CN103067159B - A kind of reversible DecryptDecryption method of GIS vector data - Google Patents
A kind of reversible DecryptDecryption method of GIS vector data Download PDFInfo
- Publication number
- CN103067159B CN103067159B CN201210586283.3A CN201210586283A CN103067159B CN 103067159 B CN103067159 B CN 103067159B CN 201210586283 A CN201210586283 A CN 201210586283A CN 103067159 B CN103067159 B CN 103067159B
- Authority
- CN
- China
- Prior art keywords
- prime
- control point
- key
- formula
- accuracy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Processing Or Creating Images (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a kind of reversible DecryptDecryption method of GIS vector data, belong to field of geographic information safety.The method comprises following process: (1) key generation process, comprises and determines data area, determines data transformation amount, calculate medial error that linear transformation amount causes and determine parameter, calculate medial error that nonlinear transformation amount causes and determine parameter, to be encrypted key K ey with rivest, shamir, adelman RSA and stored in key file; (2) DecryptDecryption process, comprises reading key file, deciphers and extracts key; Open original vector data; Obtain the set of key element point coordinates; Unitary coordinate; Circular treatment; (3) recovery process.Method of the present invention has the features such as randomness, gradually changeable, invertibity, improves the reliability of GIS vector data DecryptDecryption, the perfect theory and means system of geography information safeguard protection, can be used for the aspect such as to publish of GIS vector data.
Description
Technical field
The invention belongs to field of geographic information safety, be specifically related to a kind of reversible DecryptDecryption method for GIS vector data.
Background technology
Survey and draw geography information concerning expansion development space, concerning national security.Especially, under the main trend of global IT application, geography information safety protection problem is more and more outstanding.Vector data has the features such as precision is high, output quality good, data volume is little, and application is very extensive, and its safeguard protection research is very important.
According to national relevant laws and regulations, vector data openly uses to be needed through DecryptDecryption process, and DecryptDecryption comprises spatial accuracy DecryptDecryption and attribute DecryptDecryption two aspects.Spatial accuracy DecryptDecryption uses professional DecryptDecryption technology to carry out the displacement of key element, reduce its precision, and the data after DecryptDecryption is not easily recovered when not having key.Spatial accuracy DecryptDecryption method conventional at present comprises projection transform method, spatial alternation method, random error interference method etc.Projection transform method is reversible; Data space converter technique comprises similarity transformation, affine transformation and projective transformation etc., and this several transform method is linear transformation, is easy to recover, the poor reliability of DecryptDecryption process; There is the topological relation that can not ensure key element or the shortcoming such as algorithm is irreversible in meeting that random error interference method has.
Summary of the invention
The present invention is directed to the defect that existing DecryptDecryption method exists, provide a kind of nonlinear mixed model to carry out the method for DecryptDecryption process to vector data, there is the randomness of error, the Topological of element relationship, the invertibity of algorithm and be difficult to features such as cracking.
A kind of reversible DecryptDecryption method of GIS vector data, for line chart layer, comprises following process:
(1) key generation process
Step 11, determines data area: the minimum enclosed rectangle R obtaining original vector data V, R lower left corner coordinate is (x
min, y
min), upper right corner coordinate is (x
max, y
max), obtain data center point coordinate (x according to formula (1)
mid, y
mid), data length XL and data width YL;
Step 12, determine data transformation amount: concrete steps are as follows: input DATA POPULATION converted quantity offset, offset > 0, nonlinear transformation amount nonlinear, 0 < nonlinear <=offset, obtains linear transformation amount linear according to formula (2);
Step 13, calculates the medial error that linear transformation amount linear causes, determines the parameter affecting transform effect: focal distance f, flying height H, drift angle
inclination angle ω, swing angle κ, concrete steps are as follows:
C) focal distance f ∈ (0,1),
D) flying height H is calculated according to formula (3),
C) the range of disturbance linearExtent of linear change amount linear is calculated according to formula (4),
D) generate control point set, concrete steps are as follows: within the scope of minimum enclosed rectangle R, generate m*n (m*n >=6) individual equal control point composition control point, source set FromPoints={ (Fx
i, Fy
i) | i=1,2 ... m*n}; Each target control point coordinates (Tx is calculated according to formula (5)
i, Ty
i) composition target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
Wherein: directioin parameter dir
1in [0.0,1.0] scope, directioin parameter
perturbation of control points parameter random
1and random
2random selecting in [-1.0,1.0] scope,
E) Unitary coordinate, is normalized according to formula (6) obtains new coordinate set FromPoints '={ (Fx to control point, source set FromPoints and target control point set ToPoints
i', Fy
i') | i=1,2 ... m*n}, ToPoints '={ (Tx
i', Ty
i') | i=1,2 ... m*n},
F) drift angle is calculated
inclination angle ω, swing angle κ, utilize least square method to carry out matching to target control point in FromPoints ' Zhong Yuan control point and ToPoints ' according to formula (7) and resolve and obtain drift angle
inclination angle ω, swing angle κ,
G) linear transformation medial error accuracy is calculated
1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate " and={ (Tx
i", Ty
i") | i=1,2 ... m*n},
Medial error accuracy1 is calculated according to formula (9),
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy
1-1| > 0.01, then regulate each former target control point coordinates (Tx according to formula (10)
i, Ty
i), obtain new target control point coordinates (NTx
i, NTy
i), substitute former target control point and Tx with new target control point
i=NTx
i, Ty
i=NTy
i, obtain target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
I) circulation step e)-h) until | linear/accuracy
1-1| <=0.01, obtains final drift angle
inclination angle ω, swing angle κ;
Step 14, calculates the medial error that nonlinear transformation amount nonlinear causes, determines parameter j
0-j
5, concrete steps are as follows:
B) generate control point elevation, utilize the elevation Fz needed for formula (11) calculating control point, source set FromPoints each some displacement nonlinear
i, generate three-dimensional source control point set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... m*n},
B) carry out least square according to formula (12) to the three-dimensional source control point set FromPoints generated to resolve, obtain parameter j
0-j
5,
Fz
i=j
0+j
1Fx
i+j
2Fy
i+j
3Fx
i 2+j
4Fy
i 2+j
5Fx
iFy
i(12)
C) nonlinear transformation medial error accuracy is calculated
2, concrete steps are as follows: according to formula (12) and parameter j
0-j
5resolve the Fz at control point, each source
ivalue, is saved in three-dimensional source control point set FromPoints, calculates target control point set ToPoints={ (Tx according to formula (13) to three-dimensional source control point set FromPoints
i, Ty
i) | i=1,2 ... m*n},
Medial error accuracy is calculated according to formula (14)
2,
D) control point, source height value is regulated, if | nonlinear/accuracy
2-1| > 0.01, then regulate control point, each source coordinate height value according to formula (15), obtain new height value NFzi, substitute former height value and Fzi=NFzi by new height value, obtain three-dimensional source control point set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... m*n},
E) circulation step b)-d), until | nonlinear/accuracy
2-1| <=0.01, obtains final argument j
0-j
5;
Step 15, focal distance f, flying height H, drift angle
inclination angle ω, swing angle κ, data center point coordinates (x
mid, y
mid), parameter j
0-j
5composition key K ey, to be encrypted key K ey with rivest, shamir, adelman RSA and stored in key file Key.txt;
(2) DecryptDecryption process
Step 21, reads key file Key.txt, extracts key K ey, open original vector data V after deciphering;
Step 22, generates each point height value z
j, converted coordinate, concrete steps are as follows:
A) extract the key element point coordinates of vector data V, obtain key element point coordinates set P={ (x
j, y
j, z
j) | j=1,2 ..., k}, wherein k is the some number that key element comprises,
B) according to each point coordinates p in key K ey and formula (16) cycle calculations set P
j(x
j, y
j, z
j) height value z
jand be saved in set P,
z
j=j
0+j
1x
j+j
2y
j+j
3x
j 2+j
4y
j 2+j
5x
jy
j(16)
C) according to formula (17) and key K ey, to each point coordinates p
j(x
j, y
j, z
j) calculate, obtain point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k};
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p
j' (x
j', y
j', z
j) be normalized obtain point coordinates set P after DecryptDecryption "={ (x
j", y
j", z
j) | j=1,2 ..., k};
Step 24, circulation step 22 to 23, until each key element is disposed, preserves the data file W after DecryptDecryption;
(3) recovery process
Step 31, reads key file Key.txt, extracts key K ey, open the vector data W after DecryptDecryption after deciphering;
Step 32, Unitary coordinate, concrete steps are as follows:
A) extract the key element point coordinates of vector data W, obtain coordinate set P "={ (x
j", y
j", z
j) | j=1,2 ..., k},
B) according to key K ey and formula (19), to set P " set in each point coordinates p
j" (x
j", y
j", z
j) be normalized generation point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k;
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p
j' (x
j', y
j', z
j) calculate, then by height value z
jzero setting, the point coordinates p after being restored
j(x
j, y
j, 0), generate coordinate set P={ (x
j, y
j, 0) | j=1,2 ..., k};
Step 34, circulation step 32 to 33, until each key element is disposed, the data file Q after saving/restoring.
The present invention proposes a kind of nonlinear mixed model and DecryptDecryption and Recovery processing are carried out to GIS vector data.This method, for the safety protection problem of GIS vector data, is ensureing that, under the prerequisite that vector data topological relation does not change, can carry out DecryptDecryption to data according to key, the data after DecryptDecryption can carry out Distortionless according to key.This method has the features such as randomness, gradually changeable, invertibity, improves the reliability of GIS vector data DecryptDecryption, the perfect theory and means system of geography information safeguard protection, can be used for the aspect such as to publish of GIS vector data.
Accompanying drawing explanation
Fig. 1 is the inventive method DecryptDecryption process flow diagram.
Fig. 2 is the inventive method recovery process flow chart.
Fig. 3 is the original vector data that the embodiment of the present invention is selected.
Fig. 4 is the design sketch of vector data superposition after initial data of the present invention and DecryptDecryption.
Embodiment
Below in conjunction with accompanying drawing, embodiments of the invention are elaborated.
The present embodiment selects shp form vector data, reads, DecryptDecryption and recovery operation to data, further describes the present invention.The present embodiment selects the shp line chart layer data (as Fig. 3) of a certain building as original vector data, comprises the following steps:
(1) key generation process
Step 11, determine data area: the minimum enclosed rectangle R obtaining original vector data V, R lower left corner coordinate is (123451.63676768,142705.11870332), upper right corner coordinate is (123726.302067681,142994.494303319), data center point coordinate (123588.969417681,142849.80650332), data length XL=274.665300000459 and data width YL=289.375599998981 is obtained according to formula (1);
Step 12, determine data transformation amount: concrete steps are as follows: input DATA POPULATION converted quantity offset=50, nonlinear transformation amount nonlinear=7, obtains linear transformation amount linear=49.5075751779463 according to formula (2);
Step 13, calculates the medial error that linear transformation amount linear causes, determines the parameter affecting transform effect: focal distance f, flying height H, drift angle
inclination angle ω, swing angle κ, concrete steps are as follows:
E) focal distance f=0.15,
F) flying height H=1879.49681193348 is calculated according to formula (3),
C) the range of disturbance linearExtent=7.03616196359537 of linear change amount linear is calculated according to formula (4),
D) generate control point set, concrete steps are as follows: within the scope of minimum enclosed rectangle R, generate 4*4 equal control point composition control point, source set FromPoints={ (Fx
i, Fy
i) | i=1,2 ... 4*4}; Each target control point coordinates (Tx is calculated according to formula (5)
i, Ty
i) composition target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... 4*4},
E) Unitary coordinate, is normalized according to formula (6) obtains new coordinate set FromPoints '={ (Fx to control point, source set FromPoints and target control point set ToPoints
i', Fy
i') | i=1,2 ... 4*4}, ToPoints '={ (Tx
i', Ty
i') | i=1,2 ... 4*4},
F) drift angle is calculated
inclination angle ω, swing angle κ, utilize least square method to carry out matching to target control point in FromPoints ' Zhong Yuan control point and ToPoints ' according to formula (7) and resolve and obtain drift angle
ω=0.00921638185358357, inclination angle, swing angle κ=0.0206308078601073,
G) linear transformation medial error accuracy is calculated
1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate " and={ (Tx
i", Ty
i") | i=1,2 ... 4*4}, calculates medial error accuracy according to formula (9)
1=50.6202842886151,
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy
1-1| > 0.01, then regulate each former target control point coordinates (Tx according to formula (10)
i, Ty
i), obtain new target control point coordinates (NTx
i, NTy
i), substitute former target control point and Tx with new target control point
i=NTx
i, Ty
i=NTy
i, obtain target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... 4*4},
I) circulation step e)-h), work as accuracy
1when=49.5075776592392 | linear/accuracy
1-1| <=0.01, obtains final drift angle
ω=0.00901382354283439, inclination angle, swing angle κ=0.0201770830635741;
Step 14, calculates the medial error that nonlinear transformation amount nonlinear causes, determines parameter j
0-j
5, concrete steps are as follows:
A) generate control point elevation, utilize the elevation Fz needed for formula (11) calculating control point, source set FromPoints each some displacement nonlinear
i, generate three-dimensional source control point set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... 4*4},
B) carry out least square according to formula (12) to the three-dimensional source control point set FromPoints generated to resolve, obtain parameter j
0=-134576645.0625, j
1=957.075539588928, j
2=1056.14212036133, j
3=-0.00386110281764473, j
4=-0.00368852281107479, j
5=-1.88736757991137E-05,
C) nonlinear transformation medial error accuracy is calculated
2, concrete steps are as follows: according to formula (12) and parameter j
0-j
5resolve the Fz at control point, each source
ivalue, is saved in three-dimensional source control point set FromPoints, calculates target control point set ToPoints={ (Tx according to formula (13) to three-dimensional source control point set FromPoints
i, Ty
i) | i=1,2 ... 4*4}, calculates medial error accuracy according to formula (14)
2=8.33449148774509,
D) control point, source height value is regulated, if | nonlinear/accuracy
2-1| > 0.01, then regulate control point, each source coordinate height value according to formula (15), obtain new height value NFzi, substitute former height value and Fzi=NFzi by new height value, obtain three-dimensional source control point set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... 4*4},
E) circulation step b)-d), work as accuracy
2when=6.9961779687363 | nonlinear/accuracy
2-1| <=0.01, obtains final argument j
0=-92384371.34375, j
1=544.834728956223, j
2=822.104847669601, j
3=-0.00253963583136851, j
4=-0.00312865154306508, j
5=0.000580351679673186;
Step 15, focal distance f, flying height H, drift angle
inclination angle ω, swing angle κ, data center point coordinates (x
mid, y
mid), parameter j
0-j
5composition key K ey, to be encrypted key K ey with rivest, shamir, adelman RSA and stored in key file Key.txt;
(2) DecryptDecryption process
Step 21, reads key file Key.txt, extracts key K ey, open original vector data V after deciphering;
Step 22, generates each point height value z
j, converted coordinate, concrete steps are as follows:
A) extract the key element point coordinates of vector data V, obtain key element point coordinates set P={ (x
j, y
j, z
j) | j=1,2 ..., k}, wherein k is the some number that key element comprises, below with 1 p (123677.937667681,142928.252103319,0) in P for example is described,
B) according to each point coordinates p in key K ey and formula (16) cycle calculations set P
j(x
j, y
j, z
j) height value z
jand be saved in set P, the height value z=119.892017556354 of example points p,
C) according to formula (17) and key K ey, to each point coordinates p
j(x
j, y
j, z
j) calculate, obtain point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k}, example points p (123677.937667681,142928.252103319,119.892017556354) point coordinates after changing is p ' (0.00402027927973795,0.00517358718854751,119.892017556354);
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p
j' (x
j', y
j', z
j) be normalized obtain point coordinates set P after DecryptDecryption "={ (x
j", y
j", z
j) | j=1,2 ..., after k}, some p ' normalization, point coordinates is p " (123639.34343161,142914.631440834,119.892017556354);
Step 24, circulation step 22 to 23, until each key element is disposed, preserves the data file W after DecryptDecryption;
(3) recovery process
Step 31, reads key file Key.txt, extracts key K ey, open the vector data W after DecryptDecryption after deciphering;
Step 32, Unitary coordinate, concrete steps are as follows:
A) extract the key element point coordinates of vector data W, obtain coordinate set P "={ (x
j", y
j", z
j) | j=1,2 ..., k}, below with a P " in 1 p " (123639.34343161,142914.631440834,119.892017556354) be described for example,
B) according to key K ey and formula (19), to set P " set in each point coordinates p
j" (x
j", y
j", z
j) be normalized generation point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k}, to example points p " be normalized and obtain a p ' (0.00402027927973827,0.00517358718854753,119.892017556354);
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p
j' (x
j', y
j', z
j) calculate, then by height value z
jzero setting, the point coordinates p after being restored
j(x
j, y
j, 0), generate coordinate set P={ (x
j, y
j, 0) | j=1,2 ..., k}, change p ' coordinate be restored after point coordinates be p (123677.937667681,142928.252103319,0);
Step 34, circulation step 32 to 33, until each key element is disposed, the data file Q after saving/restoring.
Only carry out DecryptDecryption and the recovery of vector data in the embodiment of the present invention for line chart layer, the method also can be used for DecryptDecryption and the recovery of a layer and face layer.
The present invention is ensureing to carry out DecryptDecryption and recovery to vector data under the prerequisite that vector data topological relation does not change, and can setup parameter is to reach required DecryptDecryption effect according to demand, and the data after DecryptDecryption can carry out Distortionless according to key.
Claims (1)
1. the reversible DecryptDecryption method of GIS vector data, is characterized in that, comprise following process:
(1) key generation process
Step 11, determines data area: the minimum enclosed rectangle R obtaining original vector data V, R lower left corner coordinate is (x
min, y
min), upper right corner coordinate is (x
max, y
max), obtain data center point coordinate (x according to formula (1)
mid, y
mid), data length XL and data width YL;
Step 12, determine data transformation amount: concrete steps are as follows: input DATA POPULATION converted quantity offset, offset>0, nonlinear transformation amount nonlinear, 0<nonlinear<=offset, obtains linear transformation amount linear according to formula (2);
Step 13, calculates the medial error that linear transformation amount linear causes, determines the parameter affecting transform effect: focal distance f, flying height H, drift angle
inclination angle ω, swing angle κ, concrete steps are as follows:
131) focal distance f ∈ (0,1),
132) flying height H is calculated according to formula (3),
133) the range of disturbance linearExtent of linear transformation amount linear is calculated according to formula (4),
134) generate control point set, concrete steps are as follows: within the scope of minimum enclosed rectangle R, generate m*n equal control point composition control point, source set FromPoints={ (Fx
i, Fy
i) | i=1,2 ... m*n}, m*n>=6; Each target control point coordinates (Tx is calculated according to formula (5)
i, Ty
i) composition target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
Wherein: directioin parameter dir
1in [0.0,1.0] scope, directioin parameter
perturbation of control points parameter random
1and random
2random selecting in [-1.0,1.0] scope,
135) Unitary coordinate, is normalized according to formula (6) obtains new coordinate set FromPoints '={ (Fx to control point, source set FromPoints and target control point set ToPoints
i', Fy
i') | i=1,2 ... m*n}, ToPoints '={ (Tx
i', Ty
i') | i=1,2 ... m*n},
136) drift angle is calculated
inclination angle ω, swing angle κ, utilize least square method to carry out matching to target control point in FromPoints ' Zhong Yuan control point and ToPoints ' according to formula (7) and resolve and obtain drift angle
inclination angle ω, swing angle κ,
137) linear transformation medial error accuracy is calculated
1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate " and={ (Tx
i", Ty
i") | i=1,2 ... m*n},
Medial error accuracy is calculated according to formula (9)
1,
138) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy
1-1|>0.01, then regulate each former target control point coordinates (Tx according to formula (10)
i, Ty
i), obtain new target control point coordinates (NTx
i, NTy
i), substitute former target control point and Tx with new target control point
i=NTx
i, Ty
i=NTy
i, obtain new target control point set NTToPoints={ (NTx
i, NTy
i) | i=1,2 ... m*n},
139) circulation step 135)-138) until | linear/accuracy
1-1|<=0.01, obtains final drift angle
inclination angle ω, swing angle κ;
Step 14, calculates the medial error that nonlinear transformation amount nonlinear causes, determines parameter j
0, j
1, j
2, j
3, j
4and j
5, concrete steps are as follows:
141) generate control point elevation, utilize the elevation Mz needed for formula (11) calculating control point, source set FromPoints each some displacement nonlinear
i, generate three-dimensional source control point set MFromPoints={ (Mx
i, My
i, Mz
i) | i=1,2 ... m*n},
142) carry out least square according to formula (12) to the three-dimensional source control point set MFromPoints generated to resolve, obtain parameter j
0, j
1, j
2, j
3, j
4and j
5,
Mz
i’=j
0+j
1Mx
i+j
2My
i+j
3Mx
i 2+j
4My
i 2+j
5Mx
iMy
i(12)
143) nonlinear transformation medial error accuracy is calculated
2, concrete steps are as follows: according to formula (12) and parameter j
0, j
1, j
2, j
3, j
4and j
5resolve the Mz at control point, each source
i' value, be saved in three-dimensional source control point set MFromPoints, according to formula (13), target control point set NToPoints={ (Nx calculated to three-dimensional source control point set MFromPoints
i, Ny
i) | i=1,2 ... m*n},
Medial error accuracy is calculated according to formula (14)
2,
144) control point, source height value is regulated, if | nonlinear/accuracy
2-1|>0.01, then regulate control point, each source coordinate height value according to formula (15), obtain new height value NMz
i, substitute former height value and Mz by new height value
i=NMz
i, obtain three-dimensional source control point set MFromPoints={ (Mx
i, My
i, Mz
i) | i=1,2 ... m*n},
145) circulation step 142)-144), until | nonlinear/accuracy
2-1|<=0.01, obtains final argument j
0', j
1', j
2', j
3', j
4' and j
5';
Step 15, focal distance f, flying height H, drift angle
inclination angle ω, swing angle κ, data center point coordinates (x
mid, y
mid), parameter j
0', j
1', j
2', j
3', j
4' and j
5' composition key K ey, with rivest, shamir, adelman RSA key K ey to be encrypted and stored in key file Key.txt;
(2) DecryptDecryption process
Step 21, reads key file Key.txt, extracts key K ey, open original vector data V after deciphering;
Step 22, generates each point height value z
j, converted coordinate, concrete steps are as follows:
221) extract the key element point coordinates of vector data V, obtain key element point coordinates set P={ (x
j, y
j, z
j) | j=1,2 ..., k}, wherein k is the some number that key element comprises,
222) according to each point coordinates p in key K ey and formula (16) cycle calculations set P
j(x
j, y
j, z
j) height value z
jand be saved in set P,
z
j=j
0’+j
1’x
j+j
2’y
j+j
3’x
j 2+j
4’y
j 2+j
5’x
jy
j(16)
223) according to formula (17) and key K ey, to each point coordinates p
j(x
j, y
j, z
j) calculate, obtain point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k};
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p
j' (x
j', y
j', z
j) be normalized obtain point coordinates set P after DecryptDecryption "={ (x
j", y
j", z
j) | j=1,2 ..., k};
Step 24, circulation step 22 to 23, until each key element is disposed, preserves the vector data W after DecryptDecryption;
(3) recovery process
Step 31, reads key file Key.txt, extracts key K ey, open the vector data W after DecryptDecryption after deciphering;
Step 32, Unitary coordinate, concrete steps are as follows:
321) extract the key element point coordinates of vector data W, obtain coordinate set WP "={ (wx
j", wy
j", wz
j) | j=1,2 ..., k},
322) according to key K ey and formula (19), to set WP " set in each point coordinates wp
j" (wx
j", wy
j", wz
j) be normalized generation point coordinates set WP '={ (wx
j', wy
j', wz
j) | j=1,2 ..., k}};
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates wp
j' (wx
j', wy
j', wz
j) calculate, then by height value wz
jzero setting, the point coordinates wp after being restored
j(wx
j, wy
j, 0), generate coordinate set WP={ (wx
j, wy
j, 0) | j=1,2 ..., k};
Step 34, circulation step 32 to 33, until each key element is disposed, the vector data Q after saving/restoring.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210586283.3A CN103067159B (en) | 2012-12-28 | 2012-12-28 | A kind of reversible DecryptDecryption method of GIS vector data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210586283.3A CN103067159B (en) | 2012-12-28 | 2012-12-28 | A kind of reversible DecryptDecryption method of GIS vector data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103067159A CN103067159A (en) | 2013-04-24 |
CN103067159B true CN103067159B (en) | 2016-03-02 |
Family
ID=48109630
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210586283.3A Expired - Fee Related CN103067159B (en) | 2012-12-28 | 2012-12-28 | A kind of reversible DecryptDecryption method of GIS vector data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103067159B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103559452B (en) * | 2013-10-30 | 2016-03-30 | 南京师范大学 | A kind of altitude data decryption and restoration methods |
CN104077535B (en) * | 2014-06-19 | 2017-01-25 | 南京师范大学 | Graphic information system (GIS) vector data local decryption and restoring method |
CN104103031B (en) * | 2014-08-03 | 2017-07-25 | 兰州交通大学 | Based on normalized Vector spatial data blind watermark method |
CN106778347B (en) * | 2016-12-22 | 2019-08-20 | 南京师范大学 | A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function |
CN108090369B (en) * | 2017-12-29 | 2021-06-08 | 南京师范大学 | Chebyshev polynomial-based GIS vector data decryption and recovery method |
CN108629190B (en) * | 2018-03-23 | 2020-08-25 | 国网陕西省电力公司电力科学研究院 | Geographic information data decryption method |
CN109002724B (en) * | 2018-06-07 | 2021-03-23 | 南京师范大学 | DEM local decryption and recovery method based on tight support radial basis function |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6574561B2 (en) * | 2001-03-30 | 2003-06-03 | The University Of North Florida | Emergency management system |
CN101968841A (en) * | 2010-11-09 | 2011-02-09 | 北京安天电子设备有限公司 | Anti-virus and decryption method and device for USB mobile storage apparatus |
CN102332079A (en) * | 2011-09-16 | 2012-01-25 | 南京师范大学 | GIS (geographic information system) vector data disguising and restoring method based on error random interference |
-
2012
- 2012-12-28 CN CN201210586283.3A patent/CN103067159B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6574561B2 (en) * | 2001-03-30 | 2003-06-03 | The University Of North Florida | Emergency management system |
CN101968841A (en) * | 2010-11-09 | 2011-02-09 | 北京安天电子设备有限公司 | Anti-virus and decryption method and device for USB mobile storage apparatus |
CN102332079A (en) * | 2011-09-16 | 2012-01-25 | 南京师范大学 | GIS (geographic information system) vector data disguising and restoring method based on error random interference |
Non-Patent Citations (1)
Title |
---|
公众版地图地理要素脱密处理方法;傅宏;《地理空间信息》;20100831;第8卷(第4期);133-134 * |
Also Published As
Publication number | Publication date |
---|---|
CN103067159A (en) | 2013-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103067159B (en) | A kind of reversible DecryptDecryption method of GIS vector data | |
CN103093414B (en) | A kind of DOM raster data DecryptDecryption and restoration methods | |
Coser et al. | On Rényi entropies of disjoint intervals in conformal field theory | |
Griffiths et al. | Three-dimensional topology of turbulent premixed flame interaction | |
Bediz | A spectral-Tchebychev solution technique for determining vibrational behavior of thick plates having arbitrary geometry | |
Nair et al. | Computational aspects of a scalable high-order discontinuous Galerkin atmospheric dynamical core | |
CN104077536A (en) | Radial basis function based GIS (Geographic Information System) vector data reversible decryption method | |
CN106778347A (en) | A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function | |
CN103729564B (en) | A kind of pressure field computational methods based on Particle Image Velocimetry and device | |
Li et al. | A simple method for finding topological horseshoes | |
Izem et al. | A discontinuous Galerkin method for two-layer shallow water equations | |
Leonov et al. | Hidden oscillations in dynamical systems. 16 Hilbert’s problem, Aizerman’s and Kalman’s conjectures, hidden attractors in Chua’s circuits | |
CN104123411A (en) | Automobile powertrain system rotational inertia synthetic method | |
Kneer et al. | Symmetry-aware autoencoders: s-PCA and s-nlPCA | |
Forrester et al. | Hydrodynamical spectral evolution for random matrices | |
Bause et al. | First-order convergence of multi-point flux approximation on triangular grids and comparison with mixed finite element methods | |
KR101756858B1 (en) | Secure Trajectory Query Processing with Surrogate Vector Model | |
CN104077535B (en) | Graphic information system (GIS) vector data local decryption and restoring method | |
Luo et al. | A quasi-conservative discontinuous Galerkin method for multi-component flows using the non-oscillatory kinetic flux II: ALE framework | |
Leonov et al. | IWCFTA2012 Keynote speech I-Hidden attractors in dynamical systems: From hidden oscillation in Hilbert-Kolmogorov, Aizerman and Kalman problems to hidden chaotic attractor in Chua circuits | |
Luo et al. | A comparative study of different reconstruction schemes for a reconstructed discontinuous Galerkin method on arbitrary grids | |
Deng et al. | Estimating ultimate bound and finding topological horseshoe for a new chaotic system | |
Velichová | Minkowski set operators | |
CN104937640B (en) | Define the data processing method of element in d dimension spaces E | |
Leidinger et al. | Explicit isogeometric b-rep analysis on trimmed nurbs-based multi-patch cad models in ls-dyna |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160302 Termination date: 20181228 |
|
CF01 | Termination of patent right due to non-payment of annual fee |