CN106650343B - A kind of DEM scrambling encryption and restoring method - Google Patents

A kind of DEM scrambling encryption and restoring method Download PDF

Info

Publication number
CN106650343B
CN106650343B CN201610911208.8A CN201610911208A CN106650343B CN 106650343 B CN106650343 B CN 106650343B CN 201610911208 A CN201610911208 A CN 201610911208A CN 106650343 B CN106650343 B CN 106650343B
Authority
CN
China
Prior art keywords
sequence
matrix
dem
serialid
formula
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610911208.8A
Other languages
Chinese (zh)
Other versions
CN106650343A (en
Inventor
王中元
王凯亮
王顺利
李安波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201610911208.8A priority Critical patent/CN106650343B/en
Publication of CN106650343A publication Critical patent/CN106650343A/en
Application granted granted Critical
Publication of CN106650343B publication Critical patent/CN106650343B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of DEM scrambling encryption and restoring method.The specific steps of this method include following (1) according to chaos sequence key generation three-dimensional chaos sequence.(2) scrambling encryption operation is carried out using height value of the chaos sequence generated to point each in DEM, i.e. progress elevation scrambling encryption.(3) scramble is carried out using position of the chaos sequence generated to encrypted DEM each point.The method of the present invention utilizes three-dimensional chaos technology, respectively by header file scramble, to elevation scramble and to position scramble, the scrambling encryption for DEM and reduction are formed, the geography information safety problem in the safe transmission and encapsulation storage link of dem data can be effectively solved.

Description

A kind of DEM scrambling encryption and restoring method
Technical field
The invention belongs to field of geographic information safety, and in particular to one kind carries out scramble to DEM based on three-dimensional chaos sequence The method of encryption and reduction.
Background technique
DEM (Digital Elevation Model, i.e. digital elevation model), is indicated with one group of orderly array of values A kind of actual ground model of ground elevation value.Since DEM describes ground elevation information, it mapping, the hydrology, meteorology, The national economy such as landforms, geology, soil, engineering construction, communication, military affairs and national defense construction and humanity and natural science field have Be widely applied.DEM has important military value and economic value as a kind of Fundamental Geographic Information System resource, is mapping The focused protection object of department and application unit, it is necessary to scrambling encryption operation is carried out during transimission and storage.
For a long time, very few for the Encryption Technology Research of DEM, and focus primarily upon using the general of conventional flow file Encryption method is encrypted.This simple and crude encryption method had not only broken the ring basic structure of file, but also was easy to cause data The interest of code breaker.Therefore there is an urgent need to research and develop highly-safe, good concealment the DEM scrambling encryption of one kind and restoring method.
Summary of the invention
It is an object of the present invention to overcome defect of the existing technology, a kind of DEM scrambling encryption and reduction side are provided Method, using three-dimensional chaos technology, respectively by header file scramble, to elevation scramble and to position scramble, formed for DEM's Scrambling encryption and reduction can effectively solve the geography information safety problem in the safe transmission and encapsulation storage link of dem data.
To achieve the goals above, the technical solution adopted by the present invention is as follows:
One, the scrambling encryption method of DEM, its step are as follows:
Step 1: be based on ArcMap software, pass through ArcToolbox- > crossover tool -> by grid produce -> grid turns ASCII operation, converts the dem data of Esri Grid format to the txt file of ASCII coding.
Step 2: by txt file in behavior main sequence deposit one M × N matrix A, wherein M is the line number of DEM, N is DEM's Columns, and read out from the header file of DEM the Pixel size cellsize of DEM, upper left corner x origin coordinates xllcorner and Upper left corner y origin coordinates yllcorner.
Step 3: input x1、y1、z1As the initial value of chaos system, and x1∈ (0,1), y1∈ (0,1), z1∈(0,1).It is defeated Enter the value of scramble factor ρ, and ρ ∈ [1,1000].The value of defined parameters σ, and σ ∈ (0,1).
Step 4: according to formula (1), generating chaos sequence X, Y and Z;Wherein X={ xk| k=1,2,3 ..., max { M+N+ 13,10000 } }, Y={ yk| k=1,2,3 ..., max { M+N+13,10000 } }, Z={ zk| k=1,2,3 ..., max { M+N+ 13,10000 } };
Step 5: obtaining sequence S, J, Q, J ', Q ', I and T.Wherein S is the sequence to carry out xor operation with Z.J, Q is pair The sequence of line number progress position shuffle operation.J ', Q ' are the sequence that position shuffle operation is carried out to row number.I and T be to Z value into Line position sets the sequence of shuffle operation.
Step 5.1, according to formula (2) and (3), nonlinear discretization, formation sequence S, S={ s are carried out to chaos sequence Zk | k=1,2,3 ..., M+N+13 };
Step 5.2, if the subset X of chaos sequence X '={ x1, x2, x3..., x10000Call number sequence 1,2,3 ..., It 10000 } is sequence J;By constituent element (xn, jn) with xnAscending sort is carried out for primary key, the sequence J after sequence is denoted as sequence Arrange Q.
Step 5.3, if subset Y '={ y of chaos sequence Y1, y2, y3..., y10000Call number sequence 1,2,3 ..., It 10000 } is sequence J ';By constituent element (yn, jn') with ynAscending sort is carried out for primary key, the sequence J ' after sequence is denoted as Sequence Q '.
Step 5.4, if subset Z '={ z of chaos sequence Z1, z2, z3..., z10000Call number sequence 1,2,3 ..., It 10000 } is sequence I;By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence Arrange T.
Step 6: scramble is carried out to the header file of dem data
Cryptographic operation is carried out to cellsize, xllcorner and yllcorner according to formula (4), obtains encryption data scellsize、sxllcornerAnd syllcorner
Step 7: elevation scramble is carried out to matrix A according to sequence S, T
Step 7.1, by the height value C of any of matrix AmnSwitch to 14 binary number representations, wherein m and n is to correspond to Line number and row number;m∈[1,M],n∈[1,N].
Step 7.2, if m+n is odd number, first by CmnLow 7 swapped with high 7;It is constant if m+n is even number; Choose the one 14 seat sequence { s of Sm+n,sm+n+1,sm+n+2,…,sm+n+13Step-by-step and CmnExclusive or.
Step 7.3, converting decimal number for the result after exclusive or indicates, the height value C ' after being changedmn
Step 7.4, it is based on C 'mn, temporary variable b is generated according to formula (5);
B=C 'mn modρ (5)。
Step 7.5, the element that searching value is b is traversed in sequence T, its sequence number is denoted as serialID, then according to public affairs Formula (6) calculates C "mn
C″mn=C 'mn-b+serialID (6)。
Circulation execute step 7.1- step 7.5, the every bit in matrix A is all as above operated, obtain new matrix A ', Wherein m and n is corresponding line number and row number.
Step 8: according to sequence Q, Q ' to matrix A ' carry out position scramble:
Since matrix A ' first trip first, circulation executes step 8.1- step 8.4, one by one by matrix A ' middle Elements C "mn With C "m′n′Location swap obtains matrix A ";Matrix A " is to the final result after DEM scramble.
Step 8.1, according to formula (7), using matrix A ' in each Elements C "mnLine number m, generate temporary variable p;
P=m mod ρ (7).
Step 8.2, traversal finds the element equal with p value in sequence Q, remembers and is designated as serialID ' under it, then according to public affairs Formula (8) generates m ';
M '=m-p+serialID ' (8).
Step 8.3, according to formula (9), using matrix A ' in Elements C "mnRow number n, generate p ';
P '=n mod ρ (9).
Step 8.4, the element equal with p ' value is found in the middle traversal of sequence Q ', remembers and be designated as serialID " under it, then basis Formula (10) generates n ';
N '=n-p '+serialID " (10).
Step 9: the txt file based on the data after scrambling encryption, after generating scrambling encryption.
Step 10: it is based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstilees Txt file, is converted to the dem data of Esri Grid format by lattice " operation.
(2) DEM scramble restoring method (reduction process of DEM scramble), includes the following steps:
Step A: being based on ArcMap software, by " ArcToolbox- > crossover tool -> by grid produces -> and grid turns ASCII " operation, converts dem data to the txt file of ASCII coding;Matrix A is read data to from txt ".
Step B: it is M that the DEM after scramble, which is stored in line number with behavior main sequence, and columns is the matrix A of N " in, wherein M is to set The line number of DEM after unrest, N are the columns of the DEM after scramble, and dem data after reading out scramble in the header file of DEM Pixel size scellsize, upper left corner x origin coordinates sxllcornerWith upper left corner y origin coordinates syllcorner
Step C: input x1、y1、z1As the initial value of chaos system, and x1∈ (0,1), y1∈ (0,1), z1∈(0,1).It is defeated Enter the value of scramble factor ρ, and ρ ∈ [1,10000].The value of defined parameters σ, and σ ∈ (0,1).
Step D: according to formula (1), chaos sequence X, Y and Z are generated;Wherein X={ xk| k=1,2,3 ..., max { M+N+ 13,10000 } }, Y={ yk| k=1,2,3 ..., max { M+N+13,10000 } }, Z={ zk| k=1,2,3 ..., max { M+N+ 13,10000 } }.
Step E: sequence S, J, Q, J ', Q ', I and T are obtained
E.1 step, according to formula (2) and (3), carries out nonlinear discretization, formation sequence S, S={ s to chaos sequence Zk | k=1,2,3 ..., M+N+13 }.
Step E.2, if the subset X of chaos sequence X '={ x1, x2, x3..., x10000Call number sequence 1,2,3 ..., It 10000 } is sequence J;By constituent element (xn, jn) with xnAscending sort is carried out for primary key, the sequence J after sequence is denoted as sequence Arrange Q;
Step E.3, if subset Y '={ y of chaos sequence Y1, y2, y3..., y10000Call number sequence 1,2,3 ..., It 10000 } is sequence J ';By constituent element (yn, jn') with ynAscending sort is carried out for primary key, the sequence J ' after sequence is denoted as Sequence Q '.
Step E.4, if subset Z '={ z of chaos sequence Z1, z2, z3..., z10000Call number sequence 1,2,3 ..., It 10000 } is sequence I.By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence Arrange T.
Step F: the header file of DEM is restored
According to formula (11) to scellsize、sxllcornerAnd syllcornerRestoring operation is carried out, restoring data is obtained Cellsize, xllcorner and yllcorner;
The position after scramble in step G: according to sequence Q and Q ' to matrix A " restores
Since matrix A " footline terminal column, circulation execute step G.1- step G.1, one by one forward by matrix A ' middle element C″m′n′With C "mnExchange, obtain matrix A ', wherein m and n be matrix A ' in corresponding line number and row number:
G.1 step, according to formula (12), utilizes matrix A " in Elements C "m′n′Line number m ', generate serialID ';Its Middle m ' and n ' is corresponding line number and row number
SerialID '=m ' mod ρ (12).
G.2 step, finds the element that call number in sequence Q is serialID ', remember that its value is p, raw according to formula (13) At m;
M=m '+p-serialID ' (13).
G.3 step, according to formula (14), utilizes matrix A " in Elements C "m′n′Row number n ', generate serialID ";
SerialID ' '=n ' mod ρ (14).
G.4 step, finds the element that the middle call number of sequence Q ' is serialID ' ', remember that its value is p ', according to formula (15), Generate n;
N=n '+p '-serialID " (15).
Step H: according to sequence S, T to matrix A ' in data carry out elevation reduction
Circulation execute step H.2- step H.5, to matrix A ' in each dot cycle execute aforesaid operations, obtain matrix A, Square
Battle array A is the final result after restoring:
Step H.1, according to formula (16), using matrix A ' in Elements C "mn, generate serialID;
SerialID=C "mn modρ (16)。
H.2 step, finds the element that matrix A ' middle call number is serialID, remember that its value is b, then according to formula (17), It obtains
C′mn=C "mn+b-serialID (17)。
Step H.3, by C 'mnWith 14 binary number representations, wherein [1, M] m ∈, n ∈ [1, N].
H.4 step, chooses the one 14 seat sequence { S of Sm+n,SM+n+1,Sm+n+2,…,Sm+n+13And C 'mn14 binary systems Number carries out step-by-step xor operation;If m+n is odd number, low 7 of exclusive or result are swapped with high 7, if m+n is even Number is then constant.
H.5 step, converts the decimal system for transformed height value and obtains Cmn
Step I: being based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstilees Txt file, is converted to the dem data of Esri Grid format, completes the reduction treatment of DEM by lattice " operation.
The method of the present invention utilizes three-dimensional chaos technology, respectively by header file scramble, set to elevation scramble and to position Disorderly, scrambling encryption and the reduction for DEM are formed, can effectively be solved in the safe transmission and encapsulation storage link of dem data Geography information safety problem.
Detailed description of the invention
Flow chart Fig. 1 of the invention (a. scrambling encryption process, b. restore process).
Fig. 2 experimental data.
Processing result after Fig. 3 scrambling encryption.
Processing result after Fig. 4 reduction.
Specific embodiment
It is described in further details with reference to the accompanying drawings and examples
Embodiment 1
What this example was chosen is the Mount Lushan part dem data of 1:50000, and data format is Esri Grid format.For number According to the conversion of format, reading data, scrambling encryption, reduction whole process, provide one embodiment of the present of invention.
1, the scrambling encryption process of the DEM based on chaos sequence
Step 11:
1) data are opened in ArcMap, produced with ArcToolbox- > crossover tool -> by grid -> grid turns ASCII, it will Dem data is converted into the txt file of ASCII coding.The data that this example is chosen Three-dimensional Display such as Fig. 2 in ArcScene.
Step 12:
Firstly, reading the header file of the dem data of txt format.Wherein xllcorner=390996, yllcorner= 3274219, cellsize=5.Secondly, reading each point height value.What is opened up in the example is 935 rows, the two-dimentional battle array of 1220 column Column.
Step 13: the initial value x of input three-dimensional chaos sequence1=0.21, y1=0.32, z1=0.44.And σ=0.45 is set, ρ=10000.
Step 14: according to formula (1), chaos sequence X, X=that formation sequence length is 2,168 0.21,0.97, 0.81 ..., 0.88 }, chaos sequence Y, Y={ 0.32,0.94,0.63 ..., 0.77 } and sequence length that sequence length is 2168 For 2168 chaos sequence Z, Z={ 0.44,0.91,0.45 ..., 0.67 }.
Step 15: obtaining sequence S, J, Q, J ', Q ', I and T
1) nonlinear discretization is carried out to chaos sequence Z.The 0-1 sequence containing 2168 elements is obtained according to formula (2), (3) Arrange S, S={ 0,1,0,1 ..., 1 }.
2) subset X '={ x of chaos sequence X is set1, x2, x3..., x10000In element call number sequence 1,2, It 3 ..., 10000 } is sequence J.By constituent element (xn, jn) with xnAscending sort is carried out for primary key, by the sequence J after sequence It is denoted as sequence Q, Q={ 2,4,6 ..., 2167,1 }.
3) subset Y '={ y of chaos sequence Y is set1, y2, y3..., y10000In element call number sequence 1,2,3 ..., It 10000 } is sequence J '.By constituent element (yn, jn') with ynAscending sort is carried out for primary key, the sequence J ' after sequence is denoted as Sequence Q ', Q '={ 2,4,6 ..., 2167,1 }.
4) subset Z '={ z of chaos sequence Z is set1, z2, z3..., z10000Call number sequence { 1,2,3 ..., 10000 } For sequence I.By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence T, T= { 5,7,9 ..., 3,1 }.
Step 16: carrying out header file scramble.
Cellsize=5, xllcorner=390996 and yllcorner=3274219 are set according to formula (14) Random cryptographic operation obtains scrambling encryption data Scellsize=1140697, Sxllcorner=1347720 and Syllcorner= 2134583。
Step 17: carrying out elevation scramble.
1) with m=15, for n=98.It is with 14 binary number representations by the height value 202 at the point 00000011001010, it is denoted as Cmn(m, n are respectively ranks number, m ∈ [1,935], n ∈ [1,1220]).
2) m+n=113 is odd number, then swaps low 7 with high 7, obtain 10010100000001.It chooses discrete Change the partial sequence S generated113,S114, S115..., S126With CmnExclusive or, i.e., by 01010101010101 and 10010100000001 Carry out exclusive or.
3) decimal system is converted by the result 11000001010100 after exclusive or, the height value C ' after being changedmn= 12372。
4) it is based on C 'mn, temporary variable b=2372 is generated according to formula (5).
5) traversal searches out the element that value is b, sequence number serialID=7368, then according to formula (6) in sequence T Calculate C 'mn=17368.
6) every bit in matrix A is all as above operated, obtain new matrix A '.Wherein m and n be corresponding line number with Row number.
Step 18: carrying out position scramble.
1) with m=15, for n=98, according to formula (7), using matrix A ' in Elements C "mnLine number m generate it is interim Variable p=15.
2) traversal finds the element equal with p value in sequence Q, subscript serialID '=1095, then according to formula (8), Generate m '=1095.
3) according to formula (9), using matrix A ' in Elements C "mnRow number n generate p '=98.
4) traversal finds element equal with p ' value in sequence Q ', subscript serialID "=48, then according to formula (10), n '=48 are generated.
5) since first trip first one by one by the middle Elements C of A ' "mnWith C "m′n′Location swap obtains matrix A ".A " is pair Final result after DEM scramble.
Step 19: the txt file based on the data after scrambling encryption, after generating scrambling encryption.
Step 20: it is based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstilees Txt file, is converted to the dem data of Esri Grid format, completes the reduction treatment of DEM by lattice " operation.Effect after scramble It is checked in ArcScene, such as Fig. 3.
2. reduction process
Step 21: it is based on ArcMap software, by " ArcToolbox- > crossover tool -> by grid produces -> and grid turns ASCII " operation, converts dem data to the txt file of ASCII coding.
Step 22: firstly, reading the file header of the dem data of txt format.Wherein Scellsize=1140697, Sxllcorner =1347720 and Syllcorner=2134583., relevant parameter is saved.Secondly, reading each point height value.It is opened up in the example Be 935 rows, the two-dimensional arrays of 1220 column.
Step 23: generating chaos sequence.
Input the initial value x of three-dimensional chaos sequence1=0.23, y1=0.24, z1=0.25.σ=0.45, ρ=10000 are set.
Step 24: according to formula (1), chaos sequence X, X=that formation sequence length is 2,168 0.21,0.97, 0.81 ..., 0.88 }, chaos sequence Y, Y={ 0.32,0.94,0.63 ..., 0.77 } and sequence length that sequence length is 2168 For 2168 chaos sequence Z, Z={ 0.44,0.91,0.45 ..., 0.67 }.
Step 25: obtaining sequence S, J, Q, J ', Q ', I and T
Nonlinear discretization is carried out to chaos sequence Z.The 0-1 sequence containing 2168 elements is obtained according to formula (2) and (3) S, S={ 0,1,0,1 ..., 1 }.
2) subset X '={ x of chaos sequence X is set1, x2, x3..., x10000In element call number sequence 1,2, It 3 ..., 10000 } is sequence J.By constituent element (xn, jn) with xnAscending sort is carried out for primary key, by the sequence J after sequence It is denoted as sequence Q, Q={ 2,4,6 ..., 2167,1 }.
3) subset Y '={ y of chaos sequence Y is set1, y2, y3,..., y10000In element call number sequence 1,2, It 3 ..., 10000 } is sequence J '.By constituent element (yn, jn') with ynAscending sort is carried out for primary key, by the sequence after sequence J ' is denoted as sequence Q ', Q '={ 2,4,6 ..., 2167,1 }.
4) subset Z '={ z of chaos sequence Z is set1, z2, z3..., z10000Call number sequence 1,2,3 ..., It 10000 } is sequence I.By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence Arrange T, T={ 5,7,9 ..., 3,1 }.
Step 26: header file reduction.
According to formula (14) to Scellsize=1140697, Sxllcorner=1347720 and Syllcorner=2134583 carry out Restoring operation obtains restoring data cellsize=5, xllcorner=390996 and yllcorner=3274219.
Step 27: the reduction of position scramble.
Detailed process is as follows:
1) it with m '=1095, for n '=48, according to formula (12), utilizes matrix A " in Elements C "m′n′Line number m ' =1095 generate serialID '=1095.Wherein m ' and n ' is corresponding line number and row number.
2) element that call number is serialID ' in sequence Q is found, p=15 is generated, then according to formula (13), generates m= 15。
3) it according to formula (14), utilizes matrix A " in Elements C "m′n′Row number n '=48, generate serialID "=48.
4) element of the middle Serial No. serialID " of sequence Q ' is found, value p '=98 generate n then according to formula (15) =98.
5) from footline terminal column one by one forward by the middle Elements C of A ' "m′n′With C "mnExchange, obtain matrix A '.Wherein m and n is A ' In corresponding line number and row number.
Step 27: elevation reduction.
1) with m=15, n=98, for corresponding elevation is 17368, serialID=7368 is generated according to formula (16).
2) element that the middle call number of sequence A ' is serialID is found, value b=2372 is obtained then according to formula (17) C′mn=12372.
3) by C 'mnWith 14 binary number representations, wherein [1, M] m ∈, n ∈ [1, N].
4) the partial sequence S that discretization generates is chosen113,S114, S115..., S126With CmnThat is, exclusive or will 01010101010101 and 11000001010100 carry out exclusive or, obtain 10010100000001, because m+n is odd number, It exchanges the first seven position and latter seven obtains 00000011001010.
3) decimal system is converted by the result after exclusive or, the height value C ' after being changedmn=202;
5) decimal system is converted by transformed height value, obtains matrix A, A is the final result after restoring.
Step 28: based on the data after reduction treatment, the txt file of the DEM after generating reduction.
Step 29: with ArcToolbox- in ArcMap > crossover tool -> switch to grid -> ASCII and turnstilees lattice, it will The txt file of ASCII coding is converted into Esri Grid format and shows.The data that this example is chosen are three-dimensional aobvious in ArcScene Show such as Fig. 4.
Beneficial effects of the present invention: scrambling encryption and reduction treatment by being directed to dem data can solve safe and efficiently The certainly geography information safety problem in the safe transmission of dem data and encapsulation storage link.

Claims (2)

1. a kind of scrambling encryption method of DEM, its step are as follows:
Step 1: be based on ArcMap software, pass through ArcToolbox- > crossover tool -> by grid produce -> grid turns ASCII behaviour Make, converts the dem data of Esri Grid format to the txt file of ASCII coding;
Step 2: by txt file in behavior main sequence deposit one M × N matrix A, wherein M is the line number of DEM, N is the columns of DEM, And the Pixel size cellsize of DEM is read out from the header file of DEM, upper left corner x origin coordinates xllcorner and the upper left corner Y origin coordinates yllcorner;
Step 3: input x1、y1、z1As the initial value of chaos system, and x1∈ (0,1), y1∈ (0,1), z1∈ (0,1);Input is set The value of random factor ρ, and ρ ∈ [1,1000];The value of defined parameters σ, and σ ∈ (0,1);
Step 4: according to formula (1), generating chaos sequence X, Y and Z;Wherein X={ xk| k=1,2,3 ..., max M+N+13, 10000 } }, Y={ yk| k=1,2,3 ..., max { M+N+13,10000 } }, Z={ zk| k=1,2,3 ..., max { M+N+ 13,10000 } };
Step 5: obtaining sequence S, J, Q, J ', Q ', I and T;The wherein sequence that S generates for chaos sequence Z progress nonlinear discretization Column, J, Q are the sequence that position shuffle operation is carried out to line number, and J ', Q ' are the sequence that position shuffle operation is carried out to row number, I and T For the sequence for carrying out position shuffle operation to Z value;
Step 5.1, according to formula (2) and (3), nonlinear discretization, formation sequence S, S={ s are carried out to chaos sequence Zk| k= 1,2,3 ..., M+N+13 };
Step 5.2, if the subset X of chaos sequence X '={ x1, x2, x3..., x10000Call number sequence 1,2,3 ..., It 10000 } is sequence J;By constituent element (xn, jn) with xnAscending sort is carried out for primary key, the sequence J after sequence is denoted as sequence Arrange Q;
Step 5.3, if subset Y '={ y of chaos sequence Y1, y2, y3..., y10000Call number sequence 1,2,3 ..., It 10000 } is sequence J ';By constituent element (yn, jn') with ynAscending sort is carried out for primary key, the sequence J ' after sequence is denoted as Sequence Q ';
Step 5.4, if subset Z '={ z of chaos sequence Z1, z2, z3..., z10000Call number sequence { 1,2,3 ..., 10000 } For sequence I;By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence T;
Step 6: scramble is carried out to the header file of dem data
Cryptographic operation is carried out to cellsize, xllcorner and yllcorner according to formula (4), obtains encryption data scellsize、sxllcornerAnd syllcorner
Step 7: elevation scramble is carried out to matrix A according to sequence S, T
Step 7.1, by the height value C of any of matrix AmnSwitch to 14 binary number representations, wherein m and n is corresponding row Number and row number;M ∈ [1, M], n ∈ [1, N];
Step 7.2, if m+n is odd number, first by CmnLow 7 swapped with high 7;It is constant if m+n is even number;It chooses The one 14 seat sequence { s of SM+n,sm+n+1, sm+n+2..., sm+n+13Step-by-step and CmnExclusive or;
Step 7.3, converting decimal number for the result after exclusive or indicates, the height value C ' after being changedmn
Step 7.4, it is based on C 'mn, temporary variable b is generated according to formula (5);
B=C 'mnmod ρ (5);
Step 7.5, the element that searching value is b is traversed in sequence T, its sequence number is denoted as serialID, then according to formula (6) Calculate C "mn
C″mn=C 'mn-b+serialID (6);
Circulation execute step 7.1- step 7.5, the every bit in matrix A is all as above operated, obtain new matrix A ', wherein M and n is corresponding line number and row number;
Step 8: according to sequence Q, Q ' to matrix A ' carry out position scramble:
Since matrix A ' first trip first, circulation executes step 8.1- step 8.4, one by one by matrix A ' middle Elements C "mnWith C″m′n′Location swap obtains matrix A ";Matrix A " is to the final result after DEM scramble;
Step 8.1, according to formula (7), using matrix A ' in each Elements C "mnLine number m, generate temporary variable p;
P=m mod ρ (7);
Step 8.2, traversal finds the element equal with p value in sequence Q, remembers and is designated as serialID ' under it, then according to formula (8), m ' is generated;
M '=m-p+serialID ' (8);
Step 8.3, according to formula (9), using matrix A ' in Elements C "mnRow number n, generate p ';
P '=n mod ρ (9);
Step 8.4, the element equal with p ' value is found in the middle traversal of sequence Q ', remembers and be designated as serialID " under it, then according to formula (10), n ' is generated;
N '=n-p '+serialID " (10);
Step 9: the txt file based on the data after scrambling encryption, after generating scrambling encryption;
Step 10: it is based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstile lattice " behaviour Make, txt file is converted to the dem data of Esri Grid format.
2. a kind of restoring method of the DEM scramble after scrambling encryption method scrambling encryption with DEM described in claim 1, packet Include following steps:
Step A: being based on ArcMap software, by " ArcToolbox- > crossover tool -> by grid produce -> grid turn ASCII " Operation converts dem data to the txt file of ASCII coding;Matrix A is read data to from txt ";
Step B: it is M that the DEM after scramble, which is stored in line number with behavior main sequence, and columns is the matrix A of N " in, wherein M is after scramble DEM line number, N is the columns of the DEM after scramble, and the pixel of the dem data after reading out scramble in the header file of DEM Size scellsize, upper left corner x origin coordinates sxllcornerWith upper left corner y origin coordinates syllcorner
Step C: input x1、y1、z1As the initial value of chaos system, and x1∈ (0,1), y1∈ (0,1), z1∈ (0,1);Input is set The value of random factor ρ, and ρ ∈ [1,10000];The value of defined parameters σ, and σ ∈ (0,1);
Step D: according to formula (1), chaos sequence X, Y and Z are generated;Wherein X={ xk| k=1,2,3 ..., max M+N+13, 10000 } }, Y={ yk| k=1,2,3 ..., max { M+N+13,10000 } }, Z={ zk| k=1,2,3 ..., max M+N+13, 10000}};
Step E: sequence S, J, Q, J ', Q ', I and T are obtained
E.1 step, according to formula (2) and (3), carries out nonlinear discretization, formation sequence S, S={ s to chaos sequence Zk| k= 1,2,3 ..., M+N+13 };
Step E.2, if the subset X of chaos sequence X '={ x1, x2, x3..., x10000Call number sequence 1,2,3 ..., It 10000 } is sequence J;By constituent element (xn, jn) with xnAscending sort is carried out for primary key, the sequence J after sequence is denoted as sequence Arrange Q;
Step E.3, if subset Y '={ y of chaos sequence Y1, y2, y3..., y10000Call number sequence 1,2,3 ..., It 10000 } is sequence J ';By constituent element (yn, jn') with ynAscending sort is carried out for primary key, by the sequence J ' note after sequence For sequence Q ';
Step E.4, if subset Z '={ z of chaos sequence Z1, z2, z3..., z10000Call number sequence { 1,2,3 ..., 10000 } For sequence I;By constituent element (zn, in) with znAscending sort is carried out for primary key, the sequence I after sequence is denoted as sequence T;
Step F: the header file of DEM is restored
According to formula (11) to scellsize、sxllcornerAnd syllcornerCarry out restoring operation, obtain restoring data cellsize, Xllcorner and yllcorner;
The position after scramble in step G: according to sequence Q and Q ' to matrix A " restores
Since matrix A " footline terminal column, circulation execute step G.1- step G.1, one by one forward by matrix A ' middle Elements C "m′n′With C″mnExchange, obtain matrix A ', wherein m and n be matrix A ' in corresponding line number and row number:
G.1 step, according to formula (12), utilizes matrix A " in Elements C "m′n′Line number m ', generate serialID ': wherein m ' It is corresponding line number and row number with n '
SerialID '=m ' mod ρ (12): G.2 step, finds the element that call number in sequence Q is serialID ', remembers it Value is p, according to formula (13), generates m;
M=m '+p-serialID ' (13);
G.3 step, according to formula (14), utilizes matrix A " in Elements C "m′n′Row number n ', generate serialID ";
SerialID "=n ' mod ρ (14);
G.4 step, finds the element that the middle call number of sequence Q ' is serialID ", remember that its value is p ', according to formula (15), generate n;
N=n '+p '-serialID " (15);
Step H: according to sequence S, T to matrix A ' in data carry out elevation reduction
Circulation execute step H.2- step H.5, to matrix A ' in each dot cycle execute aforesaid operations, obtain matrix A, matrix A is the final result after restoring:
Step H.1, according to formula (16), using matrix A ' in Elements C "mn, generate serialID;
SerialID=C "mnmod ρ (16);
H.2 step, finds the element that matrix A ' middle call number is serialID, remember that its value is that b is obtained then according to formula (17)
C″mn=C "mn+b-serialID (17);
Step H.3, by C 'mnWith 14 binary number representations, wherein [1, M] m ∈, n ∈ [1, N];
H.4 step, chooses the one 14 seat sequence { S of sm+n, Sm+n+1, Sm+n+2..., Sm+n+13And C 'mn14 bits, Carry out step-by-step xor operation;If m+n is odd number, low 7 of exclusive or result are swapped with high 7, if m+n is even number, It is then constant;
H.5 step, converts the decimal system for transformed height value and obtains Cmn
Step I: being based on ArcMap software, by " ArcToolbox- > crossover tool -> switch to grid -> ASCII and turnstile lattice " behaviour Make, txt file is converted to the dem data of Esri Grid format, completes the reduction treatment of DEM.
CN201610911208.8A 2016-10-19 2016-10-19 A kind of DEM scrambling encryption and restoring method Active CN106650343B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610911208.8A CN106650343B (en) 2016-10-19 2016-10-19 A kind of DEM scrambling encryption and restoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610911208.8A CN106650343B (en) 2016-10-19 2016-10-19 A kind of DEM scrambling encryption and restoring method

Publications (2)

Publication Number Publication Date
CN106650343A CN106650343A (en) 2017-05-10
CN106650343B true CN106650343B (en) 2019-02-01

Family

ID=58856026

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610911208.8A Active CN106650343B (en) 2016-10-19 2016-10-19 A kind of DEM scrambling encryption and restoring method

Country Status (1)

Country Link
CN (1) CN106650343B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109448119B (en) * 2018-10-19 2022-04-19 深圳市工勘岩土集团有限公司 Method for applying Digital Elevation Model (DEM) in development of geographic information system
CN110460424B (en) * 2019-08-19 2020-07-31 兰州理工大学 Voice data encryption method and system supporting privacy protection
CN115865523B (en) * 2023-02-14 2023-04-28 杭银消费金融股份有限公司 Data encryption transmission method for information analysis system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077211A (en) * 2012-12-28 2013-05-01 南京师范大学 Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data
CN103870552A (en) * 2014-03-03 2014-06-18 南京师范大学 Scrambling and recovery method for GIS (Geographic Information System) vector data line and plane graphic layer
CN104008225A (en) * 2014-04-11 2014-08-27 北京工业大学 Grid digital elevation model (DEM) difference calculation method of urban surface drainage system
CN104751399A (en) * 2015-03-06 2015-07-01 南京师范大学 Information sharing based secret-associated linear geographic element pretence and recovery method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077211A (en) * 2012-12-28 2013-05-01 南京师范大学 Method for scrambling and reducing GIS (Geographic Information system) vector line Thiessen data
CN103870552A (en) * 2014-03-03 2014-06-18 南京师范大学 Scrambling and recovery method for GIS (Geographic Information System) vector data line and plane graphic layer
CN104008225A (en) * 2014-04-11 2014-08-27 北京工业大学 Grid digital elevation model (DEM) difference calculation method of urban surface drainage system
CN104751399A (en) * 2015-03-06 2015-07-01 南京师范大学 Information sharing based secret-associated linear geographic element pretence and recovery method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
不规则三角网DEM数字水印算法研究;陆尘;《中国优秀硕士学位论文全文数据库 信息科技辑》;20160215;全文

Also Published As

Publication number Publication date
CN106650343A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
CN106023051B (en) DNA image encryption method and system based on cloud model and hyperchaotic system
CN107659751B (en) Multi-image encryption method based on DNA coding and chaos
CN106650343B (en) A kind of DEM scrambling encryption and restoring method
CN112235481B (en) Image secret sharing method
CN108199828B (en) Method and device for encrypting color picture
Ye et al. Spatial image encryption algorithm based on chaotic map and pixel frequency
CN106530207A (en) Logistic chaotic mapping-based digital image encryption method
Kandar et al. Visual cryptography scheme for color image using random number with enveloping by digital watermarking
He et al. A weighted threshold secret sharing scheme for remote sensing images based on Chinese remainder theorem
Mokhtar et al. Colored image encryption algorithm using DNA code and chaos theory
Song et al. Multi-image reorganization encryption based on SLF cascade chaos and bit scrambling
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
CN103559678A (en) Scrambling and restoring method of shp line-face layer data
CN113902135A (en) Sample data volume joint expansion method, device, equipment, system and storage medium
CN103927572A (en) Encoding graph block and method and device for forming lattice graph through encoding graph block
Xu et al. A novel image encryption scheme based on a nonlinear chaotic map
CN112887509A (en) Fusion encryption method based on multiple chaotic systems
CN105046639A (en) Grayscale image scrambling method based on one-dimensional cellular automaton
CN104766266A (en) Image scrambling method based on two-dimensional cellular automaton
CN116827509A (en) Image encryption method based on five-dimensional conserved hyperchaotic system and bit plane segmentation diffusion
CN112184841B (en) Block replacement generation type information hiding and recovering method, equipment and medium
CN114978466A (en) Fractal-like model and Hilbert synchronous scrambling diffusion encryption method
CN113779611A (en) Vector geographic data encryption method and decryption method based on three-dimensional Arnold transformation
CN104361550B (en) A kind of digital disorder method based on the labyrinth 2D BacterialGrowth
CN109558701B (en) Medical CT image secret sharing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant