CN103067159B - A kind of reversible DecryptDecryption method of GIS vector data - Google Patents

A kind of reversible DecryptDecryption method of GIS vector data Download PDF

Info

Publication number
CN103067159B
CN103067159B CN201210586283.3A CN201210586283A CN103067159B CN 103067159 B CN103067159 B CN 103067159B CN 201210586283 A CN201210586283 A CN 201210586283A CN 103067159 B CN103067159 B CN 103067159B
Authority
CN
China
Prior art keywords
prime
control point
key
formula
accuracy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210586283.3A
Other languages
Chinese (zh)
Other versions
CN103067159A (en
Inventor
周卫
闫娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201210586283.3A priority Critical patent/CN103067159B/en
Publication of CN103067159A publication Critical patent/CN103067159A/en
Application granted granted Critical
Publication of CN103067159B publication Critical patent/CN103067159B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Processing Or Creating Images (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a kind of reversible DecryptDecryption method of GIS vector data, belong to field of geographic information safety.The method comprises following process: (1) key generation process, comprises and determines data area, determines data transformation amount, calculate medial error that linear transformation amount causes and determine parameter, calculate medial error that nonlinear transformation amount causes and determine parameter, to be encrypted key K ey with rivest, shamir, adelman RSA and stored in key file; (2) DecryptDecryption process, comprises reading key file, deciphers and extracts key; Open original vector data; Obtain the set of key element point coordinates; Unitary coordinate; Circular treatment; (3) recovery process.Method of the present invention has the features such as randomness, gradually changeable, invertibity, improves the reliability of GIS vector data DecryptDecryption, the perfect theory and means system of geography information safeguard protection, can be used for the aspect such as to publish of GIS vector data.

Description

A kind of reversible DecryptDecryption method of GIS vector data
Technical field
The invention belongs to field of geographic information safety, be specifically related to a kind of reversible DecryptDecryption method for GIS vector data.
Background technology
Survey and draw geography information concerning expansion development space, concerning national security.Especially, under the main trend of global IT application, geography information safety protection problem is more and more outstanding.Vector data has the features such as precision is high, output quality good, data volume is little, and application is very extensive, and its safeguard protection research is very important.
According to national relevant laws and regulations, vector data openly uses to be needed through DecryptDecryption process, and DecryptDecryption comprises spatial accuracy DecryptDecryption and attribute DecryptDecryption two aspects.Spatial accuracy DecryptDecryption uses professional DecryptDecryption technology to carry out the displacement of key element, reduce its precision, and the data after DecryptDecryption is not easily recovered when not having key.Spatial accuracy DecryptDecryption method conventional at present comprises projection transform method, spatial alternation method, random error interference method etc.Projection transform method is reversible; Data space converter technique comprises similarity transformation, affine transformation and projective transformation etc., and this several transform method is linear transformation, is easy to recover, the poor reliability of DecryptDecryption process; There is the topological relation that can not ensure key element or the shortcoming such as algorithm is irreversible in meeting that random error interference method has.
Summary of the invention
The present invention is directed to the defect that existing DecryptDecryption method exists, provide a kind of nonlinear mixed model to carry out the method for DecryptDecryption process to vector data, there is the randomness of error, the Topological of element relationship, the invertibity of algorithm and be difficult to features such as cracking.
A kind of reversible DecryptDecryption method of GIS vector data, for line chart layer, comprises following process:
(1) key generation process
Step 11, determines data area: the minimum enclosed rectangle R obtaining original vector data V, R lower left corner coordinate is (x min, y min), upper right corner coordinate is (x max, y max), obtain data center point coordinate (x according to formula (1) mid, y mid), data length XL and data width YL;
x mid = ( x min + x max ) / 2 y mid = ( y min + y max ) / 2 XL = x max - x min YL = y max - y min - - - ( 1 )
Step 12, determine data transformation amount: concrete steps are as follows: input DATA POPULATION converted quantity offset, offset > 0, nonlinear transformation amount nonlinear, 0 < nonlinear <=offset, obtains linear transformation amount linear according to formula (2);
linear = offset 2 - nonlinear 2 - - - ( 2 )
Step 13, calculates the medial error that linear transformation amount linear causes, determines the parameter affecting transform effect: focal distance f, flying height H, drift angle inclination angle ω, swing angle κ, concrete steps are as follows:
C) focal distance f ∈ (0,1),
D) flying height H is calculated according to formula (3),
H = XL * YL / f - - - ( 3 )
C) the range of disturbance linearExtent of linear change amount linear is calculated according to formula (4),
linearExtent = linear - - - ( 4 )
D) generate control point set, concrete steps are as follows: within the scope of minimum enclosed rectangle R, generate m*n (m*n >=6) individual equal control point composition control point, source set FromPoints={ (Fx i, Fy i) | i=1,2 ... m*n}; Each target control point coordinates (Tx is calculated according to formula (5) i, Ty i) composition target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
Tx i = Fx i + dir 1 &times; linear + random 1 &times; linearExtent Ty i = Fy i + dir 2 &times; linear + random 2 &times; linearExtent - - - ( 5 )
Wherein: directioin parameter dir 1in [0.0,1.0] scope, directioin parameter perturbation of control points parameter random 1and random 2random selecting in [-1.0,1.0] scope,
E) Unitary coordinate, is normalized according to formula (6) obtains new coordinate set FromPoints '={ (Fx to control point, source set FromPoints and target control point set ToPoints i', Fy i') | i=1,2 ... m*n}, ToPoints '={ (Tx i', Ty i') | i=1,2 ... m*n},
Fx i &prime; = ( Fx i - x mid ) * f / H Fy i &prime; = ( Fy i - y mid ) * f / H Tx i &prime; = ( Tx i - x mid ) * f / H Ty i &prime; = ( Ty i - y mid ) * f / H - - - ( 6 )
F) drift angle is calculated inclination angle ω, swing angle κ, utilize least square method to carry out matching to target control point in FromPoints ' Zhong Yuan control point and ToPoints ' according to formula (7) and resolve and obtain drift angle inclination angle ω, swing angle κ,
G) linear transformation medial error accuracy is calculated 1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate " and={ (Tx i", Ty i") | i=1,2 ... m*n},
Medial error accuracy1 is calculated according to formula (9),
accuracy 1 = &Sigma; ( ( Tx i &prime; &prime; - Fx i ) 2 + ( Ty i &prime; &prime; - Fy i ) 2 ) / ( m * n ) - - - ( 9 )
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy 1-1| > 0.01, then regulate each former target control point coordinates (Tx according to formula (10) i, Ty i), obtain new target control point coordinates (NTx i, NTy i), substitute former target control point and Tx with new target control point i=NTx i, Ty i=NTy i, obtain target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
NTx i = Fx i + ( linear / accuracy ) ( Tx i - Fx i ) NTy i = Fy i + ( linear / accuracy ) ( Ty i - Fy i ) - - - ( 10 )
I) circulation step e)-h) until | linear/accuracy 1-1| <=0.01, obtains final drift angle inclination angle ω, swing angle κ;
Step 14, calculates the medial error that nonlinear transformation amount nonlinear causes, determines parameter j 0-j 5, concrete steps are as follows:
B) generate control point elevation, utilize the elevation Fz needed for formula (11) calculating control point, source set FromPoints each some displacement nonlinear i, generate three-dimensional source control point set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... m*n},
Fz i = H * nonlinear / ( x mid - Fx i ) 2 + ( y mid - Fy i ) 2 - - - ( 11 )
B) carry out least square according to formula (12) to the three-dimensional source control point set FromPoints generated to resolve, obtain parameter j 0-j 5,
Fz i=j 0+j 1Fx i+j 2Fy i+j 3Fx i 2+j 4Fy i 2+j 5Fx iFy i(12)
C) nonlinear transformation medial error accuracy is calculated 2, concrete steps are as follows: according to formula (12) and parameter j 0-j 5resolve the Fz at control point, each source ivalue, is saved in three-dimensional source control point set FromPoints, calculates target control point set ToPoints={ (Tx according to formula (13) to three-dimensional source control point set FromPoints i, Ty i) | i=1,2 ... m*n},
Tx i = ( - f ( Fx i - x mid ) / ( Fz i - H ) ) * H / f + x mid Ty i = ( - f ( Fy i - y mid ) / ( Fz i - H ) ) * H / f + y mid - - - ( 13 )
Medial error accuracy is calculated according to formula (14) 2,
accuracy 2 = &Sigma; ( ( Tx i - Fx i ) 2 + ( Ty i - Fy i ) 2 ) / ( m * n ) - - - ( 14 )
D) control point, source height value is regulated, if | nonlinear/accuracy 2-1| > 0.01, then regulate control point, each source coordinate height value according to formula (15), obtain new height value NFzi, substitute former height value and Fzi=NFzi by new height value, obtain three-dimensional source control point set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... m*n},
NFz i &Element; ( Fz i / 2 , ( nonlinear / accuracy 2 ) * Fz i ) if ( nonlinear / accuracy 2 > 1 ) NFz i &Element; ( ( nonlinear / accuracy 2 ) * Fz i / 2 , Fz i ) if ( nonlinear / accuracy 2 < 1 ) - - - ( 15 )
E) circulation step b)-d), until | nonlinear/accuracy 2-1| <=0.01, obtains final argument j 0-j 5;
Step 15, focal distance f, flying height H, drift angle inclination angle ω, swing angle κ, data center point coordinates (x mid, y mid), parameter j 0-j 5composition key K ey, to be encrypted key K ey with rivest, shamir, adelman RSA and stored in key file Key.txt;
(2) DecryptDecryption process
Step 21, reads key file Key.txt, extracts key K ey, open original vector data V after deciphering;
Step 22, generates each point height value z j, converted coordinate, concrete steps are as follows:
A) extract the key element point coordinates of vector data V, obtain key element point coordinates set P={ (x j, y j, z j) | j=1,2 ..., k}, wherein k is the some number that key element comprises,
B) according to each point coordinates p in key K ey and formula (16) cycle calculations set P j(x j, y j, z j) height value z jand be saved in set P,
z j=j 0+j 1x j+j 2y j+j 3x j 2+j 4y j 2+j 5x jy j(16)
C) according to formula (17) and key K ey, to each point coordinates p j(x j, y j, z j) calculate, obtain point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k};
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p j' (x j', y j', z j) be normalized obtain point coordinates set P after DecryptDecryption "={ (x j", y j", z j) | j=1,2 ..., k};
x j &prime; &prime; = x mid + x j &prime; * H / f y j &prime; &prime; = y mid + y j &prime; * H / f - - - ( 18 )
Step 24, circulation step 22 to 23, until each key element is disposed, preserves the data file W after DecryptDecryption;
(3) recovery process
Step 31, reads key file Key.txt, extracts key K ey, open the vector data W after DecryptDecryption after deciphering;
Step 32, Unitary coordinate, concrete steps are as follows:
A) extract the key element point coordinates of vector data W, obtain coordinate set P "={ (x j", y j", z j) | j=1,2 ..., k},
B) according to key K ey and formula (19), to set P " set in each point coordinates p j" (x j", y j", z j) be normalized generation point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k;
x j &prime; = ( x j &prime; &prime; - x mid ) * f / H y j &prime; = ( y j &prime; &prime; - y mid ) * f / H - - - ( 19 )
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p j' (x j', y j', z j) calculate, then by height value z jzero setting, the point coordinates p after being restored j(x j, y j, 0), generate coordinate set P={ (x j, y j, 0) | j=1,2 ..., k};
Step 34, circulation step 32 to 33, until each key element is disposed, the data file Q after saving/restoring.
The present invention proposes a kind of nonlinear mixed model and DecryptDecryption and Recovery processing are carried out to GIS vector data.This method, for the safety protection problem of GIS vector data, is ensureing that, under the prerequisite that vector data topological relation does not change, can carry out DecryptDecryption to data according to key, the data after DecryptDecryption can carry out Distortionless according to key.This method has the features such as randomness, gradually changeable, invertibity, improves the reliability of GIS vector data DecryptDecryption, the perfect theory and means system of geography information safeguard protection, can be used for the aspect such as to publish of GIS vector data.
Accompanying drawing explanation
Fig. 1 is the inventive method DecryptDecryption process flow diagram.
Fig. 2 is the inventive method recovery process flow chart.
Fig. 3 is the original vector data that the embodiment of the present invention is selected.
Fig. 4 is the design sketch of vector data superposition after initial data of the present invention and DecryptDecryption.
Embodiment
Below in conjunction with accompanying drawing, embodiments of the invention are elaborated.
The present embodiment selects shp form vector data, reads, DecryptDecryption and recovery operation to data, further describes the present invention.The present embodiment selects the shp line chart layer data (as Fig. 3) of a certain building as original vector data, comprises the following steps:
(1) key generation process
Step 11, determine data area: the minimum enclosed rectangle R obtaining original vector data V, R lower left corner coordinate is (123451.63676768,142705.11870332), upper right corner coordinate is (123726.302067681,142994.494303319), data center point coordinate (123588.969417681,142849.80650332), data length XL=274.665300000459 and data width YL=289.375599998981 is obtained according to formula (1);
Step 12, determine data transformation amount: concrete steps are as follows: input DATA POPULATION converted quantity offset=50, nonlinear transformation amount nonlinear=7, obtains linear transformation amount linear=49.5075751779463 according to formula (2);
Step 13, calculates the medial error that linear transformation amount linear causes, determines the parameter affecting transform effect: focal distance f, flying height H, drift angle inclination angle ω, swing angle κ, concrete steps are as follows:
E) focal distance f=0.15,
F) flying height H=1879.49681193348 is calculated according to formula (3),
C) the range of disturbance linearExtent=7.03616196359537 of linear change amount linear is calculated according to formula (4),
D) generate control point set, concrete steps are as follows: within the scope of minimum enclosed rectangle R, generate 4*4 equal control point composition control point, source set FromPoints={ (Fx i, Fy i) | i=1,2 ... 4*4}; Each target control point coordinates (Tx is calculated according to formula (5) i, Ty i) composition target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... 4*4},
E) Unitary coordinate, is normalized according to formula (6) obtains new coordinate set FromPoints '={ (Fx to control point, source set FromPoints and target control point set ToPoints i', Fy i') | i=1,2 ... 4*4}, ToPoints '={ (Tx i', Ty i') | i=1,2 ... 4*4},
F) drift angle is calculated inclination angle ω, swing angle κ, utilize least square method to carry out matching to target control point in FromPoints ' Zhong Yuan control point and ToPoints ' according to formula (7) and resolve and obtain drift angle ω=0.00921638185358357, inclination angle, swing angle κ=0.0206308078601073,
G) linear transformation medial error accuracy is calculated 1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate " and={ (Tx i", Ty i") | i=1,2 ... 4*4}, calculates medial error accuracy according to formula (9) 1=50.6202842886151,
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy 1-1| > 0.01, then regulate each former target control point coordinates (Tx according to formula (10) i, Ty i), obtain new target control point coordinates (NTx i, NTy i), substitute former target control point and Tx with new target control point i=NTx i, Ty i=NTy i, obtain target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... 4*4},
I) circulation step e)-h), work as accuracy 1when=49.5075776592392 | linear/accuracy 1-1| <=0.01, obtains final drift angle ω=0.00901382354283439, inclination angle, swing angle κ=0.0201770830635741;
Step 14, calculates the medial error that nonlinear transformation amount nonlinear causes, determines parameter j 0-j 5, concrete steps are as follows:
A) generate control point elevation, utilize the elevation Fz needed for formula (11) calculating control point, source set FromPoints each some displacement nonlinear i, generate three-dimensional source control point set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... 4*4},
B) carry out least square according to formula (12) to the three-dimensional source control point set FromPoints generated to resolve, obtain parameter j 0=-134576645.0625, j 1=957.075539588928, j 2=1056.14212036133, j 3=-0.00386110281764473, j 4=-0.00368852281107479, j 5=-1.88736757991137E-05,
C) nonlinear transformation medial error accuracy is calculated 2, concrete steps are as follows: according to formula (12) and parameter j 0-j 5resolve the Fz at control point, each source ivalue, is saved in three-dimensional source control point set FromPoints, calculates target control point set ToPoints={ (Tx according to formula (13) to three-dimensional source control point set FromPoints i, Ty i) | i=1,2 ... 4*4}, calculates medial error accuracy according to formula (14) 2=8.33449148774509,
D) control point, source height value is regulated, if | nonlinear/accuracy 2-1| > 0.01, then regulate control point, each source coordinate height value according to formula (15), obtain new height value NFzi, substitute former height value and Fzi=NFzi by new height value, obtain three-dimensional source control point set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... 4*4},
E) circulation step b)-d), work as accuracy 2when=6.9961779687363 | nonlinear/accuracy 2-1| <=0.01, obtains final argument j 0=-92384371.34375, j 1=544.834728956223, j 2=822.104847669601, j 3=-0.00253963583136851, j 4=-0.00312865154306508, j 5=0.000580351679673186;
Step 15, focal distance f, flying height H, drift angle inclination angle ω, swing angle κ, data center point coordinates (x mid, y mid), parameter j 0-j 5composition key K ey, to be encrypted key K ey with rivest, shamir, adelman RSA and stored in key file Key.txt;
(2) DecryptDecryption process
Step 21, reads key file Key.txt, extracts key K ey, open original vector data V after deciphering;
Step 22, generates each point height value z j, converted coordinate, concrete steps are as follows:
A) extract the key element point coordinates of vector data V, obtain key element point coordinates set P={ (x j, y j, z j) | j=1,2 ..., k}, wherein k is the some number that key element comprises, below with 1 p (123677.937667681,142928.252103319,0) in P for example is described,
B) according to each point coordinates p in key K ey and formula (16) cycle calculations set P j(x j, y j, z j) height value z jand be saved in set P, the height value z=119.892017556354 of example points p,
C) according to formula (17) and key K ey, to each point coordinates p j(x j, y j, z j) calculate, obtain point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k}, example points p (123677.937667681,142928.252103319,119.892017556354) point coordinates after changing is p ' (0.00402027927973795,0.00517358718854751,119.892017556354);
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p j' (x j', y j', z j) be normalized obtain point coordinates set P after DecryptDecryption "={ (x j", y j", z j) | j=1,2 ..., after k}, some p ' normalization, point coordinates is p " (123639.34343161,142914.631440834,119.892017556354);
Step 24, circulation step 22 to 23, until each key element is disposed, preserves the data file W after DecryptDecryption;
(3) recovery process
Step 31, reads key file Key.txt, extracts key K ey, open the vector data W after DecryptDecryption after deciphering;
Step 32, Unitary coordinate, concrete steps are as follows:
A) extract the key element point coordinates of vector data W, obtain coordinate set P "={ (x j", y j", z j) | j=1,2 ..., k}, below with a P " in 1 p " (123639.34343161,142914.631440834,119.892017556354) be described for example,
B) according to key K ey and formula (19), to set P " set in each point coordinates p j" (x j", y j", z j) be normalized generation point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k}, to example points p " be normalized and obtain a p ' (0.00402027927973827,0.00517358718854753,119.892017556354);
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p j' (x j', y j', z j) calculate, then by height value z jzero setting, the point coordinates p after being restored j(x j, y j, 0), generate coordinate set P={ (x j, y j, 0) | j=1,2 ..., k}, change p ' coordinate be restored after point coordinates be p (123677.937667681,142928.252103319,0);
Step 34, circulation step 32 to 33, until each key element is disposed, the data file Q after saving/restoring.
Only carry out DecryptDecryption and the recovery of vector data in the embodiment of the present invention for line chart layer, the method also can be used for DecryptDecryption and the recovery of a layer and face layer.
The present invention is ensureing to carry out DecryptDecryption and recovery to vector data under the prerequisite that vector data topological relation does not change, and can setup parameter is to reach required DecryptDecryption effect according to demand, and the data after DecryptDecryption can carry out Distortionless according to key.

Claims (1)

1. the reversible DecryptDecryption method of GIS vector data, is characterized in that, comprise following process:
(1) key generation process
Step 11, determines data area: the minimum enclosed rectangle R obtaining original vector data V, R lower left corner coordinate is (x min, y min), upper right corner coordinate is (x max, y max), obtain data center point coordinate (x according to formula (1) mid, y mid), data length XL and data width YL;
x m i d = ( x m i n + x m a x ) / 2 y m i d = ( y m i n + y m a x ) / 2 X L = x max - x m i n Y L = y max - y m i n - - - ( 1 )
Step 12, determine data transformation amount: concrete steps are as follows: input DATA POPULATION converted quantity offset, offset>0, nonlinear transformation amount nonlinear, 0<nonlinear<=offset, obtains linear transformation amount linear according to formula (2);
l i n e a r = offset 2 - nonlinear 2 - - - ( 2 )
Step 13, calculates the medial error that linear transformation amount linear causes, determines the parameter affecting transform effect: focal distance f, flying height H, drift angle inclination angle ω, swing angle κ, concrete steps are as follows:
131) focal distance f ∈ (0,1),
132) flying height H is calculated according to formula (3),
H = X L * Y L / f - - - ( 3 )
133) the range of disturbance linearExtent of linear transformation amount linear is calculated according to formula (4),
l i n e a r E x t e n t = l i n e a r - - - ( 4 )
134) generate control point set, concrete steps are as follows: within the scope of minimum enclosed rectangle R, generate m*n equal control point composition control point, source set FromPoints={ (Fx i, Fy i) | i=1,2 ... m*n}, m*n>=6; Each target control point coordinates (Tx is calculated according to formula (5) i, Ty i) composition target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
Tx i = Fx i + dir 1 &times; l i n e a r + random 1 &times; l i n e a r E x t e n t Ty i = Fy i + dir 2 &times; l i n e a r + random 2 &times; l i n e a r E x t e n t - - - ( 5 )
Wherein: directioin parameter dir 1in [0.0,1.0] scope, directioin parameter perturbation of control points parameter random 1and random 2random selecting in [-1.0,1.0] scope,
135) Unitary coordinate, is normalized according to formula (6) obtains new coordinate set FromPoints '={ (Fx to control point, source set FromPoints and target control point set ToPoints i', Fy i') | i=1,2 ... m*n}, ToPoints '={ (Tx i', Ty i') | i=1,2 ... m*n},
Fx i &prime; = ( Fx i - x m i d ) * f / H Fy i &prime; = ( Fy i - y m i d ) * f / H Tx i &prime; = ( Tx i - x m i d ) * f / H Ty i &prime; = ( Ty i - y m i d ) * f / H - - - ( 6 )
136) drift angle is calculated inclination angle ω, swing angle κ, utilize least square method to carry out matching to target control point in FromPoints ' Zhong Yuan control point and ToPoints ' according to formula (7) and resolve and obtain drift angle inclination angle ω, swing angle κ,
137) linear transformation medial error accuracy is calculated 1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate " and={ (Tx i", Ty i") | i=1,2 ... m*n},
Medial error accuracy is calculated according to formula (9) 1,
accuracy 1 = &Sigma; ( ( Tx i &prime; &prime; - Fx i ) 2 + ( Ty i &prime; &prime; - Fy i ) 2 ) / ( m * n ) - - - ( 9 )
138) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy 1-1|>0.01, then regulate each former target control point coordinates (Tx according to formula (10) i, Ty i), obtain new target control point coordinates (NTx i, NTy i), substitute former target control point and Tx with new target control point i=NTx i, Ty i=NTy i, obtain new target control point set NTToPoints={ (NTx i, NTy i) | i=1,2 ... m*n},
NTx i = Fx i + ( l i n e a r / accuracy 1 ) ( Tx i - Fx i ) NTy i = Fy i + ( l i n e a r / accuracy 1 ) ( Ty i - Fy i ) - - - ( 10 )
139) circulation step 135)-138) until | linear/accuracy 1-1|<=0.01, obtains final drift angle inclination angle ω, swing angle κ;
Step 14, calculates the medial error that nonlinear transformation amount nonlinear causes, determines parameter j 0, j 1, j 2, j 3, j 4and j 5, concrete steps are as follows:
141) generate control point elevation, utilize the elevation Mz needed for formula (11) calculating control point, source set FromPoints each some displacement nonlinear i, generate three-dimensional source control point set MFromPoints={ (Mx i, My i, Mz i) | i=1,2 ... m*n},
Mz i = H * n o n l i n e a r / ( x m i d - Mx i ) 2 + ( y m i d - My i ) 2 - - - ( 11 )
142) carry out least square according to formula (12) to the three-dimensional source control point set MFromPoints generated to resolve, obtain parameter j 0, j 1, j 2, j 3, j 4and j 5,
Mz i’=j 0+j 1Mx i+j 2My i+j 3Mx i 2+j 4My i 2+j 5Mx iMy i(12)
143) nonlinear transformation medial error accuracy is calculated 2, concrete steps are as follows: according to formula (12) and parameter j 0, j 1, j 2, j 3, j 4and j 5resolve the Mz at control point, each source i' value, be saved in three-dimensional source control point set MFromPoints, according to formula (13), target control point set NToPoints={ (Nx calculated to three-dimensional source control point set MFromPoints i, Ny i) | i=1,2 ... m*n},
Nx i = ( - f ( Mx i - x mi d ) / ( Mz i &prime; - H ) ) * H / f + x m i d Ny i = ( - f ( My i - y m i d ) / ( Mz i &prime; - H ) ) * H / f + y m i d - - - ( 13 )
Medial error accuracy is calculated according to formula (14) 2,
accuracy 2 = &Sigma; ( ( Nx i - Mx i ) 2 + ( Ty i - My i ) 2 ) / ( m * n ) - - - ( 14 )
144) control point, source height value is regulated, if | nonlinear/accuracy 2-1|>0.01, then regulate control point, each source coordinate height value according to formula (15), obtain new height value NMz i, substitute former height value and Mz by new height value i=NMz i, obtain three-dimensional source control point set MFromPoints={ (Mx i, My i, Mz i) | i=1,2 ... m*n},
NMz i &Element; ( Mz i &prime; / 2 , ( n o n l i n e a r / accuracy 2 ) * Mz i &prime; ) i f ( n o n l i n e a r / accuracy 2 > 1 ) NMz i &Element; ( ( n o n l i n e a r / accuracy 2 ) * Mz i &prime; / 2 , Mz i &prime; ) i f ( n o n l i n e a r / accuracy 2 < 1 ) - - - ( 15 )
145) circulation step 142)-144), until | nonlinear/accuracy 2-1|<=0.01, obtains final argument j 0', j 1', j 2', j 3', j 4' and j 5';
Step 15, focal distance f, flying height H, drift angle inclination angle ω, swing angle κ, data center point coordinates (x mid, y mid), parameter j 0', j 1', j 2', j 3', j 4' and j 5' composition key K ey, with rivest, shamir, adelman RSA key K ey to be encrypted and stored in key file Key.txt;
(2) DecryptDecryption process
Step 21, reads key file Key.txt, extracts key K ey, open original vector data V after deciphering;
Step 22, generates each point height value z j, converted coordinate, concrete steps are as follows:
221) extract the key element point coordinates of vector data V, obtain key element point coordinates set P={ (x j, y j, z j) | j=1,2 ..., k}, wherein k is the some number that key element comprises,
222) according to each point coordinates p in key K ey and formula (16) cycle calculations set P j(x j, y j, z j) height value z jand be saved in set P,
z j=j 0’+j 1’x j+j 2’y j+j 3’x j 2+j 4’y j 2+j 5’x jy j(16)
223) according to formula (17) and key K ey, to each point coordinates p j(x j, y j, z j) calculate, obtain point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k};
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p j' (x j', y j', z j) be normalized obtain point coordinates set P after DecryptDecryption "={ (x j", y j", z j) | j=1,2 ..., k};
x j &prime; &prime; = x m i d + x j &prime; * H / f y j &prime; &prime; = y m i d + y j &prime; * H / f - - - ( 18 )
Step 24, circulation step 22 to 23, until each key element is disposed, preserves the vector data W after DecryptDecryption;
(3) recovery process
Step 31, reads key file Key.txt, extracts key K ey, open the vector data W after DecryptDecryption after deciphering;
Step 32, Unitary coordinate, concrete steps are as follows:
321) extract the key element point coordinates of vector data W, obtain coordinate set WP "={ (wx j", wy j", wz j) | j=1,2 ..., k},
322) according to key K ey and formula (19), to set WP " set in each point coordinates wp j" (wx j", wy j", wz j) be normalized generation point coordinates set WP '={ (wx j', wy j', wz j) | j=1,2 ..., k}};
wx j &prime; = ( wx j &prime; &prime; - x m i d ) * f / H wy j &prime; = ( wy j &prime; &prime; - y m i d ) * f / H - - - ( 19 )
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates wp j' (wx j', wy j', wz j) calculate, then by height value wz jzero setting, the point coordinates wp after being restored j(wx j, wy j, 0), generate coordinate set WP={ (wx j, wy j, 0) | j=1,2 ..., k};
wx j = x m i d + ( wz j - H ) ( &omega; f &kappa; - f &phi; - &omega; 2 wx j &prime; - wx j &prime; + &phi;&omega;wy j &prime; + &kappa;wy j &prime; ) ( f&kappa; 2 - &omega;wy j &prime; - &phi;wx j &prime; + f - &omega;&kappa;wx j &prime; + &phi;&kappa;wy j &prime; ) wy j = y m i d + ( wz j - H ) ( &omega;&phi;wx j &prime; - &phi; 2 wy j &prime; - wy j &prime; - f &omega; - &kappa;wx j &prime; - &phi; f &kappa; ) ( f&kappa; 2 - &omega;wy j &prime; - &phi;wx j &prime; + f - &omega;&kappa;wx j &prime; + &phi;&kappa;wy j &prime; ) - - - ( 20 )
Step 34, circulation step 32 to 33, until each key element is disposed, the vector data Q after saving/restoring.
CN201210586283.3A 2012-12-28 2012-12-28 A kind of reversible DecryptDecryption method of GIS vector data Expired - Fee Related CN103067159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210586283.3A CN103067159B (en) 2012-12-28 2012-12-28 A kind of reversible DecryptDecryption method of GIS vector data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210586283.3A CN103067159B (en) 2012-12-28 2012-12-28 A kind of reversible DecryptDecryption method of GIS vector data

Publications (2)

Publication Number Publication Date
CN103067159A CN103067159A (en) 2013-04-24
CN103067159B true CN103067159B (en) 2016-03-02

Family

ID=48109630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210586283.3A Expired - Fee Related CN103067159B (en) 2012-12-28 2012-12-28 A kind of reversible DecryptDecryption method of GIS vector data

Country Status (1)

Country Link
CN (1) CN103067159B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559452B (en) * 2013-10-30 2016-03-30 南京师范大学 A kind of altitude data decryption and restoration methods
CN104077535B (en) * 2014-06-19 2017-01-25 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN104103031B (en) * 2014-08-03 2017-07-25 兰州交通大学 Based on normalized Vector spatial data blind watermark method
CN106778347B (en) * 2016-12-22 2019-08-20 南京师范大学 A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function
CN108090369B (en) * 2017-12-29 2021-06-08 南京师范大学 Chebyshev polynomial-based GIS vector data decryption and recovery method
CN108629190B (en) * 2018-03-23 2020-08-25 国网陕西省电力公司电力科学研究院 Geographic information data decryption method
CN109002724B (en) * 2018-06-07 2021-03-23 南京师范大学 DEM local decryption and recovery method based on tight support radial basis function

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574561B2 (en) * 2001-03-30 2003-06-03 The University Of North Florida Emergency management system
CN101968841A (en) * 2010-11-09 2011-02-09 北京安天电子设备有限公司 Anti-virus and decryption method and device for USB mobile storage apparatus
CN102332079A (en) * 2011-09-16 2012-01-25 南京师范大学 GIS (geographic information system) vector data disguising and restoring method based on error random interference

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574561B2 (en) * 2001-03-30 2003-06-03 The University Of North Florida Emergency management system
CN101968841A (en) * 2010-11-09 2011-02-09 北京安天电子设备有限公司 Anti-virus and decryption method and device for USB mobile storage apparatus
CN102332079A (en) * 2011-09-16 2012-01-25 南京师范大学 GIS (geographic information system) vector data disguising and restoring method based on error random interference

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
公众版地图地理要素脱密处理方法;傅宏;《地理空间信息》;20100831;第8卷(第4期);133-134 *

Also Published As

Publication number Publication date
CN103067159A (en) 2013-04-24

Similar Documents

Publication Publication Date Title
CN103067159B (en) A kind of reversible DecryptDecryption method of GIS vector data
CN103093414B (en) A kind of DOM raster data DecryptDecryption and restoration methods
Coser et al. On Rényi entropies of disjoint intervals in conformal field theory
Griffiths et al. Three-dimensional topology of turbulent premixed flame interaction
Bediz A spectral-Tchebychev solution technique for determining vibrational behavior of thick plates having arbitrary geometry
Nair et al. Computational aspects of a scalable high-order discontinuous Galerkin atmospheric dynamical core
CN104077536A (en) Radial basis function based GIS (Geographic Information System) vector data reversible decryption method
CN106778347A (en) A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function
CN103729564B (en) A kind of pressure field computational methods based on Particle Image Velocimetry and device
Li et al. A simple method for finding topological horseshoes
Izem et al. A discontinuous Galerkin method for two-layer shallow water equations
Leonov et al. Hidden oscillations in dynamical systems. 16 Hilbert’s problem, Aizerman’s and Kalman’s conjectures, hidden attractors in Chua’s circuits
CN104123411A (en) Automobile powertrain system rotational inertia synthetic method
Kneer et al. Symmetry-aware autoencoders: s-PCA and s-nlPCA
Forrester et al. Hydrodynamical spectral evolution for random matrices
Bause et al. First-order convergence of multi-point flux approximation on triangular grids and comparison with mixed finite element methods
KR101756858B1 (en) Secure Trajectory Query Processing with Surrogate Vector Model
CN104077535B (en) Graphic information system (GIS) vector data local decryption and restoring method
Luo et al. A quasi-conservative discontinuous Galerkin method for multi-component flows using the non-oscillatory kinetic flux II: ALE framework
Leonov et al. IWCFTA2012 Keynote speech I-Hidden attractors in dynamical systems: From hidden oscillation in Hilbert-Kolmogorov, Aizerman and Kalman problems to hidden chaotic attractor in Chua circuits
Luo et al. A comparative study of different reconstruction schemes for a reconstructed discontinuous Galerkin method on arbitrary grids
Deng et al. Estimating ultimate bound and finding topological horseshoe for a new chaotic system
Velichová Minkowski set operators
CN104937640B (en) Define the data processing method of element in d dimension spaces E
Leidinger et al. Explicit isogeometric b-rep analysis on trimmed nurbs-based multi-patch cad models in ls-dyna

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160302

Termination date: 20181228

CF01 Termination of patent right due to non-payment of annual fee