CN104599224B - A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method - Google Patents
A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method Download PDFInfo
- Publication number
- CN104599224B CN104599224B CN201510038934.9A CN201510038934A CN104599224B CN 104599224 B CN104599224 B CN 104599224B CN 201510038934 A CN201510038934 A CN 201510038934A CN 104599224 B CN104599224 B CN 104599224B
- Authority
- CN
- China
- Prior art keywords
- mrow
- msub
- msup
- mtr
- mtd
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
The invention discloses a kind of vertex type GIS vector data camouflage deposited based on information point and restoring method, including following process:(1) for vertex type GIS vector data camouflage process, including the steps such as the determination of scope, the pseudo- generation decorateeed are pretended;(2) it is directed to vertex type GIS vector data reduction process, including the process such as the identifying of camouflaged target, pseudo- reduction decorateeed.The method of the present invention has higher disguise and not by the advantage of capacity limit, new approaches are provided for the information disguising of vector geographic data, security of the effective guarantee secret point data in data transfer, Communication hiding on the basis of secret information existence is hidden.
Description
Technical field
The invention belongs to field of geographic information safety, and in particular to a kind of to deposit technology progress vertex type based on information point
GIS vector data pretends the method with reduction.
Background technology
The security protection of geography information is related to national security and social benefit, is the current country for being badly in need of solving and society's weight
Big needs of problems.On the basis of being hidden to the secret GIS vector data information content, the presence of secret information is further hidden,
It is the emphasis of current geographic information security study and application.
At present, the information point technology of depositing is mainly used in image domains, and image point, which is deposited, to be meant that image information being divided into tool
There are the n width images of certain visual effect, if it is known that the m (m in image information<N) width subgraph, then the image can obtain extensive
Multiple, if image is less than m width, image can not be restored.Use for reference to divide and deposit application of the technology in image domains, technology is deposited by point
Vector geographic data information disguising is applied to, complete vector geographic data is stored to multiple points using certain method point
Pretended in scattered vector geographic data, make the still meaningful vector geographic data of the data after camouflage.With it is existing
Camouflage method is compared, and has both been taken into account the concealed advantage of precision crippled mode, turn avoid scrambled fashion and easily cause attacker
Pay attention to and the defects of carrier Stealth Modus is to the high request of capacity.
The content of the invention
It is an object of the invention to:Camouflage is deposited based on information point, proposed a kind of for concerning security matters in GIS point diagram layer datas
The camouflage of point-like geographic element and restoring method, can safety of the effective guarantee concerning security matters point data in data transfer, Communication hiding
Property.
To achieve these goals, the technical scheme that the present invention takes mainly includes:
A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method, are comprised the following steps that:
(1) vertex type GIS vector data camouflage process
Step 11:A width point figure layer map vector is loaded, and inputs camouflage radius factor c, c ∈ (0,1);
Step 12:Concerning security matters point set P={ P are selected from original point figure layer data Ri| i=1,2 ..., m }, m is concerning security matters point
Number;For each concerning security matters point P in point set Pi, circulate perform step 13 to step 17 successively;
Step 13:It is determined that current concerning security matters point PiIntend the interior angle of generation camouflage trianglei1、αi2、αi3,
(a) using recurrence growth method current point figure layer data are generated with the triangle net collective T of TIN data formats, from set T
Middle traversal includes current concerning security matters point PiTriangle sets T'={ Tj' | j=1,2 ..., n }, wherein T' ∈ T, n are to include Pi's
The number of triangle;
(b) to three interior angles of set T' intermediate cam shapesi1、αi2、αi3Sorted from small to large, and angularly from it is small to
Big order is stored in set A1, A2, A3 successively, wherein A1={ A1j| j=1,2 ..., n }, A2={ A2j| j=1,2 ...,
N }, A3={ A3j| j=1,2 ..., n }, wherein n is the number of triangle;
(c) three interior angles for pretending triangle can be obtained by set A1, A2, A3 being averaged respectively based on formula (1)
αi1、αi2、αi3:
Step 14:It is determined that current concerning security matters point PiCamouflage radius ri',
(a) the interior angle ratio for the camouflage triangle for intending generation is calculated according to formula (2), is designated as 1:m:N, wherein n>m>1,
(b) it is respectively P to set three points for intending pretending generationi1、Pi2、Pi3, the Thiessen polygon of current concerning security matters point is designated as
ABCDEF, the camouflage center of circle are o, and maximum camouflage radius is r, PiWith other original points PjMinimum range be R, j ≠ i, Pi1Pi2Away from
L, P are designated as from maximumi1Point and PiMinimum range be designated as li;According to the structure of TIN rule, ensuring to intend puppet
Decorate on the premise of same triangle, the maximum camouflage radius r of current concerning security matters point is obtained based on formula (3)i:
(c) the camouflage radius r of current concerning security matters point is calculated according to formula (4)i', wherein, c is customer parameter:
ri'=c*ri,c∈(0,1) (4)
Step 15:Intend the calculating of camouflage point coordinates value, current concerning security matters point PiCoordinate is designated as (xi,yi),
(a) central angle corresponding to each side of camouflage triangle is designated as β successively according to order from small to large1、β2、β3, calculate public
Formula is such as shown in (5):
(b) first puppet is decorateeed:Arbitrarily taken on camouflage circle and a little decorate P as first puppeti1(xi1, yi1), such as formula
(6) shown in:
(c) second puppet decorates Pi2(xi2, yi2), it is assumed that Pi2With Pi1Central angle corresponding to the chord length of formation is β1, it is based on
Pi1Rotation β in the direction of the clock1, Pi2Coordinate calculation formula such as shown in (7):
(d) the 3rd puppet decorates Pi3(xi3, yi3):According to the structure rule of the TIN triangulation networks and the interior angle of camouflage triangle
Than for 1:m:Two conditions of n the 3rd puppet of traversal on camouflage circle is decorateeed, and the 3rd camouflage can be found according to counter clockwise direction
Point, calculation formula is such as shown in (8):
Step 16:Three puppets of generation are decorateeed into Pi1、Pi2、Pi3Substitute current concerning security matters point PiUpdate original point figure layer number
According in R;
Step 17:By current concerning security matters point PiCamouflage radius ri' it is the key information k generated after enciphering transformationiIt is added to close
In key file KeyFile;
Step 18:Repeat step 13, until realizing the processing of the camouflage to each concerning security matters point key element, preserves camouflage to step 17
Data file afterwards is R';
(2) it is directed to vertex type GIS vector data reduction process
Step 21:The data file R' after camouflage is opened, opens key file KeyFile;For each concerning security matters point Pi
Reduction, circulation successively performs step 22 to step 26:
Step 22:The three of TIN data formats is built according to recurrence growth method to the vector point diagram layer data after current camouflage
Angle net collective T;
Step 23:To pretending triangle SiIdentification, the triangle formed by three points after pretending in triangle net collective T
Referred to as pretend triangle;
(a) current i-th group key k in key file KeyFile is readi, current camouflage triangle is can obtain after decryption reduction
Shape SiCircumradius ri';
(b) its circumscribed circle center of circle O is asked to each triangle in set TiCoordinate (xi,yi), remember each Atria summit
Coordinate is respectively Pi1(xi1,yi1),Pi2(xi2,yi2),Pi3(xi3,yi3), calculation formula is such as shown in (9);In the known circumscribed circle center of circle
OiOn the basis of coordinate, circumradius r is calculated according to formula (10)i:
(c) each triangle in T is traveled through, searches its circumradius riWith ri' equal all triangles, it is designated as collecting
Close A={ Ai| i=1,2 ..., n }, wherein n is the triangle number for meeting the condition;
If (d) n is 1, then the triangle is camouflage triangle Si, three summits of the triangle are that puppet is decorateeed;
If n is more than 1, step (e) is transferred to;
(e) triangle S is pretended than further screening according to interior anglei;To current triangle AiCirculation performs following grasp successively
Make:
(i) current triangle A is calculated respectivelyiThree interior angles, and be designated as α respectively according to order from small to largei1、
αi2、αi3;
(ii) ephemeral data R is createdtmp, and data file R' is assigned to data Rtmp;
(iii) by current triangle AiCorresponding circumscribed circle center of circle OiInstead of three vertex updates of the triangle to temporarily
Data RtmpIn, regenerate the triangle net collective T' of TIN data formats;
(iV) traversal includes O in set T'iTriangle sets B={ the B of pointi| i=1,2 ..., m }, m is to include OiPoint
Triangle number;Try to achieve average internal angle value according to the rule of the step 13 for all triangles in set B, and by from
It is small to be designated as β successively to big order1、β2、β3;
(V) if interior angle average value β1、β2、β3With αi1、αi2、αi3It is equal respectively, then current triangle AiFor camouflage three
It is angular;If interior angle average value β1、β2、β3With αi1、αi2、αi3, circulate and perform step (i) to (V), meet until traversing
The camouflage triangle of condition;
Step 24:Camouflaged target reduces, and travels through obtained camouflage triangle SiThree summit point coordinates be respectively Pi1、
Pi2、Pi3, original concerning security matters point coordinates P can be calculated by formula (9)i(xi,yi);
Step 25:By the original concerning security matters point coordinates P after reductioniSubstitute puppet and decorate Pi1、Pi2、Pi3Update vector data text
In part R';
Step 26:Repeat step 22-25, it is sequentially completed the reduction treatment of each concerning security matters point.
For in the above-mentioned vertex type GIS vector data camouflage method deposited based on information point, being decorateeed calculating second puppet
When, in theory based on Pi1Rotation β counterclockwise1It is equally applicable, but according to the structure rule of the TIN triangulation networks and camouflage
Three interior angle ratios of triangle are 1:m:N, travel through less than the 3rd puppet and decorate.Therefore decorate can only be according to clockwise for second puppet
Direction calculating.
The present invention deposits technology using information point, is counted by the way that each concerning security matters point element information minute is stored into multiple vectorial geographicals
In, reach the effect of camouflage.This method morphologically keeps complete by the triangulation network after making camouflage with the original triangulation network
Office's uniformity, reduces the notice of attacker, improves the disguise of camouflage, and can avoid embedding capacity in conventional camouflage
The problem of too low, it can meet that the communication of GIS vector data is hidden and safe transmission demand to a certain extent.The method of the present invention
With higher disguise and not by the advantage of capacity limit, new approaches are provided for the information disguising of vector geographic data,
Security of the effective guarantee secret point data in data transfer, Communication hiding on the basis of hiding secret information existence.
Brief description of the drawings
Fig. 1 is the flow chart of the inventive method, and (a) is camouflage flow chart, and (b) is reduction flow chart;
Fig. 2 is the camouflage scope schematic diagram of the inventive method;
Fig. 3 is that three puppets of the inventive method decorate schematic diagram, and (a) is that second puppet decorates schematic diagram, and (b) is the 3rd
Puppet decorates schematic diagram, and (c) is that three puppets decorate schematic diagram.
Fig. 4 is initial data of the present invention and Camouflaged data TIN comparison diagram, and (a) is that the initial data triangulation network shows
It is intended to, the point of wherein overstriking is decorateeed for puppet, and (b) is data triangulation network schematic diagram after camouflage, and the wherein point of overstriking is concerning security matters point,
Point on circle is decorateeed for three puppets.
Fig. 5 is initial data of the present invention and Camouflaged data comparison diagram, and the point of (a) initial data schematic diagram, wherein overstriking is
Original concerning security matters point, (b) are schematic diagram data after camouflage, and the wherein point of overstriking is decorateeed for the puppet of generation.
Embodiment
The present embodiment select shp form vector datas, for the reading of data, camouflage, reduction whole process, further
Describe the present invention in detail.It is experimental data that this example, which selects certain simulation concerning security matters point shp data,.
(1) process is pretended
Step 11:Loading simulation concerning security matters point shp data, and c=0.5 is inputted as initial key parameter.
Step 12:Select concerning security matters point set P={ (813.91989999999987, -1033.2102999999997) }.
Step 13:It is determined that current concerning security matters point intends the interior angle of generation camouflage trianglei1、αi2、αi3。
(a) current point figure layer data are generated with triangulation network T, there are 4 triangles to include concerning security matters point in set T;
(b) three interior angles of set T ' intermediate cam shapes are sorted from small to large, and angularly from small to large order according to
It is secondary to be stored in A1, A2, A3, wherein A1=24.336498184787121,13.579427824944508,
18.623653496634297,56.170816586114064, A2=55.463665017116085,
19.117895793786708,46.434232690564436,57.765929283815957, A3=
{100.1998367980968,147.30267638126884,114.94211381280124,66.063254130069978};
(c) based on formula (1), to A1, A2, A3, averaging can obtain three interior angle a of camouflage triangle respectively1=
28.177599023119996 a2=44.6954306963208, a3=107.12697028055921.
Step 14:It is determined that current concerning security matters point PiActual camouflage radius ri1。
(a) the interior angle ratio for the camouflage triangle for intending generation is calculated according to formula (2), is 1:1.5862043696358856:
3.801848773298977。
(b) as shown in Fig. 2 obtaining the maximum camouflage radius r of current concerning security matters point based on formula (3)1=
88.307168093798111。
(c) the actual camouflage radius r of current concerning security matters point is calculated according to formula (4)11=44.153584046899056.
Step 15:Intend the calculating of camouflage point coordinates value.
A) (a) according to formula (5) calculate central angle can obtain 28.177599023119996,44.6954306963208,
107.12697028055921。
(b) first puppet is decorateeed:According to formula (6), a point P is arbitrarily taken on camouflage circle11=
(825.21531441389641, -990.52596332476355).
(c) second puppet is decorateeed:It can be obtained according to calculation formula (7).P12=(784.64383219137676 ,-
1000.1580559331973)。
(d) the 3rd puppet is decorateeed:P can be obtained according to calculation formula (8)13=(856.72190907596212 ,-
1044.0512871897263)。
Step 16:Three puppets of generation are decorateeed into P11、P12、P13Instead of current concerning security matters point PiIt is stored in original point figure layer data R
In.
Step 17:The result that current puppet is decorateeed after triangle camouflage radius of circle conversion is added to key file KeyFile
In.
Step 18:Repeat step 13, until realizing the processing of the camouflage to each concerning security matters point key element, preserves camouflage to step 18
Data file afterwards is R'.
(2) reduction process
Step 21:The vector data R' after camouflage is opened, opens key file KeyFile.
Step 22:TIN data formats are built according to recurrence growth method to the vector point diagram layer data R' after current camouflage
Triangulation network T.
Step 23:The identification of camouflaged target,
(a) current key in key file KeyFile is read, the external of current camouflage triangle is can obtain after decryption reduction
Radius of circle 44.153584046899056.
(b) its circumscribed circle central coordinate of circle is asked to each triangle in T.
(c) the triangle number that the radius of the T intermediate cam shape circumscribed circles traversed is equal with current key radius is 1, should
Triangle is to pretend triangle.
(d) three apex coordinates for reading camouflage triangle are respectively P01(825.21531441389641 ,-
990.52596332476355)、P02(784.64383219137676, -1000.1580559331973), P03
(856.72190907596212, -1044.0512871897263).
Step 24:Camouflaged target is reduced, and P can be obtained according to formula (9)0Point coordinates (813.91989999999987 ,-
1033.2102999999997)。
Step 25:By the coordinate points P after reduction0P is decorateeed instead of puppet01、P02、P03It is added in vector data R'.
Step 26:Repeat step 22-25, complete often also original place according to the pseudo- backward for decorateeing generation during camouflage successively
Reason.
Claims (2)
1. a kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method, it is characterised in that specific steps are such as
Under:
(1) vertex type GIS vector data camouflage process
Step 11:A width point figure layer map vector is loaded, and inputs camouflage radius factor c, c ∈ (0,1);
Step 12:Concerning security matters point set P={ P are selected from original point figure layer data Ri| i=1,2 ..., m }, m is the number of concerning security matters point;
For each concerning security matters point P in point set Pi, circulate perform step 13 to step 17 successively;
Step 13:It is determined that current concerning security matters point PiIntend the interior angle of generation camouflage trianglei1、αi2、αi3,
(a) using recurrence growth method current point figure layer data are generated with the triangle net collective T of TIN data formats, from set T time
Go through and include current concerning security matters point PiTriangle sets T'={ Tj' | j=1,2 ..., n }, wherein T' ∈ T, n are to include PiTriangle
The number of shape;
(b) to three interior angles of set T' intermediate cam shapesi1、αi2、αi3Sorted from small to large, and it is angularly suitable from small to large
Sequence is stored in set A1, A2, A3 successively, wherein A1={ A1j| j=1,2 ..., n }, A2={ A2j| j=1,2 ..., n }, A3
={ A3j| j=1,2 ..., n }, wherein n is the number of triangle;
(c) three interior angles for pretending triangle can be obtained by set A1, A2, A3 being averaged respectively based on formula (1)i1、
αi2、αi3:
<mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>n</mi>
</munderover>
<mi>A</mi>
<msub>
<mn>1</mn>
<mi>j</mi>
</msub>
</mrow>
<mi>n</mi>
</mfrac>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>n</mi>
</munderover>
<mi>A</mi>
<msub>
<mn>2</mn>
<mi>j</mi>
</msub>
</mrow>
<mi>n</mi>
</mfrac>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>j</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>n</mi>
</munderover>
<mi>A</mi>
<msub>
<mn>3</mn>
<mi>j</mi>
</msub>
</mrow>
<mi>n</mi>
</mfrac>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>1</mn>
<mo>)</mo>
</mrow>
</mrow>
Step 14:It is determined that current concerning security matters point PiCamouflage radius ri',
(a) the interior angle ratio for the camouflage triangle for intending generation is calculated according to formula (2), is designated as 1:f:G, wherein g>f>1,
<mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<mi>f</mi>
<mo>=</mo>
<mfrac>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
</mfrac>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<mi>g</mi>
<mo>=</mo>
<mfrac>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<msub>
<mi>&alpha;</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
</mfrac>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>2</mn>
<mo>)</mo>
</mrow>
</mrow>
(b) it is respectively P to set three points for intending pretending generationi1、Pi2、Pi3, the Thiessen polygon of current concerning security matters point is designated as ABCDEF,
The camouflage center of circle is o, and maximum camouflage radius is r, PiWith other original points PjMinimum range be RR, j ≠ i, Pi1Pi2Distance is maximum
Value is designated as L, Pi1Point and PiMinimum range be designated as Li;According to the structure of TIN rule, ensuring that intending puppet decorates
On the premise of same triangle, the maximum camouflage radius r of current concerning security matters point is obtained based on formula (3)i:
<mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<mi>L</mi>
<mo>=</mo>
<mn>2</mn>
<mo>*</mo>
<mi>s</mi>
<mi>i</mi>
<mi>n</mi>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<mi>&pi;</mi>
<mi>g</mi>
</mrow>
<mrow>
<mn>1</mn>
<mo>+</mo>
<mi>f</mi>
<mo>+</mo>
<mi>g</mi>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
<msub>
<mi>r</mi>
<mi>i</mi>
</msub>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<mi>R</mi>
<mi>R</mi>
<mo>=</mo>
<mi>M</mi>
<mi>I</mi>
<mi>N</mi>
<mrow>
<mo>(</mo>
<mo>|</mo>
<mrow>
<msub>
<mi>P</mi>
<mi>j</mi>
</msub>
<msub>
<mi>P</mi>
<mi>i</mi>
</msub>
</mrow>
<mo>|</mo>
<mo>)</mo>
</mrow>
<mo>,</mo>
<mrow>
<mo>(</mo>
<mi>j</mi>
<mo>&NotEqual;</mo>
<mi>i</mi>
<mo>)</mo>
</mrow>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>L</mi>
<mi>i</mi>
</msub>
<mo>=</mo>
<mi>R</mi>
<mi>R</mi>
<mo>-</mo>
<msub>
<mi>r</mi>
<mi>i</mi>
</msub>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>r</mi>
<mi>i</mi>
</msub>
<mo><</mo>
<mfrac>
<mrow>
<mi>R</mi>
<mi>R</mi>
</mrow>
<mrow>
<mn>2</mn>
<mo>*</mo>
<mi>sin</mi>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<mi>&pi;</mi>
<mi>g</mi>
</mrow>
<mrow>
<mn>1</mn>
<mo>+</mo>
<mi>f</mi>
<mo>+</mo>
<mi>g</mi>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
<mo>+</mo>
<mn>1</mn>
</mrow>
</mfrac>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>3</mn>
<mo>)</mo>
</mrow>
</mrow>
(c) the camouflage radius r of current concerning security matters point is calculated according to formula (4)i', wherein, c is camouflage radius factor:
ri'=c*ri,c∈(0,1) (4)
Step 15:Intend the calculating of camouflage point coordinates value, current concerning security matters point PiCoordinate is designated as (xi,yi),
(a) central angle corresponding to each side of camouflage triangle is designated as β successively according to order from small to large1、β2、β3, calculation formula is such as
(5) shown in:
<mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msub>
<mi>&beta;</mi>
<mn>1</mn>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<mn>2</mn>
<mi>&pi;</mi>
</mrow>
<mrow>
<mn>1</mn>
<mo>+</mo>
<mi>f</mi>
<mo>+</mo>
<mi>g</mi>
</mrow>
</mfrac>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>&beta;</mi>
<mn>2</mn>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<mn>2</mn>
<mi>&pi;</mi>
<mi>f</mi>
</mrow>
<mrow>
<mn>1</mn>
<mo>+</mo>
<mi>f</mi>
<mo>+</mo>
<mi>g</mi>
</mrow>
</mfrac>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>&beta;</mi>
<mn>3</mn>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<mn>2</mn>
<mi>&pi;</mi>
<mi>g</mi>
</mrow>
<mrow>
<mo>(</mo>
<mn>1</mn>
<mo>+</mo>
<mi>f</mi>
<mo>+</mo>
<mi>g</mi>
<mo>)</mo>
</mrow>
</mfrac>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>5</mn>
<mo>)</mo>
</mrow>
</mrow>
(b) first puppet is decorateeed:Arbitrarily taken on camouflage circle and a little decorate P as first puppeti1(xi1, yi1), such as formula (6)
It is shown:
<mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>=</mo>
<mi>r</mi>
<mi>a</mi>
<mi>n</mi>
<mi>d</mi>
<mi>o</mi>
<mi>m</mi>
<mo>&lsqb;</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>-</mo>
<msup>
<msub>
<mi>r</mi>
<mi>i</mi>
</msub>
<mo>&prime;</mo>
</msup>
<mo>,</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>+</mo>
<msup>
<msub>
<mi>r</mi>
<mi>i</mi>
</msub>
<mo>&prime;</mo>
</msup>
<mo>&rsqb;</mo>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>=</mo>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
<mo>&PlusMinus;</mo>
<msqrt>
<mrow>
<msup>
<msub>
<mi>r</mi>
<mi>i</mi>
</msub>
<mrow>
<mo>&prime;</mo>
<mn>2</mn>
</mrow>
</msup>
<mo>-</mo>
<msup>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<mn>2</mn>
</msup>
</mrow>
</msqrt>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>6</mn>
<mo>)</mo>
</mrow>
</mrow>
(c) second puppet decorates Pi2(xi2, yi2), it is assumed that Pi2With Pi1Central angle corresponding to the chord length of formation is β1, based on Pi1By suitable
Clockwise rotation β1, Pi2Coordinate calculation formula such as shown in (7):
<mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>=</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>cos&beta;</mi>
<mn>1</mn>
</msub>
<mo>-</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>sin&beta;</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>=</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>cos&beta;</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>sin&beta;</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>7</mn>
<mo>)</mo>
</mrow>
</mrow>
(d) the 3rd puppet decorates Pi3(xi3, yi3):It is according to the structure rule of the TIN triangulation networks and the interior angle ratio for pretending triangle
1:f:Two conditions of g the 3rd puppet of traversal on camouflage circle is decorateeed, and can find the 3rd puppet according to counter clockwise direction decorates, and counts
Formula is calculated such as shown in (8):
<mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>=</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>cos&beta;</mi>
<mn>2</mn>
</msub>
<mo>+</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>sin&beta;</mi>
<mn>2</mn>
</msub>
<mo>+</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>=</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>cos&beta;</mi>
<mn>2</mn>
</msub>
<mo>-</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<msub>
<mi>sin&beta;</mi>
<mn>2</mn>
</msub>
<mo>+</mo>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>8</mn>
<mo>)</mo>
</mrow>
</mrow>
Step 16:Three puppets of generation are decorateeed into Pi1、Pi2、Pi3Substitute current concerning security matters point PiUpdate in original point figure layer data R;
Step 17:By current concerning security matters point PiCamouflage radius ri' it is the key information k generated after enciphering transformationiIt is added to key text
In part KeyFile;
Step 18:Repeat step 13, until realizing the processing of the camouflage to each concerning security matters point key element, is preserved after pretending to step 17
Data file is R';
(2) it is directed to vertex type GIS vector data reduction process
Step 21:The data file R' after camouflage is opened, opens key file KeyFile;For each concerning security matters point PiAlso
Original, successively circulation perform step 22 to step 26:
Step 22:The triangulation network of TIN data formats is built according to recurrence growth method to the vector point diagram layer data after current camouflage
Set T;
Step 23:To pretending triangle SiIdentification, the triangle formed by three points after pretending in triangle net collective T is referred to as
Pretend triangle;
(a) current i-th group key k in key file KeyFile is readi, current camouflage triangle S is can obtain after decryption reductioni's
Circumradius ri';
(b) its circumscribed circle center of circle O is asked to each triangle in set TiCoordinate (xi,yi), remember each Atria apex coordinate
Respectively Pi1(xi1,yi1),Pi2(xi2,yi2),Pi3(xi3,yi3), calculation formula is such as shown in (9);In known circumscribed circle center of circle OiSit
On the basis of target, circumradius r is calculated according to formula (10)i:
<mrow>
<mfenced open = "{" close = "">
<mtable>
<mtr>
<mtd>
<mrow>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<mo>(</mo>
<msup>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>-</mo>
<msup>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>+</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>-</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>)</mo>
<mo>*</mo>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>)</mo>
<mo>-</mo>
<mo>(</mo>
<msup>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>-</mo>
<msup>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>+</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>-</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>)</mo>
<mo>*</mo>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mrow>
<mn>2</mn>
<mo>*</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>*</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>-</mo>
<mn>2</mn>
<mo>*</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>*</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
</mrow>
</mfrac>
</mrow>
</mtd>
</mtr>
<mtr>
<mtd>
<mrow>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
<mo>=</mo>
<mfrac>
<mrow>
<mo>(</mo>
<msup>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>-</mo>
<msup>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>+</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>-</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>)</mo>
<mo>*</mo>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>)</mo>
<mo>-</mo>
<mo>(</mo>
<msup>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>-</mo>
<msup>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>+</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>-</mo>
<msup>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mn>2</mn>
</msup>
<mo>)</mo>
<mo>*</mo>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mrow>
<mn>2</mn>
<mo>*</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>*</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>-</mo>
<mn>2</mn>
<mo>*</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>3</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
<mo>*</mo>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>2</mn>
</mrow>
</msub>
<mo>)</mo>
</mrow>
</mrow>
</mfrac>
</mrow>
</mtd>
</mtr>
</mtable>
</mfenced>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>9</mn>
<mo>)</mo>
</mrow>
</mrow>
<mrow>
<msub>
<mi>r</mi>
<mi>i</mi>
</msub>
<mo>=</mo>
<msqrt>
<mrow>
<msup>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<mn>2</mn>
</msup>
<mo>+</mo>
<msup>
<mrow>
<mo>(</mo>
<msub>
<mi>y</mi>
<mrow>
<mi>i</mi>
<mn>1</mn>
</mrow>
</msub>
<mo>-</mo>
<msub>
<mi>y</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<mn>2</mn>
</msup>
</mrow>
</msqrt>
<mo>-</mo>
<mo>-</mo>
<mo>-</mo>
<mrow>
<mo>(</mo>
<mn>10</mn>
<mo>)</mo>
</mrow>
</mrow>
(c) each triangle in T is traveled through, searches its circumradius riWith ri' equal all triangles, it is designated as set A=
{Ai| i=1,2 ..., n }, wherein n is the triangle number for meeting the condition;
If (d) n is 1, then the triangle is camouflage triangle Si, three summits of the triangle are that puppet is decorateeed;If n
More than 1, then step (e) is transferred to;
(e) triangle S is pretended than further screening according to interior anglei;
Step 24:Camouflaged target reduces, and travels through obtained camouflage triangle SiThree summit point coordinates be respectively Pi1、Pi2、Pi3,
Original concerning security matters point coordinates P can be calculated by formula (9)i(xi,yi);
Step 25:By the original concerning security matters point coordinates P after reductioniSubstitute puppet and decorate Pi1、Pi2、Pi3Update vector data file R'
In;
Step 26:Repeat step 22-25, it is sequentially completed the reduction treatment of each concerning security matters point.
2. a kind of concerning security matters point-like geographic element camouflage deposited based on information point according to claim 1 and restoring method, its
It is characterised by, in step 23 (e), triangle S is pretended in further screeningiDetailed process it is as follows:To current triangle AiFollow successively
Ring performs following operate:
(i) current triangle A is calculated respectivelyiThree interior angles, and be designated as α respectively according to order from small to largei1、αi2、αi3;
(ii) ephemeral data R is createdtmp, and data file R' is assigned to data Rtmp;
(iii) by current triangle AiCorresponding circumscribed circle center of circle OiInstead of three vertex updates of the triangle to ephemeral data
RtmpIn, regenerate the triangle net collective T' of TIN data formats;
(iV) traversal includes O in set T'iTriangle sets B={ the B of pointi| i=1,2 ..., m }, m is to include OiThe three of point
Angular number;Try to achieve average internal angle value according to the rule of the step 13 for all triangles in set B, and by from it is small to
Big order is designated as β successively1、β2、β3;
(V) if interior angle average value β1、β2、β3With αi1、αi2、αi3It is equal respectively, then current triangle AiTo pretend triangle;
If interior angle average value β1、β2、β3With αi1、αi2、αi3, circulation performs step (i) to (V), eligible until traversing
Camouflage triangle.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510038934.9A CN104599224B (en) | 2015-01-26 | 2015-01-26 | A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510038934.9A CN104599224B (en) | 2015-01-26 | 2015-01-26 | A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104599224A CN104599224A (en) | 2015-05-06 |
CN104599224B true CN104599224B (en) | 2017-12-15 |
Family
ID=53124976
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510038934.9A Expired - Fee Related CN104599224B (en) | 2015-01-26 | 2015-01-26 | A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104599224B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112749241A (en) * | 2020-07-28 | 2021-05-04 | 广西华蓝岩土工程有限公司 | Secret-related land parcel map boundary point geodetic coordinate decryption processing method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254093A (en) * | 2011-06-24 | 2011-11-23 | 天津大学 | Connected domain statistical correlation algorithm based on Thiessen polygon |
CN102651059A (en) * | 2012-04-01 | 2012-08-29 | 洛阳理工学院 | Method for certificating GIS (Geographic Information System) vector data copyright based on multi-element spatial feature |
CN103077211A (en) * | 2012-12-28 | 2013-05-01 | 南京师范大学 | Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120233210A1 (en) * | 2011-03-12 | 2012-09-13 | Matthew Thomas Bogosian | Storage of Arbitrary Points in N-Space and Retrieval of Subset thereof Based on Criteria Including Maximum Distance to an Arbitrary Reference Point |
-
2015
- 2015-01-26 CN CN201510038934.9A patent/CN104599224B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102254093A (en) * | 2011-06-24 | 2011-11-23 | 天津大学 | Connected domain statistical correlation algorithm based on Thiessen polygon |
CN102651059A (en) * | 2012-04-01 | 2012-08-29 | 洛阳理工学院 | Method for certificating GIS (Geographic Information System) vector data copyright based on multi-element spatial feature |
CN103077211A (en) * | 2012-12-28 | 2013-05-01 | 南京师范大学 | Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data |
Also Published As
Publication number | Publication date |
---|---|
CN104599224A (en) | 2015-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108536851B (en) | User identity recognition method based on moving track similarity comparison | |
CN104601596B (en) | Data-privacy guard method in a kind of Classification Data Mining system | |
CN104123503B (en) | CNF formula data protection method in SAT problem solving outsourcing process | |
CN109472155B (en) | Differential privacy space data publishing method in space crowdsourcing | |
CN104599224B (en) | A kind of concerning security matters point-like geographic element camouflage deposited based on information point and restoring method | |
CN108471382A (en) | A kind of complex network clustering algorithm attack method based on node angle value | |
He et al. | Differentially private tripartite intelligent matching against inference attacks in ride-sharing services | |
CN114372516A (en) | XGboost-based federal learning training and prediction method and device | |
CN106507347A (en) | A kind of key generation method for protecting wireless sensor network security | |
Yan et al. | Multi-participant vertical federated learning based time series prediction | |
CN106685893B (en) | A kind of authority control method based on social networks group | |
CN102799837A (en) | Line and surface type global information system (GIS) vector data disguise and reduction method based on interpolation prediction | |
CN109962813A (en) | A kind of network structure generation method for network structure secret protection | |
CN104751399B (en) | A kind of concerning security matters wire geographic element camouflage deposited based on information point and restoring method | |
Zhao et al. | A semantic-based dummy generation strategy for location privacy | |
Fan et al. | Privacy preserving ultra-short-term wind power prediction based on secure multi party computation | |
Chang et al. | Adaptive and blind regression for mobile crowd sensing | |
Zhang et al. | Access Control Model Based on the Privacy of Crowdsourcing Task Content Protection in the Blockchain Environment | |
CN113761555B (en) | Safe and reliable vehicle networking space crowdsourcing task matching method based on intelligent contracts | |
CN114884688B (en) | Federal anomaly detection method across multi-attribute networks | |
Xie et al. | Federated Learning With Personalized Differential Privacy Combining Client Selection | |
Deng et al. | GraphFed: A Personalized Subgraph Federated Learning Framework for Non-IID Graphs | |
CN113255884B (en) | Network abnormal traffic identification and classification method based on collaborative learning | |
CN107564289A (en) | A kind of road network preprocess method for merging transport node | |
Liang et al. | Shape-unconstrained privacy-preserving range query for fog computing supported vehicular networks using image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171215 Termination date: 20210126 |