CN111431698B - Vector space data encryption method using Haar transformation and Gaussian distribution - Google Patents

Vector space data encryption method using Haar transformation and Gaussian distribution Download PDF

Info

Publication number
CN111431698B
CN111431698B CN202010328668.4A CN202010328668A CN111431698B CN 111431698 B CN111431698 B CN 111431698B CN 202010328668 A CN202010328668 A CN 202010328668A CN 111431698 B CN111431698 B CN 111431698B
Authority
CN
China
Prior art keywords
data
haar
key
vector
gaussian
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010328668.4A
Other languages
Chinese (zh)
Other versions
CN111431698A (en
Inventor
闫浩文
王小龙
张黎明
王昊
张鑫港
李玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lanzhou Jiaotong University
Original Assignee
Lanzhou Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lanzhou Jiaotong University filed Critical Lanzhou Jiaotong University
Priority to CN202010328668.4A priority Critical patent/CN111431698B/en
Publication of CN111431698A publication Critical patent/CN111431698A/en
Application granted granted Critical
Publication of CN111431698B publication Critical patent/CN111431698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

Firstly, generating a hash key K for a key input by a user by using an SHA-512 hash algorithm, calculating a Gaussian random number by using the key K through Gaussian distribution, and generating a new key of an encryption element by using the hash key K and the Gaussian random number sequence; then, performing tree Haar transformation on the read vector data vertex sequence to obtain a mean value coefficient and a difference value coefficient; then, encrypting the mean value coefficient and the difference value coefficient after tree Haar transformation by using a multiplication principle; and performing tree-shaped Haar inverse transformation on the encrypted frequency domain coefficient to obtain a coordinate value, and finally performing random encryption on vector data by using Gaussian random numbers through randomization processing to generate encrypted vector geospatial data. The method has stronger security on the encryption of the vector geographic space data, and the structure of the vector map data is reserved under the condition that the coordinate value of the vector geographic space data is completely changed.

Description

Vector space data encryption method using Haar transformation and Gaussian distribution
Technical Field
The invention relates to the field of geospatial data security, in particular to a vector space data encryption method using Haar transformation and Gaussian distribution.
Background
The vector geographic data is an important foundation for national infrastructure construction and earth information science research, is an important component part of the national basic geographic data, is also an indispensable strategic resource in national economy and national defense construction, occupies a very important position in the national economy and national defense construction, and is widely applied to various industries. The rapid development of networking, informatization and digitalization technologies makes vector space data which are expensive in production cost and have high value easy to be illegally copied and distributed by hackers, pirates and unauthorized users, and therefore it is of great importance to protect vector geographic data from being illegally copied and distributed.
The current research on vector space data security is mainly focused on three aspects, namely copyright protection based on digital watermarking, user channel control, protection against attacks during storage and transportation, and illegal distribution of encrypted map data. The vector space data watermarking algorithm is mainly to embed watermark by modifying airspace coordinate values of geographic elements or to embed watermark information into frequency domain coefficients, but the digital watermarking technology only acts on the aspects of ownership and copyright protection of identification data, and unauthorized users should not see, attack or extract vector space data content. In recent researches, various methods for controlling a user network channel to access vector geographic data and security requirements and privacy strategies of a geographic space database management system are proposed, and a series of research results are obtained, but the user channel control cannot effectively prevent attack and illegal theft of the data. So that research into the encrypted vector space data is necessary.
Aiming at the structure that unauthorized users pirate data and ciphertext encrypted by using a text encryption method cannot effectively retain vector map data, the invention discloses a vector data encryption method based on a Haar transform domain and Gaussian random distribution. The method mainly comprises the steps of extracting all multi-section line elements from vector space data in a Shapefile format for encryption protection, increasing safety through Tree-Structured Haar (TSH) transformation, calculating high-frequency coefficients and low-frequency coefficients, encrypting frequency domain coefficients by a secret key generated by an SHA-512 hash algorithm and an encryption value generated by the secret key, and finally randomizing all vertex sequences by random Gaussian numbers generated by Gaussian distribution to generate encrypted vector data.
Disclosure of Invention
In view of this, the present invention proposes a vector geospatial data encryption method based on tree Haar and combined with gaussian distribution, and fig. 1 is a general flow of the vector geospatial data encryption method of the present invention, including three parts of key generation, random encryption and decryption processing.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
the vector space data encryption method using Haar transformation and Gaussian distribution comprises the following steps: key generation, random encryption and data decryption;
1. the key generation steps are as follows:
s1: generating a hash key K for a key input by a user through an SHA-512 algorithm, and calculating a Gaussian random number sequence Gn through Gaussian distribution by using the key K i =Gp(K)={g i,j |j∈[1,|P i |]};
S2: generating a new key of the encryption element by using the hash key K and the Gaussian random number sequence;
2. the random encryption steps are as follows:
s3: vertex sequence v for reading vector data i,j ,v i,j From the coordinate value (x) i,j ,y i,j ) The composition is that tree Haar transformation is carried out on the vertex sequence;
s4: encrypting the frequency domain coefficient after Haar transformation by using a multiplication principle;
s5: performing Haar inverse transformation on the encrypted frequency domain coefficient to obtain a coordinate value;
s6: using Gaussian random numbers Gn i Carrying out random encryption on vector data through randomization;
s7: modifying corresponding coordinates according to the vertex sequence encrypted randomly to obtain encrypted data;
3. the data decryption steps are as follows:
s8: reading an encrypted object from the encrypted vector geospatial data;
s9: use of key E after re-randomization of vertices by Gaussian random numbers Haar Decrypting in a tree Haar domain by combining a multiplication principle;
s10: performing tree-shaped Haar inverse transformation to obtain decrypted vector data coordinates;
s11: and (5) ending.
The method is advanced and scientific, ensures that the encrypted data cannot be identified and effective information cannot be provided, has good safety, and the structure of the vector map data is completely reserved. Experiments show that the method has good safety, high calculation speed, high efficiency and good use value, and the decryption error is almost zero.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the following description will briefly introduce the drawings required to be used in the embodiments or the prior art descriptions, it is obvious that the drawings in the following description are only schematic views of the present invention, and other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a Haar transform domain and Gaussian random distribution based vector data encryption method provided by the invention;
FIG. 2 is a model of vector geospatial data provided by the present invention;
FIG. 3 is a representation of the composition of vector geospatial data provided by the present invention;
FIG. 4 is initial road vector data for the experiments provided by the present invention;
FIG. 5 shows the result of road data encryption provided by the invention;
FIG. 6 is a diagram showing the result of decrypting road data according to the present invention;
FIG. 7 is a graph showing the encryption result of railway data provided by the invention;
FIG. 8 is a graph showing the result of decrypting railway data using the correct key provided by the present invention;
fig. 9 is a graph showing the result of decrypting railway data using the wrong key according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The following defines the parts for symbols:
the vector geospatial data comprises a number of data layers, each data layer L being made up of geographic elements (line elements or plane elements), i.e. l= { P i |i∈[1,|L|]Each geographic element contains a large number of vertices, i.e., P i ={v i,j |j∈[1,|P i |]}. Each vertex contains two coordinate values, i.e. v i,j =(x i,j ,y i,j ). Wherein P is i Represents a geographic element (line element or plane element), and |L| and |P| i I represents layer L and element |p, respectively i Cardinality of v i,j Then it is the j-th point on the i-th element in layer L. Other primary symbols are defined as follows: e (E) Haar Is an encryption element P i K is a key generated by a hash function, gn i Is a Gaussian random number sequence, ac and Dc respectively represent a mean coefficient and a difference coefficient, ea and Ed respectively represent an encryption value of the mean coefficient and the difference coefficient, E i Is the vertex sequence encryption value, R i Is a vector data random encryption value, and Cp (), rp (), and Gp (), are encryption, randomization, and random gaussian functions, respectively.
The following steps are the key generation section:
step 1: the key input by the user generates a key K through the SHA-512 hash algorithm, and the key K is used for calculating a random Gaussian number sequence Gn through random Gaussian distribution i It is defined as follows:
Gn i =Gp(K)={g i,j |j∈[1,|P i |]} (1)
where x is the value of the key K;
step 2: generating a new key E of an encryption element using a hash key K and a Gaussian random number sequence Haar The definition is as follows:
wherein x is the value of the key K, and n is the length of the key K;
the following steps are random encryption:
step 3: determining vertex sequence v of read vector data i,j ,v i,j From the coordinate value (x) i,j ,y i,j ) The method comprises the steps of performing tree Haar transformation on a vertex sequence to obtain a mean value coefficient Ac and a difference value coefficient Dc:
(4) Calculating a definition average value coefficient Ac and a difference value coefficient Dc;
step 4: encrypting the frequency domain coefficient after Haar transformation by using a multiplication principle, encrypting the mean coefficient and the difference coefficient after transformation by using the multiplication principle in a tree Haar domain, and obtaining an encrypted vertex sequence E after Haar inverse transformation after encryption is completed i
E i ={e i,j |j∈[1,|E i |]} (6)
In the formula, |E i |=|P i |,e i,j Is composed of coordinate values, which are expressed as follows:
e i,j =(IEa i,j ,IEd i,j ) (7)
therein, IEa i,j And IEd i,j Coordinate values of Haar inverse transformation;
step 5: using Gaussian random numbers Gn i The random encryption of vector data by randomization is expressed as follows:
R i =Rp(E i ,Gn i )={r i,j |j∈[1,|R i |]} (8)
in the formula, |R i |=|P i |,r i,j Defined as formula (9):
step 6: modifying corresponding coordinates according to the vertex sequence encrypted randomly to obtain encrypted data;
the following steps are decrypting the data portion:
step 7: reading an encrypted object from the encrypted vector geospatial data;
step 8: use of key E after re-randomization of vertices by Gaussian random numbers Haar Decrypting in a tree Haar domain by combining a multiplication principle;
step 9: performing tree-shaped Haar inverse transformation to obtain decrypted vector data coordinates;
step 10: and (5) ending.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (3)

1. A vector space data encryption method using tree Haar transformation and Gaussian distribution comprises three parts of key generation, random encryption and data decryption:
the key generation steps are as follows:
s1: generating a hash key K for a key input by a user through an SHA-512 algorithm, and calculating a Gaussian random number Gn through Gaussian distribution by using the key K i =Gp(K)={g i,j |j∈[1,|P i |]-wherein Gp (K) represents a random gaussian function of the cryptographic hash key K, g i,j Is the value of a gaussian random number, |p i I represents the cardinality of the geographic element, i and j represent the index of the geographic element in the vector space data and the index of the vertex in the vector space data respectively;
s2: usingGenerating new key E of encryption element by hash key K and Gaussian random number sequence Haar =(n×x)/Gn i Wherein x is the value of the key K, and n is the length of the key K;
the random encryption steps are as follows:
s3: vertex sequence v for reading vector data i,j ,v i,j From the coordinate value (x) i,j ,y i,j ) The composition is that tree Haar transformation is carried out on the vertex sequence;
s4: encrypting the frequency domain coefficient after Haar transformation by using a multiplication principle;
s5: carrying out Haar inverse transformation on the encrypted frequency domain coefficient to obtain a coordinate value;
s6: using Gaussian random numbers Gn i Encrypting the vector data by randomization;
s7: modifying corresponding coordinates according to the vertex sequence encrypted randomly to obtain encrypted data;
the data decryption steps are as follows:
s8: reading an encrypted object from the encrypted vector geospatial data;
s9: use of key E after re-randomization of vertices by Gaussian random numbers Haar Decrypting in a tree Haar domain by combining a multiplication principle;
s10: performing tree-shaped Haar inverse transformation to obtain decrypted vector data coordinates;
s11: and (5) ending.
2. A method of encrypting vector space data using tree Haar transforms and gaussian distributions according to claim 1, wherein in step S8, the encrypted vector geospatial data is generated using steps S1 to S7.
3. A method of vector space data encryption using tree Haar transforms and gaussian distributions according to claim 1 or claim 2, characterized in that in step S10, data decryption is done.
CN202010328668.4A 2020-04-23 2020-04-23 Vector space data encryption method using Haar transformation and Gaussian distribution Active CN111431698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010328668.4A CN111431698B (en) 2020-04-23 2020-04-23 Vector space data encryption method using Haar transformation and Gaussian distribution

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010328668.4A CN111431698B (en) 2020-04-23 2020-04-23 Vector space data encryption method using Haar transformation and Gaussian distribution

Publications (2)

Publication Number Publication Date
CN111431698A CN111431698A (en) 2020-07-17
CN111431698B true CN111431698B (en) 2023-08-15

Family

ID=71556685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010328668.4A Active CN111431698B (en) 2020-04-23 2020-04-23 Vector space data encryption method using Haar transformation and Gaussian distribution

Country Status (1)

Country Link
CN (1) CN111431698B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113473152B (en) * 2021-06-07 2022-08-30 东北大学 Chaos-based H.264 video fast zero-bit-rate expansion encryption method
CN116415283A (en) * 2023-06-06 2023-07-11 南京师范大学 Vector geographic data encryption method, system, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794671A (en) * 2015-03-28 2015-07-22 兰州交通大学 Vector space data blind watermark method resistant to projection attack
KR20150125850A (en) * 2014-04-30 2015-11-10 부경대학교 산학협력단 The methode of selesctive encryption scheme for geographic information system vector map data
CN110138561A (en) * 2019-03-22 2019-08-16 西安电子科技大学 Efficient cipher text retrieval method, the cloud computing service system automatically corrected based on CP-ABE

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6019453B2 (en) * 2012-07-05 2016-11-02 株式会社クリプト・ベーシック ENCRYPTION DEVICE, DECRYPTION DEVICE, AND PROGRAM
WO2014112182A1 (en) * 2013-01-18 2014-07-24 三菱電機株式会社 Data decoding device, attribute-based encryption system, random number element removing device, randomized secret key generation device, data decoding method, and data decoding program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150125850A (en) * 2014-04-30 2015-11-10 부경대학교 산학협력단 The methode of selesctive encryption scheme for geographic information system vector map data
CN104794671A (en) * 2015-03-28 2015-07-22 兰州交通大学 Vector space data blind watermark method resistant to projection attack
CN110138561A (en) * 2019-03-22 2019-08-16 西安电子科技大学 Efficient cipher text retrieval method, the cloud computing service system automatically corrected based on CP-ABE

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
空域和频域相结合的矢量空间数据多重盲水印算法;张黎明;测绘地理信息,05;全文 *

Also Published As

Publication number Publication date
CN111431698A (en) 2020-07-17

Similar Documents

Publication Publication Date Title
Mahto et al. A survey of color image watermarking: State-of-the-art and research directions
Cao et al. Nonlinear scrambling-based reversible watermarking for 2D-vector maps
CN111431698B (en) Vector space data encryption method using Haar transformation and Gaussian distribution
Madhu et al. An overview of image security techiques
Li et al. Commutative fragile zero-watermarking and encryption for image integrity protection
WO2021258907A1 (en) Transaction method based on blockchain network, node, and medium
CN102136127A (en) Function digital watermark encrypting system based on wavelet transformation and hyperchaos algorithm
Mashhadi et al. A (t, n)-Secret image sharing with steganography based on Rook polynomial and LWE problem
Lee Multipurpose protection for numeric data with capabilities of self-authentication and ownership declaration
Pham et al. Perceptual encryption based on features of interpolating curve for vector map
Ito et al. Access control of semantic segmentation models using encrypted feature maps
Zhang et al. Spread spectrum image data hiding in the encrypted discrete cosine transform coefficients
Guyeux et al. A new chaos-based watermarking algorithm
Avila-Domenech et al. Dual watermarking for handwritten document image authentication and copyright protection for JPEG compression attacks
Hu et al. Secure architecture and protocols for robust perceptual hashing
Paul et al. Distortion less watermarking of relational databases based on circular histogram modulation
CN101782947B (en) Multimedia copyright protection method
Saturwar et al. Digital watermarking scheme for secret images using visual cryptography
Sharma et al. A publicly verifiable watermarking scheme based on quantum chaos and DWT–DCT
Han Research and Application of Pseudo-information Detection Technology Based on Computer Information Hiding
Yan et al. Quantum image security
Jin et al. Digital watermarking using group quantization for CityGML Objects
Prudvi et al. A weight factor based secure invisible image watermarking using Discrete Cosine Transform
Guo A new digital image scrambling encryption algorithm based on chaotic sequence
Daoui et al. Multimedia Security Through 1D Chaotic Systems: Review and Analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant