CN104599224B - A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method - Google Patents

A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method Download PDF

Info

Publication number
CN104599224B
CN104599224B CN201510038934.9A CN201510038934A CN104599224B CN 104599224 B CN104599224 B CN 104599224B CN 201510038934 A CN201510038934 A CN 201510038934A CN 104599224 B CN104599224 B CN 104599224B
Authority
CN
China
Prior art keywords
mrow
msub
msup
mtr
mtd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510038934.9A
Other languages
Chinese (zh)
Other versions
CN104599224A (en
Inventor
吴雪荣
李安波
蒋伟
杨孝丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201510038934.9A priority Critical patent/CN104599224B/en
Publication of CN104599224A publication Critical patent/CN104599224A/en
Application granted granted Critical
Publication of CN104599224B publication Critical patent/CN104599224B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of vertex type GIS vector data camouflage deposited based on information point and restoring method, including following process:(1) for vertex type GIS vector data camouflage process, including the steps such as the determination of scope, the pseudo- generation decorateeed are pretended;(2) it is directed to vertex type GIS vector data reduction process, including the process such as the identifying of camouflaged target, pseudo- reduction decorateeed.The method of the present invention has higher disguise and not by the advantage of capacity limit, new approaches are provided for the information disguising of vector geographic data, security of the effective guarantee secret point data in data transfer, Communication hiding on the basis of secret information existence is hidden.

Description

A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method
Technical field
The invention belongs to field of geographic information safety, and in particular to a kind of to deposit technology progress vertex type based on information point GIS vector data pretends the method with reduction.
Background technology
The security protection of geography information is related to national security and social benefit, is the current country for being badly in need of solving and society's weight Big needs of problems.On the basis of being hidden to the secret GIS vector data information content, the presence of secret information is further hidden, It is the emphasis of current geographic information security study and application.
At present, the information point technology of depositing is mainly used in image domains, and image point, which is deposited, to be meant that image information being divided into tool There are the n width images of certain visual effect, if it is known that the m (m in image information<N) width subgraph, then the image can obtain extensive Multiple, if image is less than m width, image can not be restored.Use for reference to divide and deposit application of the technology in image domains, technology is deposited by point Vector geographic data information disguising is applied to, complete vector geographic data is stored to multiple points using certain method point Pretended in scattered vector geographic data, make the still meaningful vector geographic data of the data after camouflage.With it is existing Camouflage method is compared, and has both been taken into account the concealed advantage of precision crippled mode, turn avoid scrambled fashion and easily cause attacker Pay attention to and the defects of carrier Stealth Modus is to the high request of capacity.
The content of the invention
It is an object of the invention to:Camouflage is deposited based on information point, proposed a kind of for concerning security matters in GIS point diagram layer datas The camouflage of point-like geographic element and restoring method, can safety of the effective guarantee concerning security matters point data in data transfer, Communication hiding Property.
To achieve these goals, the technical scheme that the present invention takes mainly includes:
A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method, are comprised the following steps that:
(1) vertex type GIS vector data camouflage process
Step 11:A width point figure layer map vector is loaded, and inputs camouflage radius factor c, c ∈ (0,1);
Step 12:Concerning security matters point set P={ P are selected from original point figure layer data Ri| i=1,2 ..., m }, m is concerning security matters point Number;For each concerning security matters point P in point set Pi, circulate perform step 13 to step 17 successively;
Step 13:It is determined that current concerning security matters point PiIntend the interior angle of generation camouflage trianglei1、αi2、αi3,
(a) using recurrence growth method current point figure layer data are generated with the triangle net collective T of TIN data formats, from set T Middle traversal includes current concerning security matters point PiTriangle sets T'={ Tj' | j=1,2 ..., n }, wherein T' ∈ T, n are to include Pi's The number of triangle;
(b) to three interior angles of set T' intermediate cam shapesi1、αi2、αi3Sorted from small to large, and angularly from it is small to Big order is stored in set A1, A2, A3 successively, wherein A1={ A1j| j=1,2 ..., n }, A2={ A2j| j=1,2 ..., N }, A3={ A3j| j=1,2 ..., n }, wherein n is the number of triangle;
(c) three interior angles for pretending triangle can be obtained by set A1, A2, A3 being averaged respectively based on formula (1) αi1、αi2、αi3
Step 14:It is determined that current concerning security matters point PiCamouflage radius ri',
(a) the interior angle ratio for the camouflage triangle for intending generation is calculated according to formula (2), is designated as 1:m:N, wherein n>m>1,
(b) it is respectively P to set three points for intending pretending generationi1、Pi2、Pi3, the Thiessen polygon of current concerning security matters point is designated as ABCDEF, the camouflage center of circle are o, and maximum camouflage radius is r, PiWith other original points PjMinimum range be R, j ≠ i, Pi1Pi2Away from L, P are designated as from maximumi1Point and PiMinimum range be designated as li;According to the structure of TIN rule, ensuring to intend puppet Decorate on the premise of same triangle, the maximum camouflage radius r of current concerning security matters point is obtained based on formula (3)i
(c) the camouflage radius r of current concerning security matters point is calculated according to formula (4)i', wherein, c is customer parameter:
ri'=c*ri,c∈(0,1) (4)
Step 15:Intend the calculating of camouflage point coordinates value, current concerning security matters point PiCoordinate is designated as (xi,yi),
(a) central angle corresponding to each side of camouflage triangle is designated as β successively according to order from small to large1、β2、β3, calculate public Formula is such as shown in (5):
(b) first puppet is decorateeed:Arbitrarily taken on camouflage circle and a little decorate P as first puppeti1(xi1, yi1), such as formula (6) shown in:
(c) second puppet decorates Pi2(xi2, yi2), it is assumed that Pi2With Pi1Central angle corresponding to the chord length of formation is β1, it is based on Pi1Rotation β in the direction of the clock1, Pi2Coordinate calculation formula such as shown in (7):
(d) the 3rd puppet decorates Pi3(xi3, yi3):According to the structure rule of the TIN triangulation networks and the interior angle of camouflage triangle Than for 1:m:Two conditions of n the 3rd puppet of traversal on camouflage circle is decorateeed, and the 3rd camouflage can be found according to counter clockwise direction Point, calculation formula is such as shown in (8):
Step 16:Three puppets of generation are decorateeed into Pi1、Pi2、Pi3Substitute current concerning security matters point PiUpdate original point figure layer number According in R;
Step 17:By current concerning security matters point PiCamouflage radius ri' it is the key information k generated after enciphering transformationiIt is added to close In key file KeyFile;
Step 18:Repeat step 13, until realizing the processing of the camouflage to each concerning security matters point key element, preserves camouflage to step 17 Data file afterwards is R';
(2) it is directed to vertex type GIS vector data reduction process
Step 21:The data file R' after camouflage is opened, opens key file KeyFile;For each concerning security matters point Pi Reduction, circulation successively performs step 22 to step 26:
Step 22:The three of TIN data formats is built according to recurrence growth method to the vector point diagram layer data after current camouflage Angle net collective T;
Step 23:To pretending triangle SiIdentification, the triangle formed by three points after pretending in triangle net collective T Referred to as pretend triangle;
(a) current i-th group key k in key file KeyFile is readi, current camouflage triangle is can obtain after decryption reduction Shape SiCircumradius ri';
(b) its circumscribed circle center of circle O is asked to each triangle in set TiCoordinate (xi,yi), remember each Atria summit Coordinate is respectively Pi1(xi1,yi1),Pi2(xi2,yi2),Pi3(xi3,yi3), calculation formula is such as shown in (9);In the known circumscribed circle center of circle OiOn the basis of coordinate, circumradius r is calculated according to formula (10)i
(c) each triangle in T is traveled through, searches its circumradius riWith ri' equal all triangles, it is designated as collecting Close A={ Ai| i=1,2 ..., n }, wherein n is the triangle number for meeting the condition;
If (d) n is 1, then the triangle is camouflage triangle Si, three summits of the triangle are that puppet is decorateeed; If n is more than 1, step (e) is transferred to;
(e) triangle S is pretended than further screening according to interior anglei;To current triangle AiCirculation performs following grasp successively Make:
(i) current triangle A is calculated respectivelyiThree interior angles, and be designated as α respectively according to order from small to largei1、 αi2、αi3
(ii) ephemeral data R is createdtmp, and data file R' is assigned to data Rtmp
(iii) by current triangle AiCorresponding circumscribed circle center of circle OiInstead of three vertex updates of the triangle to temporarily Data RtmpIn, regenerate the triangle net collective T' of TIN data formats;
(iV) traversal includes O in set T'iTriangle sets B={ the B of pointi| i=1,2 ..., m }, m is to include OiPoint Triangle number;Try to achieve average internal angle value according to the rule of the step 13 for all triangles in set B, and by from It is small to be designated as β successively to big order1、β2、β3
(V) if interior angle average value β1、β2、β3With αi1、αi2、αi3It is equal respectively, then current triangle AiFor camouflage three It is angular;If interior angle average value β1、β2、β3With αi1、αi2、αi3, circulate and perform step (i) to (V), meet until traversing The camouflage triangle of condition;
Step 24:Camouflaged target reduces, and travels through obtained camouflage triangle SiThree summit point coordinates be respectively Pi1、 Pi2、Pi3, original concerning security matters point coordinates P can be calculated by formula (9)i(xi,yi);
Step 25:By the original concerning security matters point coordinates P after reductioniSubstitute puppet and decorate Pi1、Pi2、Pi3Update vector data text In part R';
Step 26:Repeat step 22-25, it is sequentially completed the reduction treatment of each concerning security matters point.
For in the above-mentioned vertex type GIS vector data camouflage method deposited based on information point, being decorateeed calculating second puppet When, in theory based on Pi1Rotation β counterclockwise1It is equally applicable, but according to the structure rule of the TIN triangulation networks and camouflage Three interior angle ratios of triangle are 1:m:N, travel through less than the 3rd puppet and decorate.Therefore decorate can only be according to clockwise for second puppet Direction calculating.
The present invention deposits technology using information point, is counted by the way that each concerning security matters point element information minute is stored into multiple vectorial geographicals In, reach the effect of camouflage.This method morphologically keeps complete by the triangulation network after making camouflage with the original triangulation network Office's uniformity, reduces the notice of attacker, improves the disguise of camouflage, and can avoid embedding capacity in conventional camouflage The problem of too low, it can meet that the communication of GIS vector data is hidden and safe transmission demand to a certain extent.The method of the present invention With higher disguise and not by the advantage of capacity limit, new approaches are provided for the information disguising of vector geographic data, Security of the effective guarantee secret point data in data transfer, Communication hiding on the basis of hiding secret information existence.
Brief description of the drawings
Fig. 1 is the flow chart of the inventive method, and (a) is camouflage flow chart, and (b) is reduction flow chart;
Fig. 2 is the camouflage scope schematic diagram of the inventive method;
Fig. 3 is that three puppets of the inventive method decorate schematic diagram, and (a) is that second puppet decorates schematic diagram, and (b) is the 3rd Puppet decorates schematic diagram, and (c) is that three puppets decorate schematic diagram.
Fig. 4 is initial data of the present invention and Camouflaged data TIN comparison diagram, and (a) is that the initial data triangulation network shows It is intended to, the point of wherein overstriking is decorateeed for puppet, and (b) is data triangulation network schematic diagram after camouflage, and the wherein point of overstriking is concerning security matters point, Point on circle is decorateeed for three puppets.
Fig. 5 is initial data of the present invention and Camouflaged data comparison diagram, and the point of (a) initial data schematic diagram, wherein overstriking is Original concerning security matters point, (b) are schematic diagram data after camouflage, and the wherein point of overstriking is decorateeed for the puppet of generation.
Embodiment
The present embodiment select shp form vector datas, for the reading of data, camouflage, reduction whole process, further Describe the present invention in detail.It is experimental data that this example, which selects certain simulation concerning security matters point shp data,.
(1) process is pretended
Step 11:Loading simulation concerning security matters point shp data, and c=0.5 is inputted as initial key parameter.
Step 12:Select concerning security matters point set P={ (813.91989999999987, -1033.2102999999997) }.
Step 13:It is determined that current concerning security matters point intends the interior angle of generation camouflage trianglei1、αi2、αi3
(a) current point figure layer data are generated with triangulation network T, there are 4 triangles to include concerning security matters point in set T;
(b) three interior angles of set T ' intermediate cam shapes are sorted from small to large, and angularly from small to large order according to It is secondary to be stored in A1, A2, A3, wherein A1=24.336498184787121,13.579427824944508, 18.623653496634297,56.170816586114064, A2=55.463665017116085, 19.117895793786708,46.434232690564436,57.765929283815957, A3= {100.1998367980968,147.30267638126884,114.94211381280124,66.063254130069978};
(c) based on formula (1), to A1, A2, A3, averaging can obtain three interior angle a of camouflage triangle respectively1= 28.177599023119996 a2=44.6954306963208, a3=107.12697028055921.
Step 14:It is determined that current concerning security matters point PiActual camouflage radius ri1
(a) the interior angle ratio for the camouflage triangle for intending generation is calculated according to formula (2), is 1:1.5862043696358856: 3.801848773298977。
(b) as shown in Fig. 2 obtaining the maximum camouflage radius r of current concerning security matters point based on formula (3)1= 88.307168093798111。
(c) the actual camouflage radius r of current concerning security matters point is calculated according to formula (4)11=44.153584046899056.
Step 15:Intend the calculating of camouflage point coordinates value.
A) (a) according to formula (5) calculate central angle can obtain 28.177599023119996,44.6954306963208, 107.12697028055921。
(b) first puppet is decorateeed:According to formula (6), a point P is arbitrarily taken on camouflage circle11= (825.21531441389641, -990.52596332476355).
(c) second puppet is decorateeed:It can be obtained according to calculation formula (7).P12=(784.64383219137676 ,- 1000.1580559331973)。
(d) the 3rd puppet is decorateeed:P can be obtained according to calculation formula (8)13=(856.72190907596212 ,- 1044.0512871897263)。
Step 16:Three puppets of generation are decorateeed into P11、P12、P13Instead of current concerning security matters point PiIt is stored in original point figure layer data R In.
Step 17:The result that current puppet is decorateeed after triangle camouflage radius of circle conversion is added to key file KeyFile In.
Step 18:Repeat step 13, until realizing the processing of the camouflage to each concerning security matters point key element, preserves camouflage to step 18 Data file afterwards is R'.
(2) reduction process
Step 21:The vector data R' after camouflage is opened, opens key file KeyFile.
Step 22:TIN data formats are built according to recurrence growth method to the vector point diagram layer data R' after current camouflage Triangulation network T.
Step 23:The identification of camouflaged target,
(a) current key in key file KeyFile is read, the external of current camouflage triangle is can obtain after decryption reduction Radius of circle 44.153584046899056.
(b) its circumscribed circle central coordinate of circle is asked to each triangle in T.
(c) the triangle number that the radius of the T intermediate cam shape circumscribed circles traversed is equal with current key radius is 1, should Triangle is to pretend triangle.
(d) three apex coordinates for reading camouflage triangle are respectively P01(825.21531441389641 ,- 990.52596332476355)、P02(784.64383219137676, -1000.1580559331973), P03 (856.72190907596212, -1044.0512871897263).
Step 24:Camouflaged target is reduced, and P can be obtained according to formula (9)0Point coordinates (813.91989999999987 ,- 1033.2102999999997)。
Step 25:By the coordinate points P after reduction0P is decorateeed instead of puppet01、P02、P03It is added in vector data R'.
Step 26:Repeat step 22-25, complete often also original place according to the pseudo- backward for decorateeing generation during camouflage successively Reason.

Claims (2)

1. a kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method, it is characterised in that specific steps are such as Under:
(1) vertex type GIS vector data camouflage process
Step 11:A width point figure layer map vector is loaded, and inputs camouflage radius factor c, c ∈ (0,1);
Step 12:Concerning security matters point set P={ P are selected from original point figure layer data Ri| i=1,2 ..., m }, m is the number of concerning security matters point; For each concerning security matters point P in point set Pi, circulate perform step 13 to step 17 successively;
Step 13:It is determined that current concerning security matters point PiIntend the interior angle of generation camouflage trianglei1、αi2、αi3,
(a) using recurrence growth method current point figure layer data are generated with the triangle net collective T of TIN data formats, from set T time Go through and include current concerning security matters point PiTriangle sets T'={ Tj' | j=1,2 ..., n }, wherein T' ∈ T, n are to include PiTriangle The number of shape;
(b) to three interior angles of set T' intermediate cam shapesi1、αi2、αi3Sorted from small to large, and it is angularly suitable from small to large Sequence is stored in set A1, A2, A3 successively, wherein A1={ A1j| j=1,2 ..., n }, A2={ A2j| j=1,2 ..., n }, A3 ={ A3j| j=1,2 ..., n }, wherein n is the number of triangle;
(c) three interior angles for pretending triangle can be obtained by set A1, A2, A3 being averaged respectively based on formula (1)i1、 αi2、αi3
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mfrac> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>n</mi> </munderover> <mi>A</mi> <msub> <mn>1</mn> <mi>j</mi> </msub> </mrow> <mi>n</mi> </mfrac> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mfrac> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>n</mi> </munderover> <mi>A</mi> <msub> <mn>2</mn> <mi>j</mi> </msub> </mrow> <mi>n</mi> </mfrac> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mfrac> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>n</mi> </munderover> <mi>A</mi> <msub> <mn>3</mn> <mi>j</mi> </msub> </mrow> <mi>n</mi> </mfrac> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow>
Step 14:It is determined that current concerning security matters point PiCamouflage radius ri',
(a) the interior angle ratio for the camouflage triangle for intending generation is calculated according to formula (2), is designated as 1:f:G, wherein g>f>1,
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mi>f</mi> <mo>=</mo> <mfrac> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> </mfrac> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mi>g</mi> <mo>=</mo> <mfrac> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <msub> <mi>&amp;alpha;</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> </mfrac> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </mrow>
(b) it is respectively P to set three points for intending pretending generationi1、Pi2、Pi3, the Thiessen polygon of current concerning security matters point is designated as ABCDEF, The camouflage center of circle is o, and maximum camouflage radius is r, PiWith other original points PjMinimum range be RR, j ≠ i, Pi1Pi2Distance is maximum Value is designated as L, Pi1Point and PiMinimum range be designated as Li;According to the structure of TIN rule, ensuring that intending puppet decorates On the premise of same triangle, the maximum camouflage radius r of current concerning security matters point is obtained based on formula (3)i
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mi>L</mi> <mo>=</mo> <mn>2</mn> <mo>*</mo> <mi>s</mi> <mi>i</mi> <mi>n</mi> <mrow> <mo>(</mo> <mfrac> <mrow> <mi>&amp;pi;</mi> <mi>g</mi> </mrow> <mrow> <mn>1</mn> <mo>+</mo> <mi>f</mi> <mo>+</mo> <mi>g</mi> </mrow> </mfrac> <mo>)</mo> </mrow> <msub> <mi>r</mi> <mi>i</mi> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mi>R</mi> <mi>R</mi> <mo>=</mo> <mi>M</mi> <mi>I</mi> <mi>N</mi> <mrow> <mo>(</mo> <mo>|</mo> <mrow> <msub> <mi>P</mi> <mi>j</mi> </msub> <msub> <mi>P</mi> <mi>i</mi> </msub> </mrow> <mo>|</mo> <mo>)</mo> </mrow> <mo>,</mo> <mrow> <mo>(</mo> <mi>j</mi> <mo>&amp;NotEqual;</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>L</mi> <mi>i</mi> </msub> <mo>=</mo> <mi>R</mi> <mi>R</mi> <mo>-</mo> <msub> <mi>r</mi> <mi>i</mi> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>r</mi> <mi>i</mi> </msub> <mo>&lt;</mo> <mfrac> <mrow> <mi>R</mi> <mi>R</mi> </mrow> <mrow> <mn>2</mn> <mo>*</mo> <mi>sin</mi> <mrow> <mo>(</mo> <mfrac> <mrow> <mi>&amp;pi;</mi> <mi>g</mi> </mrow> <mrow> <mn>1</mn> <mo>+</mo> <mi>f</mi> <mo>+</mo> <mi>g</mi> </mrow> </mfrac> <mo>)</mo> </mrow> <mo>+</mo> <mn>1</mn> </mrow> </mfrac> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> </mrow>
(c) the camouflage radius r of current concerning security matters point is calculated according to formula (4)i', wherein, c is camouflage radius factor:
ri'=c*ri,c∈(0,1) (4)
Step 15:Intend the calculating of camouflage point coordinates value, current concerning security matters point PiCoordinate is designated as (xi,yi),
(a) central angle corresponding to each side of camouflage triangle is designated as β successively according to order from small to large1、β2、β3, calculation formula is such as (5) shown in:
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>&amp;beta;</mi> <mn>1</mn> </msub> <mo>=</mo> <mfrac> <mrow> <mn>2</mn> <mi>&amp;pi;</mi> </mrow> <mrow> <mn>1</mn> <mo>+</mo> <mi>f</mi> <mo>+</mo> <mi>g</mi> </mrow> </mfrac> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>&amp;beta;</mi> <mn>2</mn> </msub> <mo>=</mo> <mfrac> <mrow> <mn>2</mn> <mi>&amp;pi;</mi> <mi>f</mi> </mrow> <mrow> <mn>1</mn> <mo>+</mo> <mi>f</mi> <mo>+</mo> <mi>g</mi> </mrow> </mfrac> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>&amp;beta;</mi> <mn>3</mn> </msub> <mo>=</mo> <mfrac> <mrow> <mn>2</mn> <mi>&amp;pi;</mi> <mi>g</mi> </mrow> <mrow> <mo>(</mo> <mn>1</mn> <mo>+</mo> <mi>f</mi> <mo>+</mo> <mi>g</mi> <mo>)</mo> </mrow> </mfrac> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </mrow>
(b) first puppet is decorateeed:Arbitrarily taken on camouflage circle and a little decorate P as first puppeti1(xi1, yi1), such as formula (6) It is shown:
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <mi>r</mi> <mi>a</mi> <mi>n</mi> <mi>d</mi> <mi>o</mi> <mi>m</mi> <mo>&amp;lsqb;</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>-</mo> <msup> <msub> <mi>r</mi> <mi>i</mi> </msub> <mo>&amp;prime;</mo> </msup> <mo>,</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>+</mo> <msup> <msub> <mi>r</mi> <mi>i</mi> </msub> <mo>&amp;prime;</mo> </msup> <mo>&amp;rsqb;</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>=</mo> <msub> <mi>y</mi> <mi>i</mi> </msub> <mo>&amp;PlusMinus;</mo> <msqrt> <mrow> <msup> <msub> <mi>r</mi> <mi>i</mi> </msub> <mrow> <mo>&amp;prime;</mo> <mn>2</mn> </mrow> </msup> <mo>-</mo> <msup> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mn>2</mn> </msup> </mrow> </msqrt> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>6</mn> <mo>)</mo> </mrow> </mrow>
(c) second puppet decorates Pi2(xi2, yi2), it is assumed that Pi2With Pi1Central angle corresponding to the chord length of formation is β1, based on Pi1By suitable Clockwise rotation β1, Pi2Coordinate calculation formula such as shown in (7):
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>cos&amp;beta;</mi> <mn>1</mn> </msub> <mo>-</mo> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>sin&amp;beta;</mi> <mn>1</mn> </msub> <mo>+</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>=</mo> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>cos&amp;beta;</mi> <mn>1</mn> </msub> <mo>+</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>sin&amp;beta;</mi> <mn>1</mn> </msub> <mo>+</mo> <msub> <mi>y</mi> <mi>i</mi> </msub> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>7</mn> <mo>)</mo> </mrow> </mrow>
(d) the 3rd puppet decorates Pi3(xi3, yi3):It is according to the structure rule of the TIN triangulation networks and the interior angle ratio for pretending triangle 1:f:Two conditions of g the 3rd puppet of traversal on camouflage circle is decorateeed, and can find the 3rd puppet according to counter clockwise direction decorates, and counts Formula is calculated such as shown in (8):
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>cos&amp;beta;</mi> <mn>2</mn> </msub> <mo>+</mo> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>sin&amp;beta;</mi> <mn>2</mn> </msub> <mo>+</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>=</mo> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>cos&amp;beta;</mi> <mn>2</mn> </msub> <mo>-</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <msub> <mi>sin&amp;beta;</mi> <mn>2</mn> </msub> <mo>+</mo> <msub> <mi>y</mi> <mi>i</mi> </msub> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>8</mn> <mo>)</mo> </mrow> </mrow>
Step 16:Three puppets of generation are decorateeed into Pi1、Pi2、Pi3Substitute current concerning security matters point PiUpdate in original point figure layer data R;
Step 17:By current concerning security matters point PiCamouflage radius ri' it is the key information k generated after enciphering transformationiIt is added to key text In part KeyFile;
Step 18:Repeat step 13, until realizing the processing of the camouflage to each concerning security matters point key element, is preserved after pretending to step 17 Data file is R';
(2) it is directed to vertex type GIS vector data reduction process
Step 21:The data file R' after camouflage is opened, opens key file KeyFile;For each concerning security matters point PiAlso Original, successively circulation perform step 22 to step 26:
Step 22:The triangulation network of TIN data formats is built according to recurrence growth method to the vector point diagram layer data after current camouflage Set T;
Step 23:To pretending triangle SiIdentification, the triangle formed by three points after pretending in triangle net collective T is referred to as Pretend triangle;
(a) current i-th group key k in key file KeyFile is readi, current camouflage triangle S is can obtain after decryption reductioni's Circumradius ri';
(b) its circumscribed circle center of circle O is asked to each triangle in set TiCoordinate (xi,yi), remember each Atria apex coordinate Respectively Pi1(xi1,yi1),Pi2(xi2,yi2),Pi3(xi3,yi3), calculation formula is such as shown in (9);In known circumscribed circle center of circle OiSit On the basis of target, circumradius r is calculated according to formula (10)i
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>=</mo> <mfrac> <mrow> <mo>(</mo> <msup> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>-</mo> <msup> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>+</mo> <msup> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>-</mo> <msup> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>)</mo> <mo>*</mo> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>)</mo> <mo>-</mo> <mo>(</mo> <msup> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>-</mo> <msup> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>+</mo> <msup> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>-</mo> <msup> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>)</mo> <mo>*</mo> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>)</mo> </mrow> <mrow> <mn>2</mn> <mo>*</mo> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>*</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>-</mo> <mn>2</mn> <mo>*</mo> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>*</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </mfrac> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>y</mi> <mi>i</mi> </msub> <mo>=</mo> <mfrac> <mrow> <mo>(</mo> <msup> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>-</mo> <msup> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>+</mo> <msup> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>-</mo> <msup> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>)</mo> <mo>*</mo> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>)</mo> <mo>-</mo> <mo>(</mo> <msup> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>-</mo> <msup> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>+</mo> <msup> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>-</mo> <msup> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mn>2</mn> </msup> <mo>)</mo> <mo>*</mo> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>)</mo> </mrow> <mrow> <mn>2</mn> <mo>*</mo> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>*</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>-</mo> <mn>2</mn> <mo>*</mo> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>3</mn> </mrow> </msub> <mo>)</mo> </mrow> <mo>*</mo> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>2</mn> </mrow> </msub> <mo>)</mo> </mrow> </mrow> </mfrac> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>9</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <msub> <mi>r</mi> <mi>i</mi> </msub> <mo>=</mo> <msqrt> <mrow> <msup> <mrow> <mo>(</mo> <msub> <mi>x</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>x</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mo>+</mo> <msup> <mrow> <mo>(</mo> <msub> <mi>y</mi> <mrow> <mi>i</mi> <mn>1</mn> </mrow> </msub> <mo>-</mo> <msub> <mi>y</mi> <mi>i</mi> </msub> <mo>)</mo> </mrow> <mn>2</mn> </msup> </mrow> </msqrt> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>10</mn> <mo>)</mo> </mrow> </mrow>
(c) each triangle in T is traveled through, searches its circumradius riWith ri' equal all triangles, it is designated as set A= {Ai| i=1,2 ..., n }, wherein n is the triangle number for meeting the condition;
If (d) n is 1, then the triangle is camouflage triangle Si, three summits of the triangle are that puppet is decorateeed;If n More than 1, then step (e) is transferred to;
(e) triangle S is pretended than further screening according to interior anglei
Step 24:Camouflaged target reduces, and travels through obtained camouflage triangle SiThree summit point coordinates be respectively Pi1、Pi2、Pi3, Original concerning security matters point coordinates P can be calculated by formula (9)i(xi,yi);
Step 25:By the original concerning security matters point coordinates P after reductioniSubstitute puppet and decorate Pi1、Pi2、Pi3Update vector data file R' In;
Step 26:Repeat step 22-25, it is sequentially completed the reduction treatment of each concerning security matters point.
2. a kind of concerning security matters point-like geographic element camouflage deposited based on information point according to claim 1 and restoring method, its It is characterised by, in step 23 (e), triangle S is pretended in further screeningiDetailed process it is as follows:To current triangle AiFollow successively Ring performs following operate:
(i) current triangle A is calculated respectivelyiThree interior angles, and be designated as α respectively according to order from small to largei1、αi2、αi3
(ii) ephemeral data R is createdtmp, and data file R' is assigned to data Rtmp
(iii) by current triangle AiCorresponding circumscribed circle center of circle OiInstead of three vertex updates of the triangle to ephemeral data RtmpIn, regenerate the triangle net collective T' of TIN data formats;
(iV) traversal includes O in set T'iTriangle sets B={ the B of pointi| i=1,2 ..., m }, m is to include OiThe three of point Angular number;Try to achieve average internal angle value according to the rule of the step 13 for all triangles in set B, and by from it is small to Big order is designated as β successively1、β2、β3
(V) if interior angle average value β1、β2、β3With αi1、αi2、αi3It is equal respectively, then current triangle AiTo pretend triangle; If interior angle average value β1、β2、β3With αi1、αi2、αi3, circulation performs step (i) to (V), eligible until traversing Camouflage triangle.
CN201510038934.9A 2015-01-26 2015-01-26 A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method Expired - Fee Related CN104599224B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510038934.9A CN104599224B (en) 2015-01-26 2015-01-26 A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510038934.9A CN104599224B (en) 2015-01-26 2015-01-26 A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method

Publications (2)

Publication Number Publication Date
CN104599224A CN104599224A (en) 2015-05-06
CN104599224B true CN104599224B (en) 2017-12-15

Family

ID=53124976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510038934.9A Expired - Fee Related CN104599224B (en) 2015-01-26 2015-01-26 A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method

Country Status (1)

Country Link
CN (1) CN104599224B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112749241A (en) * 2020-07-28 2021-05-04 广西华蓝岩土工程有限公司 Secret-related land parcel map boundary point geodetic coordinate decryption processing method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254093A (en) * 2011-06-24 2011-11-23 天津大学 Connected domain statistical correlation algorithm based on Thiessen polygon
CN102651059A (en) * 2012-04-01 2012-08-29 洛阳理工学院 Method for certificating GIS (Geographic Information System) vector data copyright based on multi-element spatial feature
CN103077211A (en) * 2012-12-28 2013-05-01 南京师范大学 Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120233210A1 (en) * 2011-03-12 2012-09-13 Matthew Thomas Bogosian Storage of Arbitrary Points in N-Space and Retrieval of Subset thereof Based on Criteria Including Maximum Distance to an Arbitrary Reference Point

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102254093A (en) * 2011-06-24 2011-11-23 天津大学 Connected domain statistical correlation algorithm based on Thiessen polygon
CN102651059A (en) * 2012-04-01 2012-08-29 洛阳理工学院 Method for certificating GIS (Geographic Information System) vector data copyright based on multi-element spatial feature
CN103077211A (en) * 2012-12-28 2013-05-01 南京师范大学 Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data

Also Published As

Publication number Publication date
CN104599224A (en) 2015-05-06

Similar Documents

Publication Publication Date Title
CN108536851B (en) User identity recognition method based on moving track similarity comparison
CN104601596B (en) Data-privacy guard method in a kind of Classification Data Mining system
CN104123503B (en) CNF formula data protection method in SAT problem solving outsourcing process
CN109472155B (en) Differential privacy space data publishing method in space crowdsourcing
CN104599224B (en) A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method
CN108471382A (en) A kind of complex network clustering algorithm attack method based on node angle value
He et al. Differentially private tripartite intelligent matching against inference attacks in ride-sharing services
CN114372516A (en) XGboost-based federal learning training and prediction method and device
CN106507347A (en) A kind of key generation method for protecting wireless sensor network security
Yan et al. Multi-participant vertical federated learning based time series prediction
CN106685893B (en) A kind of authority control method based on social networks group
CN102799837A (en) Line and surface type global information system (GIS) vector data disguise and reduction method based on interpolation prediction
CN109962813A (en) A kind of network structure generation method for network structure secret protection
CN104751399B (en) A kind of concerning security matters wire geographic element camouflage deposited based on information point and restoring method
Zhao et al. A semantic-based dummy generation strategy for location privacy
Fan et al. Privacy preserving ultra-short-term wind power prediction based on secure multi party computation
Chang et al. Adaptive and blind regression for mobile crowd sensing
Zhang et al. Access Control Model Based on the Privacy of Crowdsourcing Task Content Protection in the Blockchain Environment
CN113761555B (en) Safe and reliable vehicle networking space crowdsourcing task matching method based on intelligent contracts
CN114884688B (en) Federal anomaly detection method across multi-attribute networks
Xie et al. Federated Learning With Personalized Differential Privacy Combining Client Selection
Deng et al. GraphFed: A Personalized Subgraph Federated Learning Framework for Non-IID Graphs
CN113255884B (en) Network abnormal traffic identification and classification method based on collaborative learning
CN107564289A (en) A kind of road network preprocess method for merging transport node
Liang et al. Shape-unconstrained privacy-preserving range query for fog computing supported vehicular networks using image

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20171215

Termination date: 20210126