CN104599224A - Point type GIS (Geographic Information System) vector data disguising and recovery method based on information divided storage - Google Patents

Point type GIS (Geographic Information System) vector data disguising and recovery method based on information divided storage Download PDF

Info

Publication number
CN104599224A
CN104599224A CN201510038934.9A CN201510038934A CN104599224A CN 104599224 A CN104599224 A CN 104599224A CN 201510038934 A CN201510038934 A CN 201510038934A CN 104599224 A CN104599224 A CN 104599224A
Authority
CN
China
Prior art keywords
camouflage
point
triangle
concerning security
security matters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510038934.9A
Other languages
Chinese (zh)
Other versions
CN104599224B (en
Inventor
吴雪荣
李安波
蒋伟
杨孝丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201510038934.9A priority Critical patent/CN104599224B/en
Publication of CN104599224A publication Critical patent/CN104599224A/en
Application granted granted Critical
Publication of CN104599224B publication Critical patent/CN104599224B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Other Investigation Or Analysis Of Materials By Electrical Means (AREA)
  • Medicines Containing Antibodies Or Antigens For Use As Internal Diagnostic Agents (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a point type GIS vector data disguising and recovery method based on information divided storage. The method includes the steps of (1) a point type GIS vector data disguising process: determination of the scope of disguising, generation of disguising points and the like; (2) a point type GIS vector data recovery process: identification of disguising targets, reduction of the disguising points and the like. The point type GIS vector data disguising and recovery method based on information divided storage has the advantages of being high in hidden performance and free from capacity constraints, provides a new idea for vector geographic data information disguising and effectively protects the security of confidential point data in data transmission and hidden communication on the basis of hiding the existence of secret information.

Description

A kind of based on information divide deposit concerning security matters point-like geographic element camouflage and method of reducing
Technical field
The invention belongs to field of geographic information safety, be specifically related to a kind of based on information the GIS vector data camouflage dividing the technology of depositing to carry out vertex type and the method for reducing.
Background technology
The security protection of geography information relates to national security and social benefit, is the current great needs of problems of country and society being badly in need of solving.On the basis hidden the secret GIS vector data information content, hiding the existence of secret information further, is the emphasis of current geographic information security study and application.
At present, information divides the technology of depositing to be mainly used in image domains, image divides the implication of depositing to be image information is divided into the n width image with certain visual effect, if know m (m<n) the width subimage in image information, then this image can be restored, if image is less than m width, then image cannot be restored.Use for reference to divide and deposit the application of technology at image domains, the technology of depositing will be divided to be applied to vector geographic data information disguising, adopt certain method to divide in the vector geographic data of depositing multiple dispersion complete vector geographic data to pretend, make the data after camouflage remain significant vector geographic data.Compared with existing camouflage method, both taken into account the concealed advantage of precision crippled mode, turn avoid scrambled fashion easily cause assailant to note and carrier Stealth Modus to defects such as the high requests of capacity.
Summary of the invention
The object of the invention is to: divide based on information and deposit camouflage, propose a kind of camouflage for concerning security matters point-like geographic element in GIS point diagram layer data and method of reducing, can the security of effective guarantee concerning security matters point data in data transmission, Communication hiding.
To achieve these goals, the technical scheme that the present invention takes mainly comprises:
Divide the camouflage of concerning security matters point-like geographic element and a method of reducing of depositing based on information, concrete steps are as follows:
(1) the pseudo-process of assembling of vertex type GIS vector data
Step 11: load a width point layer map vector, and input camouflage radius factor c, c ∈ (0,1);
Step 12: select concerning security matters point set P={P from original point figure layer data R i| i=1,2 ..., m}, m are the number of concerning security matters point; For each the concerning security matters point P in point set P i, circulation performs step 13 to step 17 successively;
Step 13: determine current concerning security matters point P iintend generating the leg-of-mutton interior angle of camouflage i1, α i2, α i3,
A () adopts recurrence growth method to the triangulation network set T of current point layer data genaration TIN data layout, from set T, traversal comprises current concerning security matters point P itriangle sets T'={T j' | j=1,2 ..., n}, wherein T' ∈ T, n are for comprising P ileg-of-mutton number;
B () is to three interior angle of set T' intermediate cam shape i1, α i2, α i3sort from small to large, and angularly sequentially leave in set A 1, A2, A3 successively from small to large, wherein A1={A1 j| j=1,2 ..., n}, A2={A2 j| j=1,2 ..., n}, A3={A3 j| j=1,2 ..., n}, wherein n is leg-of-mutton number;
(c) based on formula (1) to set A 1, A2, A3 average respectively can obtain pretend leg-of-mutton three interior angle i1, α i2, α i3:
&alpha; i 1 = &Sigma; j = 1 n A 1 j n &alpha; i 2 = &Sigma; j = 1 n A 2 j n &alpha; i 3 = &Sigma; j = 1 n A 3 j n - - - ( 1 )
Step 14: determine current concerning security matters point P icamouflage radius r i',
A () calculates the leg-of-mutton interior angle ratio of camouflage intending generating according to formula (2), be designated as 1:m:n, wherein n>m>1,
m = &alpha; i 2 &alpha; i 1 n = &alpha; i 3 &alpha; i 1 - - - ( 2 )
B () establishes three points intending camouflage generation to be respectively P i1, P i2, P i3, the Thiessen polygon of current concerning security matters point is designated as ABCDEF, and the camouflage center of circle is o, and maximum camouflage radius is r, P iwith other original point P jminor increment be R, j ≠ i, P i1p i2distance maximal value is designated as l, P i1point and P iminor increment be designated as l i; According to the structure rule of TIN, guaranteeing that intending puppet decorates under same leg-of-mutton prerequisite, obtains the maximum camouflage radius r of current concerning security matters point based on formula (3) i:
l = 2 * sin ( &pi;n 1 + m + n ) r i R = MIN ( | P j P i | ) , ( j &NotEqual; i ) l i = R - r i r i < R 2 * sin ( &pi;n 1 + m + n ) + 1 - - - ( 3 )
C () calculates the camouflage radius r of current concerning security matters point according to formula (4) i', wherein, c is customer parameter:
r i'=c*r i,c∈(0,1) (4)
Step 15: the calculating intending camouflage point coordinate value, current concerning security matters point P icoordinate is designated as (x i, y i),
A central angle that () pretends each limit of triangle corresponding is designated as β successively according to order from small to large 1, β 2, β 3, computing formula is as shown in (5):
&beta; 1 = 2 &pi; 1 + m + n &beta; 2 = 2 &pi;m 1 + m + n &beta; 3 = 2 &pi;n ( 1 + m + n ) - - - ( 5 )
B () first puppet is decorateeed: get arbitrarily on camouflage circle and a bit decorate P as first puppet i1(x i1, y i1), as shown in formula (6):
x i 1 = random [ x i - r i &prime; , x i + r i &prime; ] y i 1 = y i &PlusMinus; r i &prime; 2 - ( x i 1 - x i ) 2 - - - ( 6 )
C () second puppet decorates P i2(x i2, y i2), suppose P i2with P i1the central angle that the chord length of formation is corresponding is β 1, based on P i1rotate β in the direction of the clock 1, P i2coordinate computing formula as shown in (7):
x i 2 = ( x i 1 - x i ) cos &beta; 1 - ( y i 1 - y i ) sin &beta; 1 + x i y i 2 = ( y i 1 - y i ) cos &beta; 1 + ( x i 1 - x i ) sin &beta; 1 + y i - - - ( 7 )
D () the 3rd puppet decorates P i3(x i3, y i3): according to the structure of TIN triangulation network rule and pretend leg-of-mutton interior angle and decorate than for 1:m:n two conditions traversal the 3rd puppet on camouflage circle, according to counterclockwise the 3rd puppet being found to decorate, computing formula is as shown in (8):
x i 3 = ( x i 1 - x i ) cos &beta; 2 + ( y i 1 - y i ) sin &beta; 2 + x i y i 3 = ( y i 1 - y i ) cos &beta; 2 - ( x i 1 - x i ) sin &beta; 2 + y i - - - ( 8 )
Step 16: three puppets generated are decorateeed P i1, P i2, P i3substitute current concerning security matters point P ibe updated in original point figure layer data R;
Step 17: by current concerning security matters point P icamouflage radius r i' do enciphering transformation after the key information k that generates iadd in key file KeyFile;
Step 18: repeat step 13 to step 17, until realize the camouflage process to each concerning security matters point key element, the data file of preserving after camouflage is R';
(2) for vertex type GIS vector data reduction process
Step 21: open the data file R' after camouflage, opens key file KeyFile; For each concerning security matters point P ireduction, successively circulation perform step 22 to step 26:
Step 22: the triangulation network set T vector point diagram layer data after current camouflage being built to TIN data layout according to recurrence growth method;
Step 23: to camouflage triangle S iidentification, the triangle formed by three points after pretending in triangulation network set T is called camouflage triangle;
A () reads current i-th group key k in key file KeyFile i, after deciphering reduction, current camouflage triangle S can be obtained icircumradius r i';
B () asks its circumscribed circle center of circle O to each triangle in set T icoordinate (x i, y i), remember that each Atria apex coordinate is respectively P i1(x i1, y i1), P i2(x i2, y i2), P i3(x i3, y i3), computing formula is as shown in (9); At known circumscribed circle center of circle O ion the basis of coordinate, calculate circumradius r according to formula (10) i:
x i = ( x i 1 2 - x i 2 2 + y i 1 2 - y i 2 2 ) * ( y i 1 - y i 3 ) - ( x i 1 2 - x i 3 2 + y i 1 2 - y i 3 2 ) * ( y i 1 - y i 2 ) 2 * ( y i 1 - y i 3 ) * ( x i 1 - x i 2 ) - 2 * ( y i 1 - y i 2 ) * ( x i 1 - x i 3 ) y i = ( x i 1 2 - x i 2 2 + y i 1 2 - y i 2 2 ) * ( x i 1 - x i 3 ) - ( x i 1 2 - x i 3 2 + y i 1 2 - y i 3 2 ) * ( x i 1 - x i 2 ) 2 * ( y i 1 - y i 2 ) * ( x i 1 - x i 3 ) - 2 * ( y i 1 - y i 3 ) * ( x i 1 - x i 2 ) - - - ( 9 )
r i = ( x i 1 - x i ) 2 + ( y i 1 - y i ) 2 - - - ( 10 )
C each triangle in () traversal T, searches its circumradius r iwith r i' equal all triangles, be designated as set A={ A i| i=1,2 ..., n}, wherein n is the triangle number meeting this condition;
If d () n is 1, so this triangle is camouflage triangle S i, these leg-of-mutton three summits are puppet and decorate; If n is greater than 1, then proceed to step (e);
E () pretends triangle S according to interior angle than screening further i; To current triangle A icirculation performs following operation successively:
I () calculates current triangle A respectively ithree interior angles, and be designated as α respectively according to order from small to large i1, α i2, α i3;
(ii) ephemeral data R is created tmp, and by data file R' assignment to data R tmp;
(iii) by current triangle A icorresponding circumscribed circle center of circle O ireplace these leg-of-mutton three vertex updates to ephemeral data R tmpin, regenerate the triangulation network set T' of TIN data layout;
(iV) in set T', traversal comprises O ithe triangle sets B={B of point i| i=1,2 ..., m}, m are for comprising O ithe triangle number of point; According to the rule of described step 13, average internal angle value is tried to achieve for all triangles in set B, and is designated as β successively by order from small to large 1, β 2, β 3;
(V) if interior angle mean value β 1, β 2, β 3with α i1, α i2, α i3equal respectively, so current triangle A ifor camouflage triangle; If interior angle mean value β 1, β 2, β 3with α i1, α i2, α i3not etc., circulation performs step (i) to (V), until traverse qualified camouflage triangle;
Step 24: camouflaged target reduces, travels through the camouflage triangle S obtained ithree vertex point coordinates be respectively P i1, P i2, P i3, original concerning security matters point coordinate P can be calculated by formula (9) i(x i, y i);
Step 25: by the original concerning security matters point coordinate P after reduction ialternative puppet decorates P i1, P i2, P i3be updated in vector data file R';
Step 26: repeat step 22-25, complete the reduction treatment of each concerning security matters point successively.
To divide in the vertex type GIS vector data camouflage method deposited based on information, when calculating second puppet is decorateeed, in theory based on P for above-mentioned i1by counterclockwise rotating β 1same to be suitable for, but according to the structure rule of the TIN triangulation network and pretend leg-of-mutton three interior angles than being 1:m:n, to travel through and decorateeing less than the 3rd puppet.Therefore second puppet is decorateeed and can only be calculated according to clockwise direction.
The present invention utilizes information to divide the technology of depositing, and by being deposited in multiple vectorial geographical point data by each concerning security matters point element information minute, reaches the effect of camouflage.The method morphologically keeps global coherency by making the triangulation network after camouflage and the original triangulation network, reduce the notice of assailant, improve the disguise of camouflage, and can avoid the problem that in conventional camouflage, embedding capacity is too low, the communication that can meet GIS vector data is to a certain extent hidden and safe transmission demand.Method of the present invention has higher disguise and is not subject to the advantage of capacity limit, for the information disguising of vector geographic data provides new approaches, the security of the secret point data of effective guarantee in data transmission, Communication hiding on the basis of hiding secret information existence.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the inventive method, and (a) is camouflage process flow diagram, and (b) is reduction process flow diagram;
Fig. 2 is the camouflage scope schematic diagram of the inventive method;
Fig. 3 is that three puppets of the inventive method decorate schematic diagram, and (a) is that second puppet decorates schematic diagram, and (b) is that the 3rd puppet decorates schematic diagram, and (c) is that three puppets decorate schematic diagram.
Fig. 4 is raw data of the present invention and Camouflaged data TIN comparison diagram, a () is raw data triangulation network schematic diagram, wherein the point of overstriking is that puppet is decorateeed, b () is data triangulation network schematic diagram after camouflage, wherein the point of overstriking is concerning security matters points, and the point on circle is that three puppets are decorateeed.
Fig. 5 is raw data of the present invention and Camouflaged data comparison diagram, (a) raw data schematic diagram, and the point of wherein overstriking is original concerning security matters points, and (b) is schematic diagram data after camouflage, and the point of wherein overstriking is that the puppet generated is decorateeed.
Embodiment
The present embodiment selects shp form vector data, for the whole process of the reading of data, camouflage, reduction, further describes the present invention.This example selects certain simulation concerning security matters point shp data to be experimental data.
(1) pseudo-process of assembling
Step 11: loading simulation concerning security matters point shp data, and input c=0.5 as initial key parameter.
Step 12: select concerning security matters point set P={ (813.91989999999987 ,-1033.2102999999997) }.
Step 13: determine that current concerning security matters point is intended generating the leg-of-mutton interior angle of camouflage i1, α i2, α i3.
A (), to current point layer data genaration triangulation network T, has 4 triangles to comprise concerning security matters point in set T;
B () three interior angles to set T ' intermediate cam shape sort from small to large, and angularly sequentially leave in successively in A1, A2, A3 from small to large, wherein A1={24.336498184787121,13.579427824944508,18.623653496634297,56.170816586114064}, A2={55.463665017116085,19.117895793786708,46.434232690564436,57.765929283815957}, A3={100.1998367980968,147.30267638126884,114.94211381280124,66.063254130069978};
(c) based on formula (1) to A1, A2, A3 respectively averaging can obtain pretend leg-of-mutton three interior angle a 1=28.177599023119996, a 2=44.6954306963208, a 3=107.12697028055921.
Step 14: determine current concerning security matters point P iactual camouflage radius r i1.
A () calculates the leg-of-mutton interior angle ratio of camouflage intending generating according to formula (2), be 1:1.5862043696358856:3.801848773298977.
B () as shown in Figure 2, obtains the maximum camouflage radius r of current concerning security matters point based on formula (3) 1=88.307168093798111.
C () calculates the actual camouflage radius r of current concerning security matters point according to formula (4) 11=44.153584046899056.
Step 15: the calculating intending camouflage point coordinate value.
A) (a) calculates central angle according to formula (5) and can obtain 28.177599023119996,44.6954306963208,107.12697028055921.
B () first puppet is decorateeed: according to formula (6), and camouflage circle gets arbitrarily 1 P 11=(825.21531441389641 ,-990.52596332476355).
C () second puppet is decorateeed: can obtain according to computing formula (7).P 12=(784.64383219137676,-1000.1580559331973)。
D () the 3rd puppet is decorateeed: can obtain P according to computing formula (8) 13=(856.72190907596212 ,-1044.0512871897263).
Step 16: three puppets generated are decorateeed P 11, P 12, P 13replace current concerning security matters point P istored in original point figure layer data R.
Step 17: the result current puppet decorateeed after the conversion of triangle camouflage radius of circle is added in key file KeyFile.
Step 18: repeat step 13 to step 18, until realize the camouflage process to each concerning security matters point key element, the data file of preserving after camouflage is R'.
(2) reduction process
Step 21: open the vector data R' after camouflage, open key file KeyFile.
Step 22: the triangulation network T vector point diagram layer data R' after current camouflage being built to TIN data layout according to recurrence growth method.
Step 23: the identification of camouflaged target,
A () reads current key in key file KeyFile, can obtain the leg-of-mutton circumradius 44.153584046899056 of current camouflage after deciphering reduction.
B () asks its circumscribed circle central coordinate of circle to triangle each in T.
The triangle number that the c external radius of a circle of T intermediate cam shape that () traverses is equal with current key radius is 1, and this triangle is camouflage triangle.
D () is read leg-of-mutton three apex coordinates of camouflage and is respectively P 01(825.21531441389641 ,-990.52596332476355), P 02(784.64383219137676 ,-1000.1580559331973), P 03(856.72190907596212 ,-1044.0512871897263).
Step 24: camouflaged target reduces, and can obtain P according to formula (9) 0point coordinate (813.91989999999987 ,-1033.2102999999997).
Step 25: by the coordinate points P after reduction 0puppet is replaced to decorate P 01, P 02, P 03join in vector data R'.
Step 26: repeat step 22-25, complete every reduction treatment according to the backward pretending dot generation in pseudo-process of assembling successively.

Claims (2)

1. divide the camouflage of concerning security matters point-like geographic element and a method of reducing of depositing based on information, it is characterized in that, concrete steps are as follows:
(1) the pseudo-process of assembling of vertex type GIS vector data
Step 11: load a width point layer map vector, and input camouflage radius factor c, c ∈ (0,1);
Step 12: select concerning security matters point set P={P from original point figure layer data R i| i=1,2 ..., m}, m are the number of concerning security matters point; For each the concerning security matters point P in point set P i, circulation performs step 13 to step 17 successively;
Step 13: determine current concerning security matters point P iintend generating the leg-of-mutton interior angle of camouflage i1, α i2, α i3,
A () adopts recurrence growth method to the triangulation network set T of current point layer data genaration TIN data layout, from set T, traversal comprises current concerning security matters point P itriangle sets T '={ T j' | j=1,2 ..., n}, wherein T ' ∈ T, n are for comprising P ileg-of-mutton number;
B () is to three interior angle of set T ' intermediate cam shape i1, α i2, α i3sort from small to large, and angularly sequentially leave in set A 1, A2, A3 successively from small to large, wherein A1={A1 j| j=1,2 ..., n}, A2={A2 j| j=1,2 ..., n}, A3={A3 j| j=1,2 ..., n}, wherein n is leg-of-mutton number;
(c) based on formula (1) to set A 1, A2, A3 average respectively can obtain pretend leg-of-mutton three interior angle i1, α i2, α i3:
&alpha; i 1 = &Sigma; j = 1 n A 1 j n &alpha; i 2 = &Sigma; j = 1 n A 2 j n &alpha; i 3 = &Sigma; j = 1 n A 3 j n - - - ( 1 )
Step 14: determine current concerning security matters point P icamouflage radius r i',
A () calculates the leg-of-mutton interior angle ratio of camouflage intending generating according to formula (2), be designated as 1:m:n, wherein n>m>1,
m = &alpha; i 2 &alpha; i 1 n = &alpha; i 3 &alpha; i 1 - - - ( 2 )
B () establishes three points intending camouflage generation to be respectively P i1, P i2, P i3, the Thiessen polygon of current concerning security matters point is designated as ABCDEF, and the camouflage center of circle is o, and maximum camouflage radius is r, P iwith other original point P jminor increment be R, j ≠ i, P i1p i2distance maximal value is designated as l, P i1point and P iminor increment be designated as l i; According to the structure rule of TIN, guaranteeing that intending puppet decorates under same leg-of-mutton prerequisite, obtains the maximum camouflage radius r of current concerning security matters point based on formula (3) i:
l = 2 * sin ( &pi;n 1 + m + n ) r i R = MIN ( | P j P i | ) , ( j &NotEqual; i ) l i = R - r i r i < R 2 * sin ( &pi;n 1 + m + n ) + 1 - - - ( 3 )
C () calculates the camouflage radius r of current concerning security matters point according to formula (4) i', wherein, c is customer parameter:
r i′=c*r i,c∈(0,1) (4)
Step 15: the calculating intending camouflage point coordinate value, current concerning security matters point P icoordinate is designated as (x i, y i),
A central angle that () pretends each limit of triangle corresponding is designated as β successively according to order from small to large 1, β 2, β 3, computing formula is as shown in (5):
&beta; 1 = 2 &pi; 1 + m + n &beta; 2 = 2 &pi;m 1 + m + n &beta; 3 = 2 &pi;n ( 1 + m + n ) - - - ( 5 )
B () first puppet is decorateeed: get arbitrarily on camouflage circle and a bit decorate P as first puppet i1(x i1, y i1), as shown in formula (6):
x i 1 = random [ x i - r i &prime; , x i + r i &prime; ] y i 1 = y i &PlusMinus; r i &prime; 2 - ( x i 1 - x i ) 2 - - - ( 6 )
C () second puppet decorates P i2(x i2, y i2), suppose P i2with P i1the central angle that the chord length of formation is corresponding is β 1, based on P i1rotate β in the direction of the clock 1, P i2coordinate computing formula as shown in (7):
x i 2 = ( x i 1 - x i ) cos &beta; 1 - ( y i 1 - y i ) sin &beta; 1 + x i y i 2 = ( y i 1 - y i ) cos &beta; 1 + ( x i 1 - x i ) sin &beta; 1 + y i - - - ( 7 )
D () the 3rd puppet decorates P i3(x i3, y i3): according to the structure of TIN triangulation network rule and pretend leg-of-mutton interior angle and decorate than for 1:m:n two conditions traversal the 3rd puppet on camouflage circle, according to counterclockwise the 3rd puppet being found to decorate, computing formula is as shown in (8):
x i 3 = ( x i 1 - x i ) cos &beta; 2 + ( y i 1 - y i ) sin &beta; 2 + x i y i 3 = ( y i 1 - y i ) cos &beta; 2 - ( x i 1 - x i ) sin &beta; 2 + y i - - - ( 8 )
Step 16: three puppets generated are decorateeed P i1, P i2, P i3substitute current concerning security matters point P ibe updated in original point figure layer data R;
Step 17: by current concerning security matters point P icamouflage radius r i' do enciphering transformation after the key information k that generates iadd in key file KeyFile;
Step 18: repeat step 13 to step 17, until realize the camouflage process to each concerning security matters point key element, the data file of preserving after camouflage is R ';
(2) for vertex type GIS vector data reduction process
Step 21: open the data file R ' after camouflage, opens key file KeyFile; For each concerning security matters point P ireduction, successively circulation perform step 22 to step 26:
Step 22: the triangulation network set T vector point diagram layer data after current camouflage being built to TIN data layout according to recurrence growth method;
Step 23: to camouflage triangle S iidentification, the triangle formed by three points after pretending in triangulation network set T is called camouflage triangle;
A () reads current i-th group key k in key file KeyFile i, after deciphering reduction, current camouflage triangle S can be obtained icircumradius r i';
B () asks its circumscribed circle center of circle O to each triangle in set T icoordinate (x i, y i), remember that each Atria apex coordinate is respectively P i1(x i1, y i1), P i2(x i2, y i2), P i3(x i3, y i3), computing formula is as shown in (9); At known circumscribed circle center of circle O ion the basis of coordinate, calculate circumradius r according to formula (10) i:
x i = ( x i 1 2 - x i 2 2 + y i 1 2 - y i 2 2 ) * ( y i 1 - y i 3 ) - ( x i 1 2 - x i 3 2 + y i 1 2 - y i 3 2 ) * ( y i 1 - y i 2 ) 2 * ( y i 1 - y i 3 ) * ( x i 1 - x i 2 ) - 2 * ( y i 1 - y i 2 ) * ( x i 1 - x i 3 ) y i = ( x i 1 2 - x i 2 2 + y i 1 2 - y i 2 2 ) * ( x i 1 - x i 3 ) - ( x i 1 2 - x i 3 2 + y i 1 2 - y i 3 2 ) * ( x i 1 - x i 2 ) 2 * ( y i 1 - y i 2 ) * ( x i 1 - x i 3 ) - 2 * ( y i 1 - y i 3 ) * ( x i 1 - x i 2 ) - - - ( 9 )
r i = ( x i 1 - x i ) 2 + ( y i 1 - y i ) 2 - - - ( 10 )
C each triangle in () traversal T, searches its circumradius r iwith r i' equal all triangles, are designated as set A={ A i| i=1,2 ..., n}, wherein n is the triangle number meeting this condition;
If d () n is 1, so this triangle is camouflage triangle S i, these leg-of-mutton three summits are puppet and decorate; If n is greater than 1, then proceed to step (e);
E () pretends triangle S according to interior angle than screening further i;
Step 24: camouflaged target reduces, travels through the camouflage triangle S obtained ithree vertex point coordinates be respectively P i1, P i2, P i3, original concerning security matters point coordinate P can be calculated by formula (9) i(x i, y i);
Step 25: by the original concerning security matters point coordinate P after reduction ialternative puppet decorates P i1, P i2, P i3be updated in vector data file R ';
Step 26: repeat step 22-25, complete the reduction treatment of each concerning security matters point successively.
2. according to claim 1ly a kind ofly divide the camouflage of concerning security matters point-like geographic element and method of reducing of depositing based on information, it is characterized in that, in step 23 (e), further screening camouflage triangle S idetailed process as follows: to current triangle A icirculation performs following operation successively:
I () calculates current triangle A respectively ithree interior angles, and be designated as α respectively according to order from small to large i1, α i2, α i3;
(ii) ephemeral data R is created tmp, and by data file R ' assignment to data R tmp;
(iii) by current triangle A icorresponding circumscribed circle center of circle O ireplace these leg-of-mutton three vertex updates to ephemeral data R tmpin, regenerate the triangulation network set T ' of TIN data layout;
(iV) O is comprised in the middle traversal of set T ' ithe triangle sets B={B of point i| i=1,2 ..., m}, m are for comprising O ithe triangle number of point; According to the rule of described step 13, average internal angle value is tried to achieve for all triangles in set B, and is designated as β successively by order from small to large 1, β 2, β 3;
(V) if interior angle mean value β 1, β 2, β 3with α i1, α i2, α i3equal respectively, so current triangle A ifor camouflage triangle; If interior angle mean value β 1, β 2, β 3with α i1, α i2, α i3not etc., circulation performs step (i) to (V), until traverse qualified camouflage triangle.
CN201510038934.9A 2015-01-26 2015-01-26 A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method Expired - Fee Related CN104599224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510038934.9A CN104599224B (en) 2015-01-26 2015-01-26 A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510038934.9A CN104599224B (en) 2015-01-26 2015-01-26 A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method

Publications (2)

Publication Number Publication Date
CN104599224A true CN104599224A (en) 2015-05-06
CN104599224B CN104599224B (en) 2017-12-15

Family

ID=53124976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510038934.9A Expired - Fee Related CN104599224B (en) 2015-01-26 2015-01-26 A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method

Country Status (1)

Country Link
CN (1) CN104599224B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112749241A (en) * 2020-07-28 2021-05-04 广西华蓝岩土工程有限公司 Secret-related land parcel map boundary point geodetic coordinate decryption processing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254093A (en) * 2011-06-24 2011-11-23 天津大学 Connected domain statistical correlation algorithm based on Thiessen polygon
CN102651059A (en) * 2012-04-01 2012-08-29 洛阳理工学院 Method for certificating GIS (Geographic Information System) vector data copyright based on multi-element spatial feature
CN103077211A (en) * 2012-12-28 2013-05-01 南京师范大学 Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data
US20130339411A1 (en) * 2010-03-13 2013-12-19 Matthew Thomas Bogosian Storage of Arbitrary Points in N-Space and Retrieval of Subset Thereof Based on Criteria Including Maximum Distance to an Arbitrary Reference Point

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130339411A1 (en) * 2010-03-13 2013-12-19 Matthew Thomas Bogosian Storage of Arbitrary Points in N-Space and Retrieval of Subset Thereof Based on Criteria Including Maximum Distance to an Arbitrary Reference Point
CN102254093A (en) * 2011-06-24 2011-11-23 天津大学 Connected domain statistical correlation algorithm based on Thiessen polygon
CN102651059A (en) * 2012-04-01 2012-08-29 洛阳理工学院 Method for certificating GIS (Geographic Information System) vector data copyright based on multi-element spatial feature
CN103077211A (en) * 2012-12-28 2013-05-01 南京师范大学 Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112749241A (en) * 2020-07-28 2021-05-04 广西华蓝岩土工程有限公司 Secret-related land parcel map boundary point geodetic coordinate decryption processing method

Also Published As

Publication number Publication date
CN104599224B (en) 2017-12-15

Similar Documents

Publication Publication Date Title
Liu et al. Urban expansion in China and its spatial-temporal differences over the past four decades
CN106504326B (en) Take the landform altitude sampled point encryption method of form precision into account
CN101976468B (en) Method and system for visualizing multiresolution dynamic landform
CN107766471A (en) The organization and management method and device of a kind of multi-source data
CN108489491A (en) A kind of Three-dimensional Track Intelligent planning method of autonomous underwater vehicle
Froese et al. The border k-means clustering algorithm for one dimensional data
CN104766081A (en) Method for extracting territorial sea baseline based on natural coastline data
CN106326997A (en) Method for building GIS database for power repair under natural disasters
Liu et al. Ltsm: Lightweight and trusted sharing mechanism of iot data in smart city
CN103077211A (en) Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data
CN105427177A (en) Automatic farmland four-boundary calculation method based on GIS (Geographic Information System)
Kanapıyanova History of the energy sector development and Kazakhstan’s energy potential
CN106408660A (en) Digital terrain model compression method and equipment for electric power path planning
CN104599224A (en) Point type GIS (Geographic Information System) vector data disguising and recovery method based on information divided storage
CN114372516A (en) XGboost-based federal learning training and prediction method and device
CN103458032B (en) The method and system of a kind of spatial data accessing rule dynamic statistics and Information Compression
CN109962813A (en) A kind of network structure generation method for network structure secret protection
Li Sovereignty at Sea: China and the Law of the Sea Conference
CN111309833B (en) Privacy protection method for large geographic space data release based on map adjustment
White The Chinese development model: a virtuous paradigm?
Akaha Japan's Multilevel Approach Toward the Korean Peninsula After the Cold War
Fan et al. Privacy preserving ultra-short-term wind power prediction based on secure multi party computation
CN107861103B (en) A kind of radar enveloping solid fusion method based on elevation circle
Karagiannis The emerging gas region of the Eastern Mediterranean
Shen et al. An adaptive triangulation optimization algorithm based on empty circumcircle

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171215

Termination date: 20210126