CN109002724B - DEM local decryption and recovery method based on tight support radial basis function - Google Patents
DEM local decryption and recovery method based on tight support radial basis function Download PDFInfo
- Publication number
- CN109002724B CN109002724B CN201810579637.9A CN201810579637A CN109002724B CN 109002724 B CN109002724 B CN 109002724B CN 201810579637 A CN201810579637 A CN 201810579637A CN 109002724 B CN109002724 B CN 109002724B
- Authority
- CN
- China
- Prior art keywords
- decryption
- local
- basis function
- dem
- dem data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Complex Calculations (AREA)
Abstract
The invention discloses a DEM local decryption and recovery method based on a tightly-supported radial basis function, which mainly comprises the following steps: (1) carrying out decryption processing on a local area of DEM data, wherein the decryption processing comprises the steps of control point selection and transformation quantity setting, tight support radial basis function decryption model establishment, local DEM data decryption processing and the like; (2) and recovering the local decrypted DEM data, wherein the recovering comprises the steps of key decryption reading, local recovery model establishment, local decrypted DEM data recovery and the like. The method has the characteristics of tight support, accurate control point transformation, high safety and the like, and can provide technical support for the safe sharing of DEM data.
Description
Technical Field
The invention relates to the technical field of geographic information safety, in particular to a DEM local decryption and recovery method based on a tightly-supported radial basis function.
Background
The DEM is used as geospatial data, is mainly used for describing the size of a terrain shape and the fluctuation characteristics, and is widely applied to the fields of terrain analysis, engineering construction and the like. Meanwhile, DEM data is used as a national basic information strategic resource, has an important role in social development, economic construction and national defense construction, and can be shared and applied only by converting secret DEM data into DEM data meeting public precision requirements through technical means such as decryption and the like.
DEM data decryption includes both global decryption and local decryption. Local decryption only carries out vertical direction deviation on DEM data of a local sensitive area, so that deformation is uniform and gradual, and a local vertical topological relation is kept. In addition, DEM data in a certain radius around the local area are correspondingly shifted, the shift amount is reduced along with the increase of the distance, and DEM data outside the distance larger than the radius are not processed. Currently, geometric accuracy decryption of geographic data is mainly global, and less research is done on local decryption. On the other hand, some DEM data security protection methods, such as the DEM data disguising technology, process DEM data into elevation data without practical significance, and cannot meet the shared application of DEM data.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a DEM local decryption and recovery method based on a tight support radial basis function.
The invention adopts the following technical scheme for solving the technical problems:
the DEM local decryption and recovery method based on the tight support radial basis function provided by the invention comprises the following steps:
the decryption processing comprises the steps of selecting decryption control points and setting decryption transformation quantity, establishing a local decryption model and carrying out local decryption processing on DEM data according to the local decryption model to obtain the DEM data after decryption processing;
the specific process of selecting the decryption control points, setting the decryption transformation amount and establishing the local decryption model is as follows:
(1.1) selecting a decryption control point and setting a decryption conversion amount: selecting sensitive terrain feature points as density-losing control points, wherein the sensitive terrain feature points comprise valley points and ridge points, and giving density-losing transformation quantity delta ziObtaining the coordinate (x) of the decryption control pointi,yi) 1,2,. n,; wherein x isiIs the abscissa, y, of the ith decryption control pointiIs the ordinate of the ith decryption control point, and n is the number of the decryption control points;
(1.2) establishing a local decryption model based on a tight support radial basis function;
(1.2.1) selecting a positive clamping support radial basis functionAs a tight support basis function, the formula is shown in formula (1):
wherein r isThe parameters of the basis functions are closely supported,r0is the tight support radius of the tight support basis function, X is the input elevation point, XiIs the ith decryption control point; (1-r)+Is a tight support domain control function, which is defined as:
(1.2.2), setting tight support radius: the tight support radius is at least 100 times greater than the displacement of the release;
(1.2.3) establishing a tight support radial basis function interpolation model F (X) according to the basis function selected in the step (1.2.1) and the set tight support radius, wherein the tight support radial basis function interpolation model F (X) is shown in a formula (3):
wherein the content of the first and second substances,is a closely supported basis function, | is an Euclidean 2 norm, wiIs the ith linear combination coefficient;
(1.2.4) substituting the decryption control point and the decryption transformation quantity into a formula (3) to obtain an interpolation model solving equation expression, as shown in the formula (4):
order to Wherein, A is a Gaussian matrix, w is a weight matrix, and y is a sample output matrix; equation writingIn the form of a vector:
A·w=y(5);
(1.2.5) solving the formula (5) through a matrix calculation rule to obtain a weight matrix w:
w=A-1y(6);
(1.2.6) generating a local decryption model according to the weight matrix as shown in the formula (7):
wherein, tZcThe elevation after declamping at the c-th elevation point, sZcThe elevation before the density removal of the c-th elevation point;
will tightly support the radius r0Combining the weight matrix w and the decryption control point into a key, and encrypting and storing the key by using a DES algorithm;
and 2, recovering the DEM data subjected to decryption processing in the step 1, wherein the recovery comprises key decryption reading, model establishment and local decryption data recovery processing.
As a further optimization scheme of the DEM local decryption and recovery method based on the tightly-supported radial basis function, the method for performing local decryption on DEM data specifically comprises the following steps:
(1.3.1) converting the DEM data into an elevation point coordinate set { (x)c,yc,sZc) 1, 2., m }, where x iscIs the abscissa, y, of the c-th elevation pointcIs the ordinate of the c-th elevation point, and m is the number of the elevation points;
(1.3.2) carrying out decryption processing on the elevation point coordinate set according to a formula (7) to obtain a decrypted elevation point set { (x)c,yc,tZc)|c=1,2,...,m};
And (1.3.3) storing and outputting the decrypted elevation point set according to the data structure of the input DEM data.
As a further optimization scheme of the DEM local decryption and recovery method based on the tight support radial basis function, in the step 2, the DEM data after decryption is recovered, and the specific steps are as follows:
(2.1) reading the key file, decrypting and extracting parameters by using a DES algorithm: tight support radius r0Weight matrix w ═ w1 w2…wn]TAnd a decryption control point P ═ X1 X2…Xn]TWherein, the superscript T is transposition;
(2.2) constructing a local recovery model according to the parameters extracted in the step (2.1), wherein the local recovery model is shown as a formula (8):
and (2.3) restoring the DEM data after the decryption treatment by using a formula (8).
As a further optimization scheme of the DEM local decryption and recovery method based on the tight support radial basis function, the step (2.3) comprises the following specific steps:
(2.3.1) converting the DEM data after the decryption treatment into an elevation point coordinate set { (x)c,yc,tZc)|c=1,2,...,m};
(2.3.2) restoring the coordinate set of the elevation points in the (2.3.1) according to a formula (8) to obtain a restored elevation point set { (x)c,yc,sZc)|c=1,2,...,m};
And (2.3.3) storing and outputting the recovered elevation point set according to the data structure of the input decrypted DEM data.
As a further optimization scheme of the DEM local decryption and recovery method based on the tight support radial basis function, r0Is 1%.
Compared with the prior art, the invention adopting the technical scheme has the following technical effects:
(1) according to the method, a local sensitive area of DEM data is decrypted to generate a key, and the decrypted DEM data can be subjected to lossless recovery according to the key;
(2) the method has the characteristics of local tight support, uniform and gradual deformation, high safety and the like, improves the reliability of DEM data decryption, is favorable for perfecting a geographic information safety protection theory and method system, and can be used for aspects of public sharing, transmission and the like of DEM data.
Drawings
FIG. 1 is a DEM data local decryption flow chart according to the invention;
FIG. 2 is a flow chart of the DEM data recovery after local decryption according to the present invention;
FIG. 3 is DEM experimental data with local decryption applied in an embodiment of the present invention;
FIG. 4 is a graph of the error distribution in a local region of decryption in an embodiment of the present invention;
FIG. 5 is a diagram illustrating the effect of partial decryption in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
According to the DEM local decryption and recovery method based on the tightly-supported radial basis function, the local decryption process of DEM data is shown in figure 1, and the recovery process of DEM data is shown in figure 2.
In this embodiment, DEM data (as shown in fig. 3) of a certain area is selected as DEM data to be decrypted, the coordinate system is WGS84, the size is 2335m by 2250m, and the cell resolution is 5m by 5 m. The method comprises the following steps:
local decryption of DEM data
Step 1.1: opening DEM data to be decrypted, and acquiring a minimum bounding rectangle R of the data, wherein the coordinates of the upper left corner of R are (399298.014, 3553907.950), and the coordinates of the lower right corner of R are (401633.015, 3551657.950);
step 1.2: selecting 6 characteristic points from the DEM data range as model control points, and randomly endowing the control points with disturbance quantity to obtain a control point set:
disturbance quantity aggregation:
ΔZs={4.613,3.547,3.893,4.452,4.894,3.197};
step 1.3: selecting a positive tightening support radial basis function proposed by Wendland as a basis function of the invention, as shown in formula (1);
step 1.4: selecting a tight support radius r according to the disturbance quantity set0=720;
Step 1.5: substituting the control points and the transformation quantity into a formula (3), and solving by using a matrix calculation formula to obtain a weight matrix:
w=[3.70457773,2.72831675,0.97920387,3.92340938,3.91885782,2.24911317];
step 1.6: according to the calculated weight, a DEM data local decryption model is established, as shown in a formula (7);
step 1.7: obtaining an elevation point set GCs { (x) of DEM datac,yc,sZc) 1,2,., m }, wherein m 210150;
step 1.8: according to the formula (7), the elevation point set GCs are subjected to decryption treatment, and the decrypted elevation point set GCs' is { (x)c,yc,tZc) I c ═ 1,2,. and m }, and the error distribution in the decryption is shown in fig. 4.
Step 1.9: outputting the decrypted elevation point set according to the data structure of the input DEM data, wherein the superposition effect of the input DEM data and the elevation point set is shown in FIG. 5. Tight support radius r0And combining the weight matrix w and the control point into a key, encrypting by using a DES algorithm and storing in Key.
(II) DEM data recovery process after decryption
Step 2.1: reading a Key file Key.txt, and extracting a Key Key after decryption by using a DES algorithm;
step 2.2: according to the support radius r in the key0Establishing a recovery model for the weight matrix w and the control points, wherein the recovery model is shown as a formula (8);
step 2.3: opening the DEM data after decryption, and acquiring an elevation point set EGCs { (x) of the DEM datac,yc,tZc) 1,2,., m }, wherein m 210150;
step 2.4: restoring the elevation point set EGCs by using a restoration model to obtain a restored elevation point set RGCs { (x)c,yc,sZc)|c=1,R,...,m};
Step 2.5: and storing and outputting the recovered high-level point set RGCs according to the data structure of the input DEM decryption data.
The method can effectively guarantee the safety of the DEM data, simultaneously maintains the vertical topological relation of the DEM data to be basically unchanged, and provides technical support for geographic information safety and geographic data sharing.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.
Claims (4)
1. A DEM local decryption and recovery method based on a tightly-supported radial basis function is characterized by comprising the following steps:
step 1, carrying out decryption processing on DEM data to obtain the DEM data after the decryption processing;
the decryption processing comprises the steps of selecting decryption control points and setting decryption transformation quantity, establishing a local decryption model and carrying out local decryption processing on DEM data according to the local decryption model to obtain the DEM data after decryption processing;
the specific process of selecting the decryption control points, setting the decryption transformation amount and establishing the local decryption model is as follows:
(1.1) selecting a decryption control point and setting a decryption conversion amount: selecting sensitive terrain feature points as density-losing control points, wherein the sensitive terrain feature points comprise valley points and ridge points, and giving density-losing transformation quantity delta ziObtaining the coordinate (x) of the decryption control pointi,yi) I ═ 1,2, …, n; wherein x isiIs the abscissa, y, of the ith decryption control pointiIs the ordinate of the ith decryption control point, and n is the number of the decryption control points;
(1.2) establishing a local decryption model based on a tight support radial basis function;
(1.2.1) selecting a positive clamping support radial basis functionAs a tight support basis function, the formula is shown in formula (1):
wherein r is a parameter of the tight support basis function,r0is the tight support radius of the tight support basis function, X is the input elevation point, XiIs the ith decryption control point; (1-r)+Is a tight support domain control function, which is defined as:
(1.2.2), setting tight support radius: the tight support radius is at least 100 times greater than the displacement of the release;
(1.2.3) establishing a tight support radial basis function interpolation model F (X) according to the basis function selected in the step (1.2.1) and the set tight support radius, wherein the tight support radial basis function interpolation model F (X) is shown in a formula (3):
wherein the content of the first and second substances,is a closely supported basis function, | is an Euclidean 2 norm, wiIs the ith linear combination coefficient;
(1.2.4) substituting the decryption control point and the decryption transformation quantity into a formula (3) to obtain an interpolation model solving equation expression, as shown in the formula (4):
order to Wherein, A is a Gaussian matrix, w is a weight matrix, and y is a sample output matrix; the equation is written in the form of a vector:
A·w=y (5);
(1.2.5) solving the formula (5) through a matrix calculation rule to obtain a weight matrix w:
w=A-1y (6);
(1.2.6) generating a local decryption model according to the weight matrix as shown in the formula (7):
wherein, tZcThe elevation after declamping at the c-th elevation point, sZcThe elevation before the density removal of the c-th elevation point;
will tightly support the radius r0Combining the weight matrix w and the decryption control point into a key, and encrypting and storing the key by using a DES algorithm;
step 2, recovering the DEM data subjected to decryption processing in the step 1, wherein the recovering comprises key decryption reading, model building and local decryption data recovery processing;
and 2, recovering the DEM data after decryption, which comprises the following specific steps:
(2.1) reading the key file, decrypting and extracting parameters by using a DES algorithm: tight support radius r0Weight matrix w ═ w1w2…wn]TAnddecker control point P ═ X1 X2…Xn]TWherein, the superscript T is transposition;
(2.2) constructing a local recovery model according to the parameters extracted in the step (2.1), wherein the local recovery model is shown as a formula (8):
and (2.3) restoring the DEM data after the decryption treatment by using a formula (8).
2. The DEM local decryption and recovery method based on the tightly-supported radial basis function as claimed in claim 1, wherein the specific steps of local decryption processing on DEM data are as follows:
(1.3.1) converting the DEM data into an elevation point coordinate set { (x)c,yc,sZc) 1,2, …, m, where xcIs the abscissa, y, of the c-th elevation pointcIs the ordinate of the c-th elevation point, and m is the number of the elevation points;
(1.3.2) carrying out decryption processing on the elevation point coordinate set according to a formula (7) to obtain a decrypted elevation point set { (x)c,yc,tZc)|c=1,2,…,m};
And (1.3.3) storing and outputting the decrypted elevation point set according to the data structure of the input DEM data.
3. The DEM local decryption and restoration method based on the tightly-supported radial basis function as claimed in claim 1, wherein the step (2.3) comprises the following specific steps:
(2.3.1) converting the DEM data after the decryption treatment into an elevation point coordinate set { (x)c,yc,tZc)|c=1,2,…,m};
(2.3.2) restoring the coordinate set of the elevation points in the (2.3.1) according to a formula (8) to obtain a restored elevation point set { (x)c,yc,sZc)|c=1,2,…,m};
And (2.3.3) storing and outputting the recovered elevation point set according to the data structure of the input decrypted DEM data.
4. The DEM local decryption and recovery method based on the tightly-supported radial basis function as claimed in claim 1, wherein r is0Is 1%.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810579637.9A CN109002724B (en) | 2018-06-07 | 2018-06-07 | DEM local decryption and recovery method based on tight support radial basis function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810579637.9A CN109002724B (en) | 2018-06-07 | 2018-06-07 | DEM local decryption and recovery method based on tight support radial basis function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109002724A CN109002724A (en) | 2018-12-14 |
CN109002724B true CN109002724B (en) | 2021-03-23 |
Family
ID=64600019
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810579637.9A Active CN109002724B (en) | 2018-06-07 | 2018-06-07 | DEM local decryption and recovery method based on tight support radial basis function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109002724B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067159A (en) * | 2012-12-28 | 2013-04-24 | 南京师范大学 | Geographic information system (GIS) vector data reversible decryption method |
CN103093414A (en) * | 2013-01-22 | 2013-05-08 | 南京师范大学 | Decryption and recovery method of document object model (DOM) raster data |
CN103559452A (en) * | 2013-10-30 | 2014-02-05 | 南京师范大学 | Altitude data decryption and recovery method |
CN104077535A (en) * | 2014-06-19 | 2014-10-01 | 南京师范大学 | Graphic information system (GIS) vector data local decryption and restoring method |
CN104077536A (en) * | 2014-06-19 | 2014-10-01 | 南京师范大学 | Radial basis function based GIS (Geographic Information System) vector data reversible decryption method |
CN105608267A (en) * | 2015-12-21 | 2016-05-25 | 许昌学院 | Multivariable global optimization algorithm |
CN106504326A (en) * | 2016-10-27 | 2017-03-15 | 滁州学院 | Take the landform altitude sampled point encryption method of form precision into account |
CN106547724A (en) * | 2016-09-23 | 2017-03-29 | 武汉市工程科学技术研究院 | Theorem in Euclid space coordinate transformation parameter acquisition methods based on minimum point set |
CN106778347A (en) * | 2016-12-22 | 2017-05-31 | 南京师范大学 | A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function |
CN107944287A (en) * | 2017-12-05 | 2018-04-20 | 南京师范大学 | A kind of DEM geometric accuracies DecryptDecryption and restoration methods |
-
2018
- 2018-06-07 CN CN201810579637.9A patent/CN109002724B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103067159A (en) * | 2012-12-28 | 2013-04-24 | 南京师范大学 | Geographic information system (GIS) vector data reversible decryption method |
CN103093414A (en) * | 2013-01-22 | 2013-05-08 | 南京师范大学 | Decryption and recovery method of document object model (DOM) raster data |
CN103559452A (en) * | 2013-10-30 | 2014-02-05 | 南京师范大学 | Altitude data decryption and recovery method |
CN104077535A (en) * | 2014-06-19 | 2014-10-01 | 南京师范大学 | Graphic information system (GIS) vector data local decryption and restoring method |
CN104077536A (en) * | 2014-06-19 | 2014-10-01 | 南京师范大学 | Radial basis function based GIS (Geographic Information System) vector data reversible decryption method |
CN105608267A (en) * | 2015-12-21 | 2016-05-25 | 许昌学院 | Multivariable global optimization algorithm |
CN106547724A (en) * | 2016-09-23 | 2017-03-29 | 武汉市工程科学技术研究院 | Theorem in Euclid space coordinate transformation parameter acquisition methods based on minimum point set |
CN106504326A (en) * | 2016-10-27 | 2017-03-15 | 滁州学院 | Take the landform altitude sampled point encryption method of form precision into account |
CN106778347A (en) * | 2016-12-22 | 2017-05-31 | 南京师范大学 | A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function |
CN107944287A (en) * | 2017-12-05 | 2018-04-20 | 南京师范大学 | A kind of DEM geometric accuracies DecryptDecryption and restoration methods |
Non-Patent Citations (1)
Title |
---|
基于径向基函数的DLG几何精度脱密模型研究;高隆杰;《中国优秀硕士学位论文 信息科技辑》;20180430;第2-4章节 * |
Also Published As
Publication number | Publication date |
---|---|
CN109002724A (en) | 2018-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107944287B (en) | DEM geometric precision decryption and recovery method | |
CN107241182B (en) | Privacy protection hierarchical clustering method based on vector homomorphic encryption | |
CN103093414B (en) | A kind of DOM raster data DecryptDecryption and restoration methods | |
Feng et al. | A secure high-order Lanczos-based orthogonal tensor SVD for big data reduction in cloud environment | |
CN103761701A (en) | Color image watermarking method based on quaternion index matrix | |
Shi et al. | A Blockchain-based G-code protection approach for cyber-physical security in additive manufacturing | |
Yang et al. | Anti‐windup controller design for singularly perturbed systems subject to actuator saturation | |
Tolstykh et al. | Scenarios for the development of industrial complexes in the digital economy | |
Xun et al. | A robust zero-watermarking algorithm for vector digital maps based on statistical characteristics | |
Wu et al. | A grid-based secure product data exchange for cloud-based collaborative design | |
CN109002724B (en) | DEM local decryption and recovery method based on tight support radial basis function | |
Hindistan et al. | A hybrid approach with gan and dp for privacy preservation of iiot data | |
CN115102699A (en) | Data security deduplication and data recovery method, system, medium, device and terminal | |
Xun et al. | A robust zero-watermarking algorithm for 2D vector digital maps | |
Kong et al. | An information security method based on optimized high-fidelity reversible data hiding | |
Yang et al. | Accurate image-based pedestrian detection with privacy preservation | |
Peng et al. | A reversible watermarking for 2D vector map based on triple differences expansion and reversible contrast mapping | |
CN111192361B (en) | Geographic vector field data decryption and recovery method based on geometric algebra | |
GAO et al. | Research and application progress of blockchain in area of data integrity protection | |
Wei et al. | Stability and stabilization for delay delta fractional order systems: an LMI approach | |
CN115758429A (en) | Planning result data encryption method with separated space and attribute information | |
Gao et al. | Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach | |
Chen et al. | Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption | |
CN112883389A (en) | Reversible desensitization algorithm supporting feature preservation | |
Ma et al. | Remote Sensing Image Zero-Watermarking Algorithm Based on Accurate Polar Harmonic Fourier Moment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |