该文件中的所有点要素,计算点的个数m,并将相关点要素的横坐标按照

Figure 994292DEST_PATH_IMAGE001
,分为L组,组织到数组队列D中; (b) If it is point type data, read all the point elements in the file, calculate the number m of points, and set the abscissa of the relevant point elements according to
Figure 994292DEST_PATH_IMAGE001
, divided into L groups and organized into array queue D;

步骤三:针对每一坐标分组Di,进行数据的还原处理,具体方法为: Step 3: For each coordinate group D i , perform data restoration processing, the specific method is:

(a)取该分组Di中第一个数据Di1的小数点前第一位的值d; (a) Take the value d of the first decimal place of the first data D i1 in the group D i ;

(b)如果0<d<(N-1),则将该分组中相应密钥信息位为1的各数据,进行小数点后的第d位与第d+1位数据交换; (b) If 0<d<(N-1), exchange the d-th bit after the decimal point with the d+1-th bit of data for each data whose corresponding key information bit is 1 in the group;

步骤四:循环步骤二至三,直至每一要素处理完毕后,保存还原后的数据文件。 Step 4: Repeat steps 2 to 3 until each element is processed, and then save the restored data file.

本发明根据GIS矢量数据的数据组织特点,基于误差随机干扰原理,提出了一种针对GIS矢量数据的伪装与还原方法,可以进行shp格式数据的伪装与还原处理,一定程度上满足了GIS矢量数据的隐藏通信与安全传输需求。 According to the data organization characteristics of GIS vector data and based on the error random interference principle, the present invention proposes a camouflage and restoration method for GIS vector data, which can perform camouflage and restoration processing of shp format data, and satisfies GIS vector data to a certain extent hidden communication and secure transmission requirements.

附图说明 Description of drawings

图1为本发明实施例选取的实验数据。 Fig. 1 is the selected experimental data of the embodiment of the present invention.

图2是本发明方法的数据伪装流程图。 Fig. 2 is a data masquerading flow chart of the method of the present invention.

图3是本发明方法的数据还原流程图。 Fig. 3 is a data restoration flow chart of the method of the present invention.

图4 是本发明实施例中原始数据局部效果图。 Fig. 4 is a local effect diagram of original data in the embodiment of the present invention.

图5 是本发明实施例中伪装数据局部效果图。 Fig. 5 is a partial effect diagram of camouflaged data in the embodiment of the present invention.

具体实施方式 Detailed ways

下面结合附图和实施例做进一步详细说明。 Further detailed description will be given below in conjunction with the accompanying drawings and embodiments.

本实例选择一典型的shp面图层数据,针对数据的读取、伪装处理、数据还原的整个过程,进一步详细说明本发明。本实施例选择全国1:400万的省界面状图层数据(如图1)作为实验数据。密钥Key值为“10010101”。 In this example, a typical shp surface layer data is selected, and the whole process of data reading, camouflage processing, and data restoration is further described in detail. In this embodiment, the national 1:4 million provincial interface layer data (as shown in Figure 1) is selected as the experimental data. The value of the key Key is "10010101".

(1)数据伪装处理。 (1) Data masquerade processing.

步骤一:打开省界图层数据文件,数据格式为面状数据,横坐标小数点后的数据位数为14,密钥密钥Key值为“10010101”。 Step 1: Open the provincial boundary layer data file, the data format is planar data, the number of data digits after the decimal point on the abscissa is 14, and the key key value is "10010101".

步骤二:依次读取每一要素的空间数据,计算当前处理要素中坐标点的个数m并判断进行分组处理。 Step 2: Read the spatial data of each element in turn, calculate the number m of coordinate points in the currently processed element, and determine to perform grouping processing.

所读取第一个要素的坐标点个数为923。因为m>2n,按照

Figure 235917DEST_PATH_IMAGE001
,分为56组。将每组数据写入数组d后并添加入数组队列D中。 The number of coordinate points of the first element read is 923. Since m>2n, according to
Figure 235917DEST_PATH_IMAGE001
, divided into 56 groups. Write each set of data into array d and add it to array queue D.

步骤三:对数组队列D中的每一数组Di,进行数据的误差干扰处理。本实施例中,第一个数组D1中第一个数据为:121.49738309820822,其小数点前第一位的值d为1,符合0<d<(N-1)条件,则将该分组中相应密钥信息位为1的第1、4、6、8等四个数据,进行小数点后的第1位与第2位数据交换。 Step 3: For each array D i in the array queue D, perform data error interference processing. In this embodiment, the first data in the first array D 1 is: 121.49738309820822, the value d of the first digit before the decimal point is 1, which meets the condition of 0<d<(N-1), then the corresponding For the four data such as 1, 4, 6, and 8 whose key information bit is 1, exchange the data of the first and second digits after the decimal point.

步骤四:循环步骤二至三,直至每一要素处理完毕后,保存伪装后的数据文件。 Step 4: Repeat steps 2 to 3 until each element is processed, and save the camouflaged data file.

(2)数据还原处理。 (2) Data restoration processing.

步骤一:打开伪装处理后的省界图层数据文件,数据格式为面状数据。读取密钥文件,并设置密钥密钥Key,其值为“10010101”。 Step 1: Open the provincial boundary layer data file after masquerading, and the data format is area data. Read the key file, and set the key Key, whose value is "10010101".

步骤二:依次读取每一要素的空间数据,计算当前处理要素中坐标点的个数m并判断进行分组处理。 Step 2: Read the spatial data of each element in turn, calculate the number m of coordinate points in the currently processed element, and determine to perform grouping processing.

所读取第一个要素的坐标点个数为923。因为m>2n,按照

Figure 573358DEST_PATH_IMAGE001
,分为56组。将每组数据写入数组d后并添加入数组队列D中。 The number of coordinate points of the first element read is 923. Since m>2n, according to
Figure 573358DEST_PATH_IMAGE001
, divided into 56 groups. Write each set of data into array d and add it to array queue D.

步骤三:对数组队列D中的每一数组Di,进行数据的误差干扰处理。本实施例中,第一个数组D1中第一个数据小数点前第一位的值d为1,符合0<d<(N-1)条件,则将该分组中相应密钥信息位为1的第1、4、6、8等四个数据,进行小数点后的第1位与第2位数据交换。 Step 3: For each array D i in the array queue D, perform data error interference processing. In this embodiment, the value d of the first digit before the decimal point of the first data in the first array D1 is 1, which meets the condition of 0<d<(N-1), then the corresponding key information bit in the group is For the four data of 1, 1, 4, 6, and 8, exchange the data of the first digit and the second digit after the decimal point.

步骤四:循环步骤二至三,直至每一要素处理完毕后,保存还原后的数据文件。 Step 4: Repeat steps 2 to 3 until each element is processed, and then save the restored data file.

本发明实施例中仅以shp格式面图层数据的横坐标进行数据伪装与还原处理,该方法也可以适用于使用该数据的纵坐标进行数据伪装与还原处理。 In the embodiment of the present invention, only the abscissa of the surface layer data in shp format is used for data masquerade and restoration, and this method can also be applied to the data masquerade and restoration using the ordinate of the data.

本发明实施例中仅以面图层数据进行数据伪装与还原处理,该方法也可以适用于点、线类型图层数据。 In the embodiment of the present invention, only surface layer data is used for data camouflage and restoration processing, and this method can also be applied to point and line type layer data.

本发明实施例中仅以shp格式的GIS矢量数据进行数据伪装与还原处理,该方法也适用于GML、E00、MIF等其它格式GIS矢量数据的数据伪装与还原处理。 In the embodiment of the present invention, only the GIS vector data in shp format is used for data camouflage and restoration processing, and the method is also applicable to data camouflage and restoration processing of GIS vector data in other formats such as GML, E00, and MIF.

(3)测试分析。 (3) Test analysis.

由上述实施例中原始数据与伪装处理数据的效果图(图4、图5)可知:数据经伪装处理后,虽仍为可使用GIS软件正确打开的shp数据,但每个坐标点的位置发生了较大变化,对于数据精度质量要求较高的GIS矢量数据来说,这一处理显著降低了数据质量和数据使用价值,限制了非法拷贝或拦截数据的正常使用,达到一定的数据保护目的。只有合法用户获取到密钥文件,才能正确、无损地还原数据。 From the renderings of the original data and the masquerading data in the above embodiment (Fig. 4, Fig. 5), it can be seen that after the data is masquerading, although it is still the shp data that can be opened correctly by GIS software, the position of each coordinate point will be changed. For GIS vector data with high data accuracy and quality requirements, this process significantly reduces the data quality and data use value, limits the normal use of illegally copied or intercepted data, and achieves certain data protection purposes. Only when legitimate users obtain the key file can the data be restored correctly and losslessly.

综上分析,本发明所采用的方法可以成功地应用于GIS矢量数据的伪装与还原处理,一定程度上满足GIS矢量数据的隐藏通信与安全传输需求。 In summary, the method adopted in the present invention can be successfully applied to the camouflage and restoration processing of GIS vector data, and satisfies the hidden communication and secure transmission requirements of GIS vector data to a certain extent.

Claims (1)

1.基于误差随机干扰的GIS矢量数据伪装与还原方法,包括以下过程: 1. A method for camouflaging and restoring GIS vector data based on error random interference, including the following process: (1)伪装过程 (1) Masquerade process 步骤一:打开一个GIS矢量数据图层文件,判断图层类型并计算横坐标数据中小数点后的位数N,设置8位二进制随机信息做为密钥Key,并存入密钥文件; Step 1: Open a GIS vector data layer file, determine the layer type and calculate the number of digits N after the decimal point in the abscissa data, set 8-bit binary random information as the key Key, and store it in the key file; 步骤二:数据读取及分组 Step 2: Data reading and grouping 如果为线面类型数据,则每次读取一个要素中的所有点的横坐标,计算点的个数m,并按照                                                
Figure 2011102743429100001DEST_PATH_IMAGE001
,分为L组,组织到数组队列D中;
If it is line-surface type data, read the abscissa of all points in a feature each time, calculate the number m of points, and follow
Figure 2011102743429100001DEST_PATH_IMAGE001
, divided into L groups, organized into the array queue D;
如果为点类型数据,则读取该文件中的所有点要素,计算点的个数m,并将相关点要素的横坐标按照,分为L组,组织到数组队列D中; If it is point type data, read all the point elements in the file, calculate the number m of points, and set the abscissa of the relevant point elements according to , divided into L groups, organized into the array queue D; 步骤三:针对数组队列D中的每个分组Di,进行数据的误差干扰处理,具体方法为: Step 3: For each packet D i in the array queue D, perform data error interference processing, the specific method is: 取该分组Di中第一个数据Di1的小数点前第一位的值d; Take the value d of the first decimal place of the first data D i1 in the group D i ; 如果0<d<(N-1),则将该分组中相应密钥信息位为1的各数据,进行小数点后的第d位与第d+1位数据交换; If 0<d<(N-1), exchange the d-th bit after the decimal point with the d+1-th bit data for each data whose corresponding key information bit is 1 in the group; 步骤四:循环步骤二至三,直至每一要素处理完毕后,保存伪装后的数据文件; Step 4: Repeat steps 2 to 3 until each element is processed, and save the camouflaged data file; (2)还原过程 (2) Restoration process 步骤一:打开一GIS矢量数据图层文件,判断图层类型并计算横坐标数据中小数点后的位数N,读取密钥文件并设置密钥Key; Step 1: Open a GIS vector data layer file, determine the layer type and calculate the number of digits N after the decimal point in the abscissa data, read the key file and set the key Key; 步骤二:数据分组读取 Step 2: Read data in groups 如果为线面类型数据,则每次读取一个要素中的所有点坐标数据的横坐标,计算其个数m,并按照
Figure 722114DEST_PATH_IMAGE001
,分为L组,组织到数组队列D中;
If it is line-surface type data, read the abscissa of all point coordinate data in an element each time, calculate its number m, and follow
Figure 722114DEST_PATH_IMAGE001
, divided into L groups, organized into the array queue D;
如果为点类型数据,则读取该文件中的所有点要素,计算点的个数m,并将相关点要素的横坐标按照
Figure 544577DEST_PATH_IMAGE001
,分为L组,组织到数组队列D中;
If it is point type data, read all the point elements in the file, calculate the number m of points, and set the abscissa of the relevant point elements according to
Figure 544577DEST_PATH_IMAGE001
, divided into L groups, organized into the array queue D;
步骤三:针对每一坐标分组Di,进行数据的还原处理,具体方法为: Step 3: For each coordinate group D i , perform data restoration processing, the specific method is: 取该分组Di中第一个数据Di1的小数点前第一位的值d; Take the value d of the first decimal place of the first data D i1 in the group D i ; 如果0<d<(N-1),则将该分组中相应密钥信息位为1的各数据,进行小数点后的第d位与第d+1位数据交换; If 0<d<(N-1), exchange the d-th bit after the decimal point with the d+1-th bit data for each data whose corresponding key information bit is 1 in the group; 步骤四:循环步骤二至三,直至每一要素处理完毕后,保存还原后的数据文件。 Step 4: Repeat steps 2 to 3 until each element is processed, and then save the restored data file.
CN2011102743429A 2011-09-16 2011-09-16 GIS (geographic information system) vector data disguising and restoring method based on error random interference Expired - Fee Related CN102332079B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011102743429A CN102332079B (en) 2011-09-16 2011-09-16 GIS (geographic information system) vector data disguising and restoring method based on error random interference

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011102743429A CN102332079B (en) 2011-09-16 2011-09-16 GIS (geographic information system) vector data disguising and restoring method based on error random interference

Publications (2)

Publication Number Publication Date
CN102332079A true CN102332079A (en) 2012-01-25
CN102332079B CN102332079B (en) 2013-12-04

Family

ID=45483851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011102743429A Expired - Fee Related CN102332079B (en) 2011-09-16 2011-09-16 GIS (geographic information system) vector data disguising and restoring method based on error random interference

Country Status (1)

Country Link
CN (1) CN102332079B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622409A (en) * 2012-02-09 2012-08-01 南京师范大学 Line surface type GIS (Geographic Information System) vector data disguising and recovering method based on inclined angle transformation
CN103020544A (en) * 2013-01-04 2013-04-03 南京师范大学 Encryption and decryption method for shp line-surface graph layer data hierarchy
CN103067159A (en) * 2012-12-28 2013-04-24 南京师范大学 Geographic information system (GIS) vector data reversible decryption method
CN103093414A (en) * 2013-01-22 2013-05-08 南京师范大学 Decryption and recovery method of document object model (DOM) raster data
CN103559452A (en) * 2013-10-30 2014-02-05 南京师范大学 Altitude data decryption and recovery method
CN104077535A (en) * 2014-06-19 2014-10-01 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN110427450A (en) * 2019-08-09 2019-11-08 深圳四维集思技术服务有限公司 Oil-gas pipeline data processing method and system based on Internet map

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020147910A1 (en) * 2001-03-05 2002-10-10 Brundage Trent J. Digitally watermarked maps and signs and related navigational tools
JP2008501160A (en) * 2004-03-17 2008-01-17 シードラゴン ソフトウェア インコーポレイテッド Method and apparatus for navigating images
CN101576993A (en) * 2009-06-01 2009-11-11 南京师范大学 Digital watermark embedding and extraction method for GIS vector data based on data mask
CN101604440A (en) * 2009-04-23 2009-12-16 哈尔滨工程大学 A Reversible Watermarking Method for Vector Map Based on Spatial Features

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020147910A1 (en) * 2001-03-05 2002-10-10 Brundage Trent J. Digitally watermarked maps and signs and related navigational tools
JP2008501160A (en) * 2004-03-17 2008-01-17 シードラゴン ソフトウェア インコーポレイテッド Method and apparatus for navigating images
CN101604440A (en) * 2009-04-23 2009-12-16 哈尔滨工程大学 A Reversible Watermarking Method for Vector Map Based on Spatial Features
CN101576993A (en) * 2009-06-01 2009-11-11 南京师范大学 Digital watermark embedding and extraction method for GIS vector data based on data mask

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LI HUANG ET AL.: "Data Quality Inspection of Watermarked GIS Vector Map", 《2010 18TH INTERNATIONAL CONFERENCE ON GEOINFORMATICS》 *
邵承永 等.: "矢量地图的无损数据隐藏算法研究", 《中国图象图形学报》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622409A (en) * 2012-02-09 2012-08-01 南京师范大学 Line surface type GIS (Geographic Information System) vector data disguising and recovering method based on inclined angle transformation
CN103067159A (en) * 2012-12-28 2013-04-24 南京师范大学 Geographic information system (GIS) vector data reversible decryption method
CN103067159B (en) * 2012-12-28 2016-03-02 南京师范大学 A kind of reversible DecryptDecryption method of GIS vector data
CN103020544A (en) * 2013-01-04 2013-04-03 南京师范大学 Encryption and decryption method for shp line-surface graph layer data hierarchy
CN103020544B (en) * 2013-01-04 2015-05-20 南京师范大学 Encryption and decryption method for shp line-surface graph layer data hierarchy
CN103093414A (en) * 2013-01-22 2013-05-08 南京师范大学 Decryption and recovery method of document object model (DOM) raster data
CN103093414B (en) * 2013-01-22 2015-11-18 南京师范大学 A kind of DOM raster data DecryptDecryption and restoration methods
CN103559452A (en) * 2013-10-30 2014-02-05 南京师范大学 Altitude data decryption and recovery method
CN103559452B (en) * 2013-10-30 2016-03-30 南京师范大学 A kind of altitude data decryption and restoration methods
CN104077535A (en) * 2014-06-19 2014-10-01 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN104077535B (en) * 2014-06-19 2017-01-25 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN110427450A (en) * 2019-08-09 2019-11-08 深圳四维集思技术服务有限公司 Oil-gas pipeline data processing method and system based on Internet map

Also Published As

Publication number Publication date
CN102332079B (en) 2013-12-04

Similar Documents

Publication Publication Date Title
CN102332079B (en) GIS (geographic information system) vector data disguising and restoring method based on error random interference
Yang et al. Federated Learning with Privacy-preserving and Model IP-right-protection
CN110413652B (en) A big data privacy retrieval method based on edge computing
CN105959098A (en) Format-reserved encryption algorithm based on multi-segmented Feistel network
CN108494546A (en) A kind of whitepack encryption method, device and storage medium
CN102243700B (en) A data camouflage and restoration method of shp line surface layer based on chaotic transformation
Yu et al. SVD‐based image compression, encryption, and identity authentication algorithm on cloud
Zheng et al. A novel video copyright protection scheme based on blockchain and double watermarking
CN104143174B (en) Image disguising and reconstructing method based on Tangram algorithm and two-dimensional double-scale rectangular mapping
CN102509058B (en) Point type GIS vector data disguise and recovery method based on redundant bit replacement
CN110069907A (en) Big data source tracing method and system based on digital watermarking
CN112468494B (en) Intranet and extranet internet data transmission method and device
CN103853946B (en) A kind of GIS vector data copyright authentication method based on FCM cluster feature
CN103106656B (en) Image signatures based on profile wave convert generates and tampering detection and localization method
CN102799837A (en) Line and surface type global information system (GIS) vector data disguise and reduction method based on interpolation prediction
CN108877818B (en) An audio camouflage and recovery method combining key and random unit orthogonal basis
CN117978446A (en) Chip communication transmission encryption method, device, computer equipment and storage medium
CN117131546A (en) Hash verification method of spatial object data using the disorder of spatial point cloud collection
CN106228503A (en) The digital watermark embedding of satellite remote-sensing image SHP dot file and extracting method
CN102509056A (en) GIS (geographic information system) vector data camouflage and reduction method based on geometric accuracy weakening of elements
CN104835107A (en) Digital image disguising and reconstructing method based on block sequences
CN111460488B (en) Multi-image rapid encryption method based on pre-storage and n-dimensional Arnold transformation
Li et al. Disguise and reduction methods of gis vector data based on difference expansion principle
CN114756879A (en) Information table processing method and device, electronic equipment and computer readable medium
Li et al. Cost‐Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20131204

Termination date: 20160916

CF01 Termination of patent right due to non-payment of annual fee