CN109002724B - DEM local decryption and recovery method based on tight support radial basis function - Google Patents

DEM local decryption and recovery method based on tight support radial basis function Download PDF

Info

Publication number
CN109002724B
CN109002724B CN201810579637.9A CN201810579637A CN109002724B CN 109002724 B CN109002724 B CN 109002724B CN 201810579637 A CN201810579637 A CN 201810579637A CN 109002724 B CN109002724 B CN 109002724B
Authority
CN
China
Prior art keywords
decryption
local
basis function
dem
dem data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810579637.9A
Other languages
Chinese (zh)
Other versions
CN109002724A (en
Inventor
周卫
唐家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201810579637.9A priority Critical patent/CN109002724B/en
Publication of CN109002724A publication Critical patent/CN109002724A/en
Application granted granted Critical
Publication of CN109002724B publication Critical patent/CN109002724B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Complex Calculations (AREA)

Abstract

The invention discloses a DEM local decryption and recovery method based on a tightly-supported radial basis function, which mainly comprises the following steps: (1) carrying out decryption processing on a local area of DEM data, wherein the decryption processing comprises the steps of control point selection and transformation quantity setting, tight support radial basis function decryption model establishment, local DEM data decryption processing and the like; (2) and recovering the local decrypted DEM data, wherein the recovering comprises the steps of key decryption reading, local recovery model establishment, local decrypted DEM data recovery and the like. The method has the characteristics of tight support, accurate control point transformation, high safety and the like, and can provide technical support for the safe sharing of DEM data.

Description

DEM local decryption and recovery method based on tight support radial basis function
Technical Field
The invention relates to the technical field of geographic information safety, in particular to a DEM local decryption and recovery method based on a tightly-supported radial basis function.
Background
The DEM is used as geospatial data, is mainly used for describing the size of a terrain shape and the fluctuation characteristics, and is widely applied to the fields of terrain analysis, engineering construction and the like. Meanwhile, DEM data is used as a national basic information strategic resource, has an important role in social development, economic construction and national defense construction, and can be shared and applied only by converting secret DEM data into DEM data meeting public precision requirements through technical means such as decryption and the like.
DEM data decryption includes both global decryption and local decryption. Local decryption only carries out vertical direction deviation on DEM data of a local sensitive area, so that deformation is uniform and gradual, and a local vertical topological relation is kept. In addition, DEM data in a certain radius around the local area are correspondingly shifted, the shift amount is reduced along with the increase of the distance, and DEM data outside the distance larger than the radius are not processed. Currently, geometric accuracy decryption of geographic data is mainly global, and less research is done on local decryption. On the other hand, some DEM data security protection methods, such as the DEM data disguising technology, process DEM data into elevation data without practical significance, and cannot meet the shared application of DEM data.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a DEM local decryption and recovery method based on a tight support radial basis function.
The invention adopts the following technical scheme for solving the technical problems:
the DEM local decryption and recovery method based on the tight support radial basis function provided by the invention comprises the following steps:
step 1, carrying out decryption processing on DEM data to obtain the DEM data after the decryption processing;
the decryption processing comprises the steps of selecting decryption control points and setting decryption transformation quantity, establishing a local decryption model and carrying out local decryption processing on DEM data according to the local decryption model to obtain the DEM data after decryption processing;
the specific process of selecting the decryption control points, setting the decryption transformation amount and establishing the local decryption model is as follows:
(1.1) selecting a decryption control point and setting a decryption conversion amount: selecting sensitive terrain feature points as density-losing control points, wherein the sensitive terrain feature points comprise valley points and ridge points, and giving density-losing transformation quantity delta ziObtaining the coordinate (x) of the decryption control pointi,yi) 1,2,. n,; wherein x isiIs the abscissa, y, of the ith decryption control pointiIs the ordinate of the ith decryption control point, and n is the number of the decryption control points;
(1.2) establishing a local decryption model based on a tight support radial basis function;
(1.2.1) selecting a positive clamping support radial basis function
Figure BDA00016879897100000210
As a tight support basis function, the formula is shown in formula (1):
Figure BDA0001687989710000021
wherein r isThe parameters of the basis functions are closely supported,
Figure BDA0001687989710000022
r0is the tight support radius of the tight support basis function, X is the input elevation point, XiIs the ith decryption control point; (1-r)+Is a tight support domain control function, which is defined as:
Figure BDA0001687989710000023
(1.2.2), setting tight support radius: the tight support radius is at least 100 times greater than the displacement of the release;
(1.2.3) establishing a tight support radial basis function interpolation model F (X) according to the basis function selected in the step (1.2.1) and the set tight support radius, wherein the tight support radial basis function interpolation model F (X) is shown in a formula (3):
Figure BDA0001687989710000024
wherein the content of the first and second substances,
Figure BDA0001687989710000025
is a closely supported basis function, | is an Euclidean 2 norm, wiIs the ith linear combination coefficient;
(1.2.4) substituting the decryption control point and the decryption transformation quantity into a formula (3) to obtain an interpolation model solving equation expression, as shown in the formula (4):
Figure BDA0001687989710000026
order to
Figure BDA0001687989710000027
Figure BDA0001687989710000028
Wherein, A is a Gaussian matrix, w is a weight matrix, and y is a sample output matrix; equation writingIn the form of a vector:
A·w=y(5);
(1.2.5) solving the formula (5) through a matrix calculation rule to obtain a weight matrix w:
w=A-1y(6);
(1.2.6) generating a local decryption model according to the weight matrix as shown in the formula (7):
Figure BDA0001687989710000029
wherein, tZcThe elevation after declamping at the c-th elevation point, sZcThe elevation before the density removal of the c-th elevation point;
will tightly support the radius r0Combining the weight matrix w and the decryption control point into a key, and encrypting and storing the key by using a DES algorithm;
and 2, recovering the DEM data subjected to decryption processing in the step 1, wherein the recovery comprises key decryption reading, model establishment and local decryption data recovery processing.
As a further optimization scheme of the DEM local decryption and recovery method based on the tightly-supported radial basis function, the method for performing local decryption on DEM data specifically comprises the following steps:
(1.3.1) converting the DEM data into an elevation point coordinate set { (x)c,yc,sZc) 1, 2., m }, where x iscIs the abscissa, y, of the c-th elevation pointcIs the ordinate of the c-th elevation point, and m is the number of the elevation points;
(1.3.2) carrying out decryption processing on the elevation point coordinate set according to a formula (7) to obtain a decrypted elevation point set { (x)c,yc,tZc)|c=1,2,...,m};
And (1.3.3) storing and outputting the decrypted elevation point set according to the data structure of the input DEM data.
As a further optimization scheme of the DEM local decryption and recovery method based on the tight support radial basis function, in the step 2, the DEM data after decryption is recovered, and the specific steps are as follows:
(2.1) reading the key file, decrypting and extracting parameters by using a DES algorithm: tight support radius r0Weight matrix w ═ w1 w2…wn]TAnd a decryption control point P ═ X1 X2…Xn]TWherein, the superscript T is transposition;
(2.2) constructing a local recovery model according to the parameters extracted in the step (2.1), wherein the local recovery model is shown as a formula (8):
Figure BDA0001687989710000031
and (2.3) restoring the DEM data after the decryption treatment by using a formula (8).
As a further optimization scheme of the DEM local decryption and recovery method based on the tight support radial basis function, the step (2.3) comprises the following specific steps:
(2.3.1) converting the DEM data after the decryption treatment into an elevation point coordinate set { (x)c,yc,tZc)|c=1,2,...,m};
(2.3.2) restoring the coordinate set of the elevation points in the (2.3.1) according to a formula (8) to obtain a restored elevation point set { (x)c,yc,sZc)|c=1,2,...,m};
And (2.3.3) storing and outputting the recovered elevation point set according to the data structure of the input decrypted DEM data.
As a further optimization scheme of the DEM local decryption and recovery method based on the tight support radial basis function, r0Is 1%.
Compared with the prior art, the invention adopting the technical scheme has the following technical effects:
(1) according to the method, a local sensitive area of DEM data is decrypted to generate a key, and the decrypted DEM data can be subjected to lossless recovery according to the key;
(2) the method has the characteristics of local tight support, uniform and gradual deformation, high safety and the like, improves the reliability of DEM data decryption, is favorable for perfecting a geographic information safety protection theory and method system, and can be used for aspects of public sharing, transmission and the like of DEM data.
Drawings
FIG. 1 is a DEM data local decryption flow chart according to the invention;
FIG. 2 is a flow chart of the DEM data recovery after local decryption according to the present invention;
FIG. 3 is DEM experimental data with local decryption applied in an embodiment of the present invention;
FIG. 4 is a graph of the error distribution in a local region of decryption in an embodiment of the present invention;
FIG. 5 is a diagram illustrating the effect of partial decryption in an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
According to the DEM local decryption and recovery method based on the tightly-supported radial basis function, the local decryption process of DEM data is shown in figure 1, and the recovery process of DEM data is shown in figure 2.
In this embodiment, DEM data (as shown in fig. 3) of a certain area is selected as DEM data to be decrypted, the coordinate system is WGS84, the size is 2335m by 2250m, and the cell resolution is 5m by 5 m. The method comprises the following steps:
local decryption of DEM data
Step 1.1: opening DEM data to be decrypted, and acquiring a minimum bounding rectangle R of the data, wherein the coordinates of the upper left corner of R are (399298.014, 3553907.950), and the coordinates of the lower right corner of R are (401633.015, 3551657.950);
step 1.2: selecting 6 characteristic points from the DEM data range as model control points, and randomly endowing the control points with disturbance quantity to obtain a control point set:
Figure BDA0001687989710000041
disturbance quantity aggregation:
ΔZs={4.613,3.547,3.893,4.452,4.894,3.197};
step 1.3: selecting a positive tightening support radial basis function proposed by Wendland as a basis function of the invention, as shown in formula (1);
step 1.4: selecting a tight support radius r according to the disturbance quantity set0=720;
Step 1.5: substituting the control points and the transformation quantity into a formula (3), and solving by using a matrix calculation formula to obtain a weight matrix:
w=[3.70457773,2.72831675,0.97920387,3.92340938,3.91885782,2.24911317];
step 1.6: according to the calculated weight, a DEM data local decryption model is established, as shown in a formula (7);
step 1.7: obtaining an elevation point set GCs { (x) of DEM datac,yc,sZc) 1,2,., m }, wherein m 210150;
step 1.8: according to the formula (7), the elevation point set GCs are subjected to decryption treatment, and the decrypted elevation point set GCs' is { (x)c,yc,tZc) I c ═ 1,2,. and m }, and the error distribution in the decryption is shown in fig. 4.
Step 1.9: outputting the decrypted elevation point set according to the data structure of the input DEM data, wherein the superposition effect of the input DEM data and the elevation point set is shown in FIG. 5. Tight support radius r0And combining the weight matrix w and the control point into a key, encrypting by using a DES algorithm and storing in Key.
(II) DEM data recovery process after decryption
Step 2.1: reading a Key file Key.txt, and extracting a Key Key after decryption by using a DES algorithm;
step 2.2: according to the support radius r in the key0Establishing a recovery model for the weight matrix w and the control points, wherein the recovery model is shown as a formula (8);
step 2.3: opening the DEM data after decryption, and acquiring an elevation point set EGCs { (x) of the DEM datac,yc,tZc) 1,2,., m }, wherein m 210150;
step 2.4: restoring the elevation point set EGCs by using a restoration model to obtain a restored elevation point set RGCs { (x)c,yc,sZc)|c=1,R,...,m};
Step 2.5: and storing and outputting the recovered high-level point set RGCs according to the data structure of the input DEM decryption data.
The method can effectively guarantee the safety of the DEM data, simultaneously maintains the vertical topological relation of the DEM data to be basically unchanged, and provides technical support for geographic information safety and geographic data sharing.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.

Claims (4)

1. A DEM local decryption and recovery method based on a tightly-supported radial basis function is characterized by comprising the following steps:
step 1, carrying out decryption processing on DEM data to obtain the DEM data after the decryption processing;
the decryption processing comprises the steps of selecting decryption control points and setting decryption transformation quantity, establishing a local decryption model and carrying out local decryption processing on DEM data according to the local decryption model to obtain the DEM data after decryption processing;
the specific process of selecting the decryption control points, setting the decryption transformation amount and establishing the local decryption model is as follows:
(1.1) selecting a decryption control point and setting a decryption conversion amount: selecting sensitive terrain feature points as density-losing control points, wherein the sensitive terrain feature points comprise valley points and ridge points, and giving density-losing transformation quantity delta ziObtaining the coordinate (x) of the decryption control pointi,yi) I ═ 1,2, …, n; wherein x isiIs the abscissa, y, of the ith decryption control pointiIs the ordinate of the ith decryption control point, and n is the number of the decryption control points;
(1.2) establishing a local decryption model based on a tight support radial basis function;
(1.2.1) selecting a positive clamping support radial basis function
Figure FDA0002933308320000011
As a tight support basis function, the formula is shown in formula (1):
Figure FDA0002933308320000012
wherein r is a parameter of the tight support basis function,
Figure FDA0002933308320000013
r0is the tight support radius of the tight support basis function, X is the input elevation point, XiIs the ith decryption control point; (1-r)+Is a tight support domain control function, which is defined as:
Figure FDA0002933308320000014
(1.2.2), setting tight support radius: the tight support radius is at least 100 times greater than the displacement of the release;
(1.2.3) establishing a tight support radial basis function interpolation model F (X) according to the basis function selected in the step (1.2.1) and the set tight support radius, wherein the tight support radial basis function interpolation model F (X) is shown in a formula (3):
Figure FDA0002933308320000015
wherein the content of the first and second substances,
Figure FDA0002933308320000016
is a closely supported basis function, | is an Euclidean 2 norm, wiIs the ith linear combination coefficient;
(1.2.4) substituting the decryption control point and the decryption transformation quantity into a formula (3) to obtain an interpolation model solving equation expression, as shown in the formula (4):
Figure FDA0002933308320000017
order to
Figure FDA0002933308320000018
Figure FDA0002933308320000021
Wherein, A is a Gaussian matrix, w is a weight matrix, and y is a sample output matrix; the equation is written in the form of a vector:
A·w=y (5);
(1.2.5) solving the formula (5) through a matrix calculation rule to obtain a weight matrix w:
w=A-1y (6);
(1.2.6) generating a local decryption model according to the weight matrix as shown in the formula (7):
Figure FDA0002933308320000022
wherein, tZcThe elevation after declamping at the c-th elevation point, sZcThe elevation before the density removal of the c-th elevation point;
will tightly support the radius r0Combining the weight matrix w and the decryption control point into a key, and encrypting and storing the key by using a DES algorithm;
step 2, recovering the DEM data subjected to decryption processing in the step 1, wherein the recovering comprises key decryption reading, model building and local decryption data recovery processing;
and 2, recovering the DEM data after decryption, which comprises the following specific steps:
(2.1) reading the key file, decrypting and extracting parameters by using a DES algorithm: tight support radius r0Weight matrix w ═ w1w2…wn]TAnddecker control point P ═ X1 X2…Xn]TWherein, the superscript T is transposition;
(2.2) constructing a local recovery model according to the parameters extracted in the step (2.1), wherein the local recovery model is shown as a formula (8):
Figure FDA0002933308320000023
and (2.3) restoring the DEM data after the decryption treatment by using a formula (8).
2. The DEM local decryption and recovery method based on the tightly-supported radial basis function as claimed in claim 1, wherein the specific steps of local decryption processing on DEM data are as follows:
(1.3.1) converting the DEM data into an elevation point coordinate set { (x)c,yc,sZc) 1,2, …, m, where xcIs the abscissa, y, of the c-th elevation pointcIs the ordinate of the c-th elevation point, and m is the number of the elevation points;
(1.3.2) carrying out decryption processing on the elevation point coordinate set according to a formula (7) to obtain a decrypted elevation point set { (x)c,yc,tZc)|c=1,2,…,m};
And (1.3.3) storing and outputting the decrypted elevation point set according to the data structure of the input DEM data.
3. The DEM local decryption and restoration method based on the tightly-supported radial basis function as claimed in claim 1, wherein the step (2.3) comprises the following specific steps:
(2.3.1) converting the DEM data after the decryption treatment into an elevation point coordinate set { (x)c,yc,tZc)|c=1,2,…,m};
(2.3.2) restoring the coordinate set of the elevation points in the (2.3.1) according to a formula (8) to obtain a restored elevation point set { (x)c,yc,sZc)|c=1,2,…,m};
And (2.3.3) storing and outputting the recovered elevation point set according to the data structure of the input decrypted DEM data.
4. The DEM local decryption and recovery method based on the tightly-supported radial basis function as claimed in claim 1, wherein r is0Is 1%.
CN201810579637.9A 2018-06-07 2018-06-07 DEM local decryption and recovery method based on tight support radial basis function Active CN109002724B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810579637.9A CN109002724B (en) 2018-06-07 2018-06-07 DEM local decryption and recovery method based on tight support radial basis function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810579637.9A CN109002724B (en) 2018-06-07 2018-06-07 DEM local decryption and recovery method based on tight support radial basis function

Publications (2)

Publication Number Publication Date
CN109002724A CN109002724A (en) 2018-12-14
CN109002724B true CN109002724B (en) 2021-03-23

Family

ID=64600019

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810579637.9A Active CN109002724B (en) 2018-06-07 2018-06-07 DEM local decryption and recovery method based on tight support radial basis function

Country Status (1)

Country Link
CN (1) CN109002724B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067159A (en) * 2012-12-28 2013-04-24 南京师范大学 Geographic information system (GIS) vector data reversible decryption method
CN103093414A (en) * 2013-01-22 2013-05-08 南京师范大学 Decryption and recovery method of document object model (DOM) raster data
CN103559452A (en) * 2013-10-30 2014-02-05 南京师范大学 Altitude data decryption and recovery method
CN104077535A (en) * 2014-06-19 2014-10-01 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN104077536A (en) * 2014-06-19 2014-10-01 南京师范大学 Radial basis function based GIS (Geographic Information System) vector data reversible decryption method
CN105608267A (en) * 2015-12-21 2016-05-25 许昌学院 Multivariable global optimization algorithm
CN106504326A (en) * 2016-10-27 2017-03-15 滁州学院 Take the landform altitude sampled point encryption method of form precision into account
CN106547724A (en) * 2016-09-23 2017-03-29 武汉市工程科学技术研究院 Theorem in Euclid space coordinate transformation parameter acquisition methods based on minimum point set
CN106778347A (en) * 2016-12-22 2017-05-31 南京师范大学 A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function
CN107944287A (en) * 2017-12-05 2018-04-20 南京师范大学 A kind of DEM geometric accuracies DecryptDecryption and restoration methods

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067159A (en) * 2012-12-28 2013-04-24 南京师范大学 Geographic information system (GIS) vector data reversible decryption method
CN103093414A (en) * 2013-01-22 2013-05-08 南京师范大学 Decryption and recovery method of document object model (DOM) raster data
CN103559452A (en) * 2013-10-30 2014-02-05 南京师范大学 Altitude data decryption and recovery method
CN104077535A (en) * 2014-06-19 2014-10-01 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN104077536A (en) * 2014-06-19 2014-10-01 南京师范大学 Radial basis function based GIS (Geographic Information System) vector data reversible decryption method
CN105608267A (en) * 2015-12-21 2016-05-25 许昌学院 Multivariable global optimization algorithm
CN106547724A (en) * 2016-09-23 2017-03-29 武汉市工程科学技术研究院 Theorem in Euclid space coordinate transformation parameter acquisition methods based on minimum point set
CN106504326A (en) * 2016-10-27 2017-03-15 滁州学院 Take the landform altitude sampled point encryption method of form precision into account
CN106778347A (en) * 2016-12-22 2017-05-31 南京师范大学 A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function
CN107944287A (en) * 2017-12-05 2018-04-20 南京师范大学 A kind of DEM geometric accuracies DecryptDecryption and restoration methods

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于径向基函数的DLG几何精度脱密模型研究;高隆杰;《中国优秀硕士学位论文 信息科技辑》;20180430;第2-4章节 *

Also Published As

Publication number Publication date
CN109002724A (en) 2018-12-14

Similar Documents

Publication Publication Date Title
CN107944287B (en) DEM geometric precision decryption and recovery method
CN107241182B (en) Privacy protection hierarchical clustering method based on vector homomorphic encryption
CN103093414B (en) A kind of DOM raster data DecryptDecryption and restoration methods
Feng et al. A secure high-order Lanczos-based orthogonal tensor SVD for big data reduction in cloud environment
CN103761701A (en) Color image watermarking method based on quaternion index matrix
Shi et al. A Blockchain-based G-code protection approach for cyber-physical security in additive manufacturing
Yang et al. Anti‐windup controller design for singularly perturbed systems subject to actuator saturation
Tolstykh et al. Scenarios for the development of industrial complexes in the digital economy
Xun et al. A robust zero-watermarking algorithm for vector digital maps based on statistical characteristics
Wu et al. A grid-based secure product data exchange for cloud-based collaborative design
CN109002724B (en) DEM local decryption and recovery method based on tight support radial basis function
Hindistan et al. A hybrid approach with gan and dp for privacy preservation of iiot data
CN115102699A (en) Data security deduplication and data recovery method, system, medium, device and terminal
Xun et al. A robust zero-watermarking algorithm for 2D vector digital maps
Kong et al. An information security method based on optimized high-fidelity reversible data hiding
Yang et al. Accurate image-based pedestrian detection with privacy preservation
Peng et al. A reversible watermarking for 2D vector map based on triple differences expansion and reversible contrast mapping
CN111192361B (en) Geographic vector field data decryption and recovery method based on geometric algebra
GAO et al. Research and application progress of blockchain in area of data integrity protection
Wei et al. Stability and stabilization for delay delta fractional order systems: an LMI approach
CN115758429A (en) Planning result data encryption method with separated space and attribute information
Gao et al. Optimal injection attack strategy for cyber-physical systems: a dynamic feedback approach
Chen et al. Cloud Computing Storage Data Access Control Method Based on Dynamic Re-Encryption
CN112883389A (en) Reversible desensitization algorithm supporting feature preservation
Ma et al. Remote Sensing Image Zero-Watermarking Algorithm Based on Accurate Polar Harmonic Fourier Moment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant