CN106650343B - A kind of DEM scrambling encryption and restoring method - Google Patents
A kind of DEM scrambling encryption and restoring method Download PDFInfo
- Publication number
- CN106650343B CN106650343B CN201610911208.8A CN201610911208A CN106650343B CN 106650343 B CN106650343 B CN 106650343B CN 201610911208 A CN201610911208 A CN 201610911208A CN 106650343 B CN106650343 B CN 106650343B
- Authority
- CN
- China
- Prior art keywords
- sequence
- matrix
- dem
- serialid
- formula
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 239000011159 matrix material Substances 0.000 claims description 60
- 239000000470 constituent Substances 0.000 claims description 15
- 230000015572 biosynthetic process Effects 0.000 claims description 5
- NAWXUBYGYWOOIX-SFHVURJKSA-N (2s)-2-[[4-[2-(2,4-diaminoquinazolin-6-yl)ethyl]benzoyl]amino]-4-methylidenepentanedioic acid Chemical compound C1=CC2=NC(N)=NC(N)=C2C=C1CCC1=CC=C(C(=O)N[C@@H](CC(=C)C(O)=O)C(O)=O)C=C1 NAWXUBYGYWOOIX-SFHVURJKSA-N 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 5
- 230000005540 biological transmission Effects 0.000 abstract description 4
- 238000005538 encapsulation Methods 0.000 abstract description 4
- 238000010276 construction Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000011946 reduction process Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 206010038743 Restlessness Diseases 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000002689 soil Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of DEM scrambling encryption and restoring method.The specific steps of this method include following (1) according to chaos sequence key generation three-dimensional chaos sequence.(2) scrambling encryption operation is carried out using height value of the chaos sequence generated to point each in DEM, i.e. progress elevation scrambling encryption.(3) scramble is carried out using position of the chaos sequence generated to encrypted DEM each point.The method of the present invention utilizes three-dimensional chaos technology, respectively by header file scramble, to elevation scramble and to position scramble, the scrambling encryption for DEM and reduction are formed, the geography information safety problem in the safe transmission and encapsulation storage link of dem data can be effectively solved.
Description
Technical field
The invention belongs to field of geographic information safety, and in particular to one kind carries out scramble to DEM based on three-dimensional chaos sequence
The method of encryption and reduction.
Background technique
DEM (Digital Elevation Model, i.e. digital elevation model), is indicated with one group of orderly array of values
A kind of actual ground model of ground elevation value.Since DEM describes ground elevation information, it mapping, the hydrology, meteorology,
The national economy such as landforms, geology, soil, engineering construction, communication, military affairs and national defense construction and humanity and natural science field have
Be widely applied.DEM has important military value and economic value as a kind of Fundamental Geographic Information System resource, is mapping
The focused protection object of department and application unit, it is necessary to scrambling encryption operation is carried out during transimission and storage.
For a long time, very few for the Encryption Technology Research of DEM, and focus primarily upon using the general of conventional flow file
Encryption method is encrypted.This simple and crude encryption method had not only broken the ring basic structure of file, but also was easy to cause data
The interest of code breaker.Therefore there is an urgent need to research and develop highly-safe, good concealment the DEM scrambling encryption of one kind and restoring method.
Summary of the invention
It is an object of the present invention to overcome defect of the existing technology, a kind of DEM scrambling encryption and reduction side are provided
Method, using three-dimensional chaos technology, respectively by header file scramble, to elevation scramble and to position scramble, formed for DEM's
Scrambling encryption and reduction can effectively solve the geography information safety problem in the safe transmission and encapsulation storage link of dem data.
To achieve the goals above, the technical solution adopted by the present invention is as follows:
One, the scrambling encryption method of DEM, its step are as follows:
Step 1: be based on ArcMap software, pass through ArcToolbox- > crossover tool -> by grid produce -> grid turns
ASCII operation, converts the dem data of Esri Grid format to the txt file of ASCII coding.
Step 2: by txt file in behavior main sequence deposit one M × N matrix A, wherein M is the line number of DEM, N is DEM's
Columns, and read out from the header file of DEM the Pixel size cellsize of DEM, upper left corner x origin coordinates xllcorner and
Upper left corner y origin coordinates yllcorner.
Step 3: input x1、y1、z1As the initial value of chaos system, and x1∈ (0,1), y1∈ (0,1), z1∈(0,1).It is defeated
Enter the value of scramble factor ρ, and ρ ∈ [1,1000].The value of defined parameters σ, and σ ∈ (0,1).
Step 4: according to formula (1), generating chaos sequence X, Y and Z;Wherein X={ xk| k=1,2,3 ..., max { M+N+
13,10000 } }, Y={ yk| k=1,2,3 ..., max { M+N+13,10000 } }, Z={ zk| k=1,2,3 ..., max { M+N+
13,10000 } };
Step 5: obtaining sequence S, J, Q, J ', Q ', I and T.Wherein S is the sequence to carry out xor operation with Z.J, Q is pair
The sequence of line number progress position shuffle operation.J ', Q ' are the sequence that position shuffle operation is carried out to row number.I and T be to Z value into
Line position sets the sequence of shuffle operation.
Step 5.1, according to formula (2) and (3), nonlinear discretization, formation sequence S, S={ s are carried out to chaos sequence Zk
| k=1,2,3 ..., M+N+13 };
Step 5.2, if the subset X of chaos sequence X '={ x1, x2, x3..., x10000Call number sequence 1,2,3 ...,
It 10000 } is sequence J;By constituent element (xn, jn) with xnAscending sort is carried out for primary key, the sequence J after sequence is denoted as sequence
Arrange Q.
Step 5.3, if subset Y '={ y of chaos sequence Y1, y2, y3..., y10000Call number sequence 1,2,3 ...,
It 10000 } is sequence J ';By constituent element (yn, jn') with ynAscending sort is carried out for primary key, the sequence J ' after sequence is denoted as
Sequence Q '.
Step 5.4, if subset Z '={ z of chaos sequence Z1, z2, z3..., z10000Call number sequence 1,2,3 ...,
It 10000 } is sequence I;By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence
Arrange T.
Step 6: scramble is carried out to the header file of dem data
Cryptographic operation is carried out to cellsize, xllcorner and yllcorner according to formula (4), obtains encryption data
scellsize、sxllcornerAnd syllcorner;
Step 7: elevation scramble is carried out to matrix A according to sequence S, T
Step 7.1, by the height value C of any of matrix AmnSwitch to 14 binary number representations, wherein m and n is to correspond to
Line number and row number;m∈[1,M],n∈[1,N].
Step 7.2, if m+n is odd number, first by CmnLow 7 swapped with high 7;It is constant if m+n is even number;
Choose the one 14 seat sequence { s of Sm+n,sm+n+1,sm+n+2,…,sm+n+13Step-by-step and CmnExclusive or.
Step 7.3, converting decimal number for the result after exclusive or indicates, the height value C ' after being changedmn。
Step 7.4, it is based on C 'mn, temporary variable b is generated according to formula (5);
B=C 'mn modρ (5)。
Step 7.5, the element that searching value is b is traversed in sequence T, its sequence number is denoted as serialID, then according to public affairs
Formula (6) calculates C "mn;
C″mn=C 'mn-b+serialID (6)。
Circulation execute step 7.1- step 7.5, the every bit in matrix A is all as above operated, obtain new matrix A ',
Wherein m and n is corresponding line number and row number.
Step 8: according to sequence Q, Q ' to matrix A ' carry out position scramble:
Since matrix A ' first trip first, circulation executes step 8.1- step 8.4, one by one by matrix A ' middle Elements C "mn
With C "m′n′Location swap obtains matrix A ";Matrix A " is to the final result after DEM scramble.
Step 8.1, according to formula (7), using matrix A ' in each Elements C "mnLine number m, generate temporary variable p;
P=m mod ρ (7).
Step 8.2, traversal finds the element equal with p value in sequence Q, remembers and is designated as serialID ' under it, then according to public affairs
Formula (8) generates m ';
M '=m-p+serialID ' (8).
Step 8.3, according to formula (9), using matrix A ' in Elements C "mnRow number n, generate p ';
P '=n mod ρ (9).
Step 8.4, the element equal with p ' value is found in the middle traversal of sequence Q ', remembers and be designated as serialID " under it, then basis
Formula (10) generates n ';
N '=n-p '+serialID " (10).
Step 9: the txt file based on the data after scrambling encryption, after generating scrambling encryption.
Step 10: it is based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstilees
Txt file, is converted to the dem data of Esri Grid format by lattice " operation.
(2) DEM scramble restoring method (reduction process of DEM scramble), includes the following steps:
Step A: being based on ArcMap software, by " ArcToolbox- > crossover tool -> by grid produces -> and grid turns
ASCII " operation, converts dem data to the txt file of ASCII coding;Matrix A is read data to from txt ".
Step B: it is M that the DEM after scramble, which is stored in line number with behavior main sequence, and columns is the matrix A of N " in, wherein M is to set
The line number of DEM after unrest, N are the columns of the DEM after scramble, and dem data after reading out scramble in the header file of DEM
Pixel size scellsize, upper left corner x origin coordinates sxllcornerWith upper left corner y origin coordinates syllcorner。
Step C: input x1、y1、z1As the initial value of chaos system, and x1∈ (0,1), y1∈ (0,1), z1∈(0,1).It is defeated
Enter the value of scramble factor ρ, and ρ ∈ [1,10000].The value of defined parameters σ, and σ ∈ (0,1).
Step D: according to formula (1), chaos sequence X, Y and Z are generated;Wherein X={ xk| k=1,2,3 ..., max { M+N+
13,10000 } }, Y={ yk| k=1,2,3 ..., max { M+N+13,10000 } }, Z={ zk| k=1,2,3 ..., max { M+N+
13,10000 } }.
Step E: sequence S, J, Q, J ', Q ', I and T are obtained
E.1 step, according to formula (2) and (3), carries out nonlinear discretization, formation sequence S, S={ s to chaos sequence Zk
| k=1,2,3 ..., M+N+13 }.
Step E.2, if the subset X of chaos sequence X '={ x1, x2, x3..., x10000Call number sequence 1,2,3 ...,
It 10000 } is sequence J;By constituent element (xn, jn) with xnAscending sort is carried out for primary key, the sequence J after sequence is denoted as sequence
Arrange Q;
Step E.3, if subset Y '={ y of chaos sequence Y1, y2, y3..., y10000Call number sequence 1,2,3 ...,
It 10000 } is sequence J ';By constituent element (yn, jn') with ynAscending sort is carried out for primary key, the sequence J ' after sequence is denoted as
Sequence Q '.
Step E.4, if subset Z '={ z of chaos sequence Z1, z2, z3..., z10000Call number sequence 1,2,3 ...,
It 10000 } is sequence I.By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence
Arrange T.
Step F: the header file of DEM is restored
According to formula (11) to scellsize、sxllcornerAnd syllcornerRestoring operation is carried out, restoring data is obtained
Cellsize, xllcorner and yllcorner;
The position after scramble in step G: according to sequence Q and Q ' to matrix A " restores
Since matrix A " footline terminal column, circulation execute step G.1- step G.1, one by one forward by matrix A ' middle element
C″m′n′With C "mnExchange, obtain matrix A ', wherein m and n be matrix A ' in corresponding line number and row number:
G.1 step, according to formula (12), utilizes matrix A " in Elements C "m′n′Line number m ', generate serialID ';Its
Middle m ' and n ' is corresponding line number and row number
SerialID '=m ' mod ρ (12).
G.2 step, finds the element that call number in sequence Q is serialID ', remember that its value is p, raw according to formula (13)
At m;
M=m '+p-serialID ' (13).
G.3 step, according to formula (14), utilizes matrix A " in Elements C "m′n′Row number n ', generate serialID ";
SerialID ' '=n ' mod ρ (14).
G.4 step, finds the element that the middle call number of sequence Q ' is serialID ' ', remember that its value is p ', according to formula (15),
Generate n;
N=n '+p '-serialID " (15).
Step H: according to sequence S, T to matrix A ' in data carry out elevation reduction
Circulation execute step H.2- step H.5, to matrix A ' in each dot cycle execute aforesaid operations, obtain matrix A,
Square
Battle array A is the final result after restoring:
Step H.1, according to formula (16), using matrix A ' in Elements C "mn, generate serialID;
SerialID=C "mn modρ (16)。
H.2 step, finds the element that matrix A ' middle call number is serialID, remember that its value is b, then according to formula (17),
It obtains
C′mn=C "mn+b-serialID (17)。
Step H.3, by C 'mnWith 14 binary number representations, wherein [1, M] m ∈, n ∈ [1, N].
H.4 step, chooses the one 14 seat sequence { S of Sm+n,SM+n+1,Sm+n+2,…,Sm+n+13And C 'mn14 binary systems
Number carries out step-by-step xor operation;If m+n is odd number, low 7 of exclusive or result are swapped with high 7, if m+n is even
Number is then constant.
H.5 step, converts the decimal system for transformed height value and obtains Cmn。
Step I: being based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstilees
Txt file, is converted to the dem data of Esri Grid format, completes the reduction treatment of DEM by lattice " operation.
The method of the present invention utilizes three-dimensional chaos technology, respectively by header file scramble, set to elevation scramble and to position
Disorderly, scrambling encryption and the reduction for DEM are formed, can effectively be solved in the safe transmission and encapsulation storage link of dem data
Geography information safety problem.
Detailed description of the invention
Flow chart Fig. 1 of the invention (a. scrambling encryption process, b. restore process).
Fig. 2 experimental data.
Processing result after Fig. 3 scrambling encryption.
Processing result after Fig. 4 reduction.
Specific embodiment
It is described in further details with reference to the accompanying drawings and examples
Embodiment 1
What this example was chosen is the Mount Lushan part dem data of 1:50000, and data format is Esri Grid format.For number
According to the conversion of format, reading data, scrambling encryption, reduction whole process, provide one embodiment of the present of invention.
1, the scrambling encryption process of the DEM based on chaos sequence
Step 11:
1) data are opened in ArcMap, produced with ArcToolbox- > crossover tool -> by grid -> grid turns ASCII, it will
Dem data is converted into the txt file of ASCII coding.The data that this example is chosen Three-dimensional Display such as Fig. 2 in ArcScene.
Step 12:
Firstly, reading the header file of the dem data of txt format.Wherein xllcorner=390996, yllcorner=
3274219, cellsize=5.Secondly, reading each point height value.What is opened up in the example is 935 rows, the two-dimentional battle array of 1220 column
Column.
Step 13: the initial value x of input three-dimensional chaos sequence1=0.21, y1=0.32, z1=0.44.And σ=0.45 is set,
ρ=10000.
Step 14: according to formula (1), chaos sequence X, X=that formation sequence length is 2,168 0.21,0.97,
0.81 ..., 0.88 }, chaos sequence Y, Y={ 0.32,0.94,0.63 ..., 0.77 } and sequence length that sequence length is 2168
For 2168 chaos sequence Z, Z={ 0.44,0.91,0.45 ..., 0.67 }.
Step 15: obtaining sequence S, J, Q, J ', Q ', I and T
1) nonlinear discretization is carried out to chaos sequence Z.The 0-1 sequence containing 2168 elements is obtained according to formula (2), (3)
Arrange S, S={ 0,1,0,1 ..., 1 }.
2) subset X '={ x of chaos sequence X is set1, x2, x3..., x10000In element call number sequence 1,2,
It 3 ..., 10000 } is sequence J.By constituent element (xn, jn) with xnAscending sort is carried out for primary key, by the sequence J after sequence
It is denoted as sequence Q, Q={ 2,4,6 ..., 2167,1 }.
3) subset Y '={ y of chaos sequence Y is set1, y2, y3..., y10000In element call number sequence 1,2,3 ...,
It 10000 } is sequence J '.By constituent element (yn, jn') with ynAscending sort is carried out for primary key, the sequence J ' after sequence is denoted as
Sequence Q ', Q '={ 2,4,6 ..., 2167,1 }.
4) subset Z '={ z of chaos sequence Z is set1, z2, z3..., z10000Call number sequence { 1,2,3 ..., 10000 }
For sequence I.By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence T, T=
{ 5,7,9 ..., 3,1 }.
Step 16: carrying out header file scramble.
Cellsize=5, xllcorner=390996 and yllcorner=3274219 are set according to formula (14)
Random cryptographic operation obtains scrambling encryption data Scellsize=1140697, Sxllcorner=1347720 and Syllcorner=
2134583。
Step 17: carrying out elevation scramble.
1) with m=15, for n=98.It is with 14 binary number representations by the height value 202 at the point
00000011001010, it is denoted as Cmn(m, n are respectively ranks number, m ∈ [1,935], n ∈ [1,1220]).
2) m+n=113 is odd number, then swaps low 7 with high 7, obtain 10010100000001.It chooses discrete
Change the partial sequence S generated113,S114, S115..., S126With CmnExclusive or, i.e., by 01010101010101 and 10010100000001
Carry out exclusive or.
3) decimal system is converted by the result 11000001010100 after exclusive or, the height value C ' after being changedmn=
12372。
4) it is based on C 'mn, temporary variable b=2372 is generated according to formula (5).
5) traversal searches out the element that value is b, sequence number serialID=7368, then according to formula (6) in sequence T
Calculate C 'mn=17368.
6) every bit in matrix A is all as above operated, obtain new matrix A '.Wherein m and n be corresponding line number with
Row number.
Step 18: carrying out position scramble.
1) with m=15, for n=98, according to formula (7), using matrix A ' in Elements C "mnLine number m generate it is interim
Variable p=15.
2) traversal finds the element equal with p value in sequence Q, subscript serialID '=1095, then according to formula (8),
Generate m '=1095.
3) according to formula (9), using matrix A ' in Elements C "mnRow number n generate p '=98.
4) traversal finds element equal with p ' value in sequence Q ', subscript serialID "=48, then according to formula
(10), n '=48 are generated.
5) since first trip first one by one by the middle Elements C of A ' "mnWith C "m′n′Location swap obtains matrix A ".A " is pair
Final result after DEM scramble.
Step 19: the txt file based on the data after scrambling encryption, after generating scrambling encryption.
Step 20: it is based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstilees
Txt file, is converted to the dem data of Esri Grid format, completes the reduction treatment of DEM by lattice " operation.Effect after scramble
It is checked in ArcScene, such as Fig. 3.
2. reduction process
Step 21: it is based on ArcMap software, by " ArcToolbox- > crossover tool -> by grid produces -> and grid turns
ASCII " operation, converts dem data to the txt file of ASCII coding.
Step 22: firstly, reading the file header of the dem data of txt format.Wherein Scellsize=1140697, Sxllcorner
=1347720 and Syllcorner=2134583., relevant parameter is saved.Secondly, reading each point height value.It is opened up in the example
Be 935 rows, the two-dimensional arrays of 1220 column.
Step 23: generating chaos sequence.
Input the initial value x of three-dimensional chaos sequence1=0.23, y1=0.24, z1=0.25.σ=0.45, ρ=10000 are set.
Step 24: according to formula (1), chaos sequence X, X=that formation sequence length is 2,168 0.21,0.97,
0.81 ..., 0.88 }, chaos sequence Y, Y={ 0.32,0.94,0.63 ..., 0.77 } and sequence length that sequence length is 2168
For 2168 chaos sequence Z, Z={ 0.44,0.91,0.45 ..., 0.67 }.
Step 25: obtaining sequence S, J, Q, J ', Q ', I and T
Nonlinear discretization is carried out to chaos sequence Z.The 0-1 sequence containing 2168 elements is obtained according to formula (2) and (3)
S, S={ 0,1,0,1 ..., 1 }.
2) subset X '={ x of chaos sequence X is set1, x2, x3..., x10000In element call number sequence 1,2,
It 3 ..., 10000 } is sequence J.By constituent element (xn, jn) with xnAscending sort is carried out for primary key, by the sequence J after sequence
It is denoted as sequence Q, Q={ 2,4,6 ..., 2167,1 }.
3) subset Y '={ y of chaos sequence Y is set1, y2, y3,..., y10000In element call number sequence 1,2,
It 3 ..., 10000 } is sequence J '.By constituent element (yn, jn') with ynAscending sort is carried out for primary key, by the sequence after sequence
J ' is denoted as sequence Q ', Q '={ 2,4,6 ..., 2167,1 }.
4) subset Z '={ z of chaos sequence Z is set1, z2, z3..., z10000Call number sequence 1,2,3 ...,
It 10000 } is sequence I.By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence
Arrange T, T={ 5,7,9 ..., 3,1 }.
Step 26: header file reduction.
According to formula (14) to Scellsize=1140697, Sxllcorner=1347720 and Syllcorner=2134583 carry out
Restoring operation obtains restoring data cellsize=5, xllcorner=390996 and yllcorner=3274219.
Step 27: the reduction of position scramble.
Detailed process is as follows:
1) it with m '=1095, for n '=48, according to formula (12), utilizes matrix A " in Elements C "m′n′Line number m '
=1095 generate serialID '=1095.Wherein m ' and n ' is corresponding line number and row number.
2) element that call number is serialID ' in sequence Q is found, p=15 is generated, then according to formula (13), generates m=
15。
3) it according to formula (14), utilizes matrix A " in Elements C "m′n′Row number n '=48, generate serialID "=48.
4) element of the middle Serial No. serialID " of sequence Q ' is found, value p '=98 generate n then according to formula (15)
=98.
5) from footline terminal column one by one forward by the middle Elements C of A ' "m′n′With C "mnExchange, obtain matrix A '.Wherein m and n is A '
In corresponding line number and row number.
Step 27: elevation reduction.
1) with m=15, n=98, for corresponding elevation is 17368, serialID=7368 is generated according to formula (16).
2) element that the middle call number of sequence A ' is serialID is found, value b=2372 is obtained then according to formula (17)
C′mn=12372.
3) by C 'mnWith 14 binary number representations, wherein [1, M] m ∈, n ∈ [1, N].
4) the partial sequence S that discretization generates is chosen113,S114, S115..., S126With CmnThat is, exclusive or will
01010101010101 and 11000001010100 carry out exclusive or, obtain 10010100000001, because m+n is odd number,
It exchanges the first seven position and latter seven obtains 00000011001010.
3) decimal system is converted by the result after exclusive or, the height value C ' after being changedmn=202;
5) decimal system is converted by transformed height value, obtains matrix A, A is the final result after restoring.
Step 28: based on the data after reduction treatment, the txt file of the DEM after generating reduction.
Step 29: with ArcToolbox- in ArcMap > crossover tool -> switch to grid -> ASCII and turnstilees lattice, it will
The txt file of ASCII coding is converted into Esri Grid format and shows.The data that this example is chosen are three-dimensional aobvious in ArcScene
Show such as Fig. 4.
Beneficial effects of the present invention: scrambling encryption and reduction treatment by being directed to dem data can solve safe and efficiently
The certainly geography information safety problem in the safe transmission of dem data and encapsulation storage link.
Claims (2)
1. a kind of scrambling encryption method of DEM, its step are as follows:
Step 1: be based on ArcMap software, pass through ArcToolbox- > crossover tool -> by grid produce -> grid turns ASCII behaviour
Make, converts the dem data of Esri Grid format to the txt file of ASCII coding;
Step 2: by txt file in behavior main sequence deposit one M × N matrix A, wherein M is the line number of DEM, N is the columns of DEM,
And the Pixel size cellsize of DEM is read out from the header file of DEM, upper left corner x origin coordinates xllcorner and the upper left corner
Y origin coordinates yllcorner;
Step 3: input x1、y1、z1As the initial value of chaos system, and x1∈ (0,1), y1∈ (0,1), z1∈ (0,1);Input is set
The value of random factor ρ, and ρ ∈ [1,1000];The value of defined parameters σ, and σ ∈ (0,1);
Step 4: according to formula (1), generating chaos sequence X, Y and Z;Wherein X={ xk| k=1,2,3 ..., max M+N+13,
10000 } }, Y={ yk| k=1,2,3 ..., max { M+N+13,10000 } }, Z={ zk| k=1,2,3 ..., max { M+N+
13,10000 } };
Step 5: obtaining sequence S, J, Q, J ', Q ', I and T;The wherein sequence that S generates for chaos sequence Z progress nonlinear discretization
Column, J, Q are the sequence that position shuffle operation is carried out to line number, and J ', Q ' are the sequence that position shuffle operation is carried out to row number, I and T
For the sequence for carrying out position shuffle operation to Z value;
Step 5.1, according to formula (2) and (3), nonlinear discretization, formation sequence S, S={ s are carried out to chaos sequence Zk| k=
1,2,3 ..., M+N+13 };
Step 5.2, if the subset X of chaos sequence X '={ x1, x2, x3..., x10000Call number sequence 1,2,3 ...,
It 10000 } is sequence J;By constituent element (xn, jn) with xnAscending sort is carried out for primary key, the sequence J after sequence is denoted as sequence
Arrange Q;
Step 5.3, if subset Y '={ y of chaos sequence Y1, y2, y3..., y10000Call number sequence 1,2,3 ...,
It 10000 } is sequence J ';By constituent element (yn, jn') with ynAscending sort is carried out for primary key, the sequence J ' after sequence is denoted as
Sequence Q ';
Step 5.4, if subset Z '={ z of chaos sequence Z1, z2, z3..., z10000Call number sequence { 1,2,3 ..., 10000 }
For sequence I;By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence T;
Step 6: scramble is carried out to the header file of dem data
Cryptographic operation is carried out to cellsize, xllcorner and yllcorner according to formula (4), obtains encryption data
scellsize、sxllcornerAnd syllcorner;
Step 7: elevation scramble is carried out to matrix A according to sequence S, T
Step 7.1, by the height value C of any of matrix AmnSwitch to 14 binary number representations, wherein m and n is corresponding row
Number and row number;M ∈ [1, M], n ∈ [1, N];
Step 7.2, if m+n is odd number, first by CmnLow 7 swapped with high 7;It is constant if m+n is even number;It chooses
The one 14 seat sequence { s of SM+n,sm+n+1, sm+n+2..., sm+n+13Step-by-step and CmnExclusive or;
Step 7.3, converting decimal number for the result after exclusive or indicates, the height value C ' after being changedmn;
Step 7.4, it is based on C 'mn, temporary variable b is generated according to formula (5);
B=C 'mnmod ρ (5);
Step 7.5, the element that searching value is b is traversed in sequence T, its sequence number is denoted as serialID, then according to formula (6)
Calculate C "mn;
C″mn=C 'mn-b+serialID (6);
Circulation execute step 7.1- step 7.5, the every bit in matrix A is all as above operated, obtain new matrix A ', wherein
M and n is corresponding line number and row number;
Step 8: according to sequence Q, Q ' to matrix A ' carry out position scramble:
Since matrix A ' first trip first, circulation executes step 8.1- step 8.4, one by one by matrix A ' middle Elements C "mnWith
C″m′n′Location swap obtains matrix A ";Matrix A " is to the final result after DEM scramble;
Step 8.1, according to formula (7), using matrix A ' in each Elements C "mnLine number m, generate temporary variable p;
P=m mod ρ (7);
Step 8.2, traversal finds the element equal with p value in sequence Q, remembers and is designated as serialID ' under it, then according to formula
(8), m ' is generated;
M '=m-p+serialID ' (8);
Step 8.3, according to formula (9), using matrix A ' in Elements C "mnRow number n, generate p ';
P '=n mod ρ (9);
Step 8.4, the element equal with p ' value is found in the middle traversal of sequence Q ', remembers and be designated as serialID " under it, then according to formula
(10), n ' is generated;
N '=n-p '+serialID " (10);
Step 9: the txt file based on the data after scrambling encryption, after generating scrambling encryption;
Step 10: it is based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstile lattice " behaviour
Make, txt file is converted to the dem data of Esri Grid format.
2. a kind of restoring method of the DEM scramble after scrambling encryption method scrambling encryption with DEM described in claim 1, packet
Include following steps:
Step A: being based on ArcMap software, by " ArcToolbox- > crossover tool -> by grid produce -> grid turn ASCII "
Operation converts dem data to the txt file of ASCII coding;Matrix A is read data to from txt ";
Step B: it is M that the DEM after scramble, which is stored in line number with behavior main sequence, and columns is the matrix A of N " in, wherein M is after scramble
DEM line number, N is the columns of the DEM after scramble, and the pixel of the dem data after reading out scramble in the header file of DEM
Size scellsize, upper left corner x origin coordinates sxllcornerWith upper left corner y origin coordinates syllcorner;
Step C: input x1、y1、z1As the initial value of chaos system, and x1∈ (0,1), y1∈ (0,1), z1∈ (0,1);Input is set
The value of random factor ρ, and ρ ∈ [1,10000];The value of defined parameters σ, and σ ∈ (0,1);
Step D: according to formula (1), chaos sequence X, Y and Z are generated;Wherein X={ xk| k=1,2,3 ..., max M+N+13,
10000 } }, Y={ yk| k=1,2,3 ..., max { M+N+13,10000 } }, Z={ zk| k=1,2,3 ..., max M+N+13,
10000}};
Step E: sequence S, J, Q, J ', Q ', I and T are obtained
E.1 step, according to formula (2) and (3), carries out nonlinear discretization, formation sequence S, S={ s to chaos sequence Zk| k=
1,2,3 ..., M+N+13 };
Step E.2, if the subset X of chaos sequence X '={ x1, x2, x3..., x10000Call number sequence 1,2,3 ...,
It 10000 } is sequence J;By constituent element (xn, jn) with xnAscending sort is carried out for primary key, the sequence J after sequence is denoted as sequence
Arrange Q;
Step E.3, if subset Y '={ y of chaos sequence Y1, y2, y3..., y10000Call number sequence 1,2,3 ...,
It 10000 } is sequence J ';By constituent element (yn, jn') with ynAscending sort is carried out for primary key, by the sequence J ' note after sequence
For sequence Q ';
Step E.4, if subset Z '={ z of chaos sequence Z1, z2, z3..., z10000Call number sequence { 1,2,3 ..., 10000 }
For sequence I;By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence T;
Step F: the header file of DEM is restored
According to formula (11) to scellsize、sxllcornerAnd syllcornerCarry out restoring operation, obtain restoring data cellsize,
Xllcorner and yllcorner;
The position after scramble in step G: according to sequence Q and Q ' to matrix A " restores
Since matrix A " footline terminal column, circulation execute step G.1- step G.1, one by one forward by matrix A ' middle Elements C "m′n′With
C″mnExchange, obtain matrix A ', wherein m and n be matrix A ' in corresponding line number and row number:
G.1 step, according to formula (12), utilizes matrix A " in Elements C "m′n′Line number m ', generate serialID ': wherein m '
It is corresponding line number and row number with n '
SerialID '=m ' mod ρ (12): G.2 step, finds the element that call number in sequence Q is serialID ', remembers it
Value is p, according to formula (13), generates m;
M=m '+p-serialID ' (13);
G.3 step, according to formula (14), utilizes matrix A " in Elements C "m′n′Row number n ', generate serialID ";
SerialID "=n ' mod ρ (14);
G.4 step, finds the element that the middle call number of sequence Q ' is serialID ", remember that its value is p ', according to formula (15), generate
n;
N=n '+p '-serialID " (15);
Step H: according to sequence S, T to matrix A ' in data carry out elevation reduction
Circulation execute step H.2- step H.5, to matrix A ' in each dot cycle execute aforesaid operations, obtain matrix A, matrix
A is the final result after restoring:
Step H.1, according to formula (16), using matrix A ' in Elements C "mn, generate serialID;
SerialID=C "mnmod ρ (16);
H.2 step, finds the element that matrix A ' middle call number is serialID, remember that its value is that b is obtained then according to formula (17)
C″mn=C "mn+b-serialID (17);
Step H.3, by C 'mnWith 14 binary number representations, wherein [1, M] m ∈, n ∈ [1, N];
H.4 step, chooses the one 14 seat sequence { S of sm+n, Sm+n+1, Sm+n+2..., Sm+n+13And C 'mn14 bits,
Carry out step-by-step xor operation;If m+n is odd number, low 7 of exclusive or result are swapped with high 7, if m+n is even number,
It is then constant;
H.5 step, converts the decimal system for transformed height value and obtains Cmn;
Step I: being based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstile lattice " behaviour
Make, txt file is converted to the dem data of Esri Grid format, completes the reduction treatment of DEM.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610911208.8A CN106650343B (en) | 2016-10-19 | 2016-10-19 | A kind of DEM scrambling encryption and restoring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610911208.8A CN106650343B (en) | 2016-10-19 | 2016-10-19 | A kind of DEM scrambling encryption and restoring method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106650343A CN106650343A (en) | 2017-05-10 |
CN106650343B true CN106650343B (en) | 2019-02-01 |
Family
ID=58856026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610911208.8A Active CN106650343B (en) | 2016-10-19 | 2016-10-19 | A kind of DEM scrambling encryption and restoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106650343B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109448119B (en) * | 2018-10-19 | 2022-04-19 | 深圳市工勘岩土集团有限公司 | Method for applying Digital Elevation Model (DEM) in development of geographic information system |
CN110460424B (en) * | 2019-08-19 | 2020-07-31 | 兰州理工大学 | Voice data encryption method and system supporting privacy protection |
CN115865523B (en) * | 2023-02-14 | 2023-04-28 | 杭银消费金融股份有限公司 | Data encryption transmission method for information analysis system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077211A (en) * | 2012-12-28 | 2013-05-01 | 南京师范大学 | Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data |
CN103870552A (en) * | 2014-03-03 | 2014-06-18 | 南京师范大学 | Scrambling and recovery method for GIS (Geographic Information System) vector data line and plane graphic layer |
CN104008225A (en) * | 2014-04-11 | 2014-08-27 | 北京工业大学 | Grid digital elevation model (DEM) difference calculation method of urban surface drainage system |
CN104751399A (en) * | 2015-03-06 | 2015-07-01 | 南京师范大学 | Information sharing based secret-associated linear geographic element pretence and recovery method |
-
2016
- 2016-10-19 CN CN201610911208.8A patent/CN106650343B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077211A (en) * | 2012-12-28 | 2013-05-01 | 南京师范大学 | Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data |
CN103870552A (en) * | 2014-03-03 | 2014-06-18 | 南京师范大学 | Scrambling and recovery method for GIS (Geographic Information System) vector data line and plane graphic layer |
CN104008225A (en) * | 2014-04-11 | 2014-08-27 | 北京工业大学 | Grid digital elevation model (DEM) difference calculation method of urban surface drainage system |
CN104751399A (en) * | 2015-03-06 | 2015-07-01 | 南京师范大学 | Information sharing based secret-associated linear geographic element pretence and recovery method |
Non-Patent Citations (1)
Title |
---|
不规则三角网DEM数字水印算法研究;陆尘;《中国优秀硕士学位论文全文数据库 信息科技辑》;20160215;全文 |
Also Published As
Publication number | Publication date |
---|---|
CN106650343A (en) | 2017-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106023051B (en) | DNA image encryption method and system based on cloud model and hyperchaotic system | |
CN107659751B (en) | Multi-image encryption method based on DNA coding and chaos | |
CN106650343B (en) | A kind of DEM scrambling encryption and restoring method | |
CN112235481B (en) | Image secret sharing method | |
CN108199828B (en) | Method and device for encrypting color picture | |
Ye et al. | Spatial image encryption algorithm based on chaotic map and pixel frequency | |
CN106530207A (en) | Logistic chaotic mapping-based digital image encryption method | |
Kandar et al. | Visual cryptography scheme for color image using random number with enveloping by digital watermarking | |
He et al. | A weighted threshold secret sharing scheme for remote sensing images based on Chinese remainder theorem | |
Mokhtar et al. | Colored image encryption algorithm using DNA code and chaos theory | |
Song et al. | Multi-image reorganization encryption based on SLF cascade chaos and bit scrambling | |
CN106127669B (en) | Based on the New chaotic image encryption method for protecting area B aker mapping | |
CN103559678A (en) | Scrambling and restoring method of shp line-face layer data | |
CN113902135A (en) | Sample data volume joint expansion method, device, equipment, system and storage medium | |
CN103927572A (en) | Encoding graph block and method and device for forming lattice graph through encoding graph block | |
Xu et al. | A novel image encryption scheme based on a nonlinear chaotic map | |
CN112887509A (en) | Fusion encryption method based on multiple chaotic systems | |
CN105046639A (en) | Grayscale image scrambling method based on one-dimensional cellular automaton | |
CN104766266A (en) | Image scrambling method based on two-dimensional cellular automaton | |
CN116827509A (en) | Image encryption method based on five-dimensional conserved hyperchaotic system and bit plane segmentation diffusion | |
CN112184841B (en) | Block replacement generation type information hiding and recovering method, equipment and medium | |
CN114978466A (en) | Fractal-like model and Hilbert synchronous scrambling diffusion encryption method | |
CN113779611A (en) | Vector geographic data encryption method and decryption method based on three-dimensional Arnold transformation | |
CN104361550B (en) | A kind of digital disorder method based on the labyrinth 2D BacterialGrowth | |
CN109558701B (en) | Medical CT image secret sharing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |