Citation: | Li Hu, Zhu Henghua, Hua Weihua, Shang Hao, Liu Haitao, Li Gang, Yang Fan, Song Jun, 2020. Key Technologies and Methods for Vector Geographic Data Security Protection. Earth Science, 45(12): 4574-4588. doi: 10.3799/dqkx.2020.299 |
Baby, D., Thomas, J., Augustine, G., et al., 2015.A Novel DWT Based Image Securing Method Using Steganography.Procedia Computer Science, 46:612-618. https://doi.org/10.1016/j.procs.2015.02.105
|
Bang, N.V., Lee, S.H., Moon, K.S., et al., 2016.Encryption Algorithm Using Polyline Simplification for GIS Vector Map.Journal of Korea Multimedia Society, 19(8):1453-1459. https://doi.org/10.9717/kmms.2016.19.8.1453
|
Bang, N.V., Lee, S.H., Moon, K.S., et al., 2017.Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map.Journal of Information Processing Systems, 13(1):68-82. https://doi.org/10.3745/jips.03.0059
|
Bansal, M., Upadhyaya, A., 2018.Three-Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.In: Bokhari M., Agrawal N., Saini D., eds., Cyber Security.Advances in Intelligent Systems and Computing, Spinger Nature Singapore Pte Ltd., 241-247.https://doi.org/10.1007/978-981-10-8536-9_24
|
Bash, B.A., Goeckel, D., Towsley, D., et al., 2015.Hiding Information in Noise:Fundamental Limits of Covert Wireless Communication.IEEE Communications Magazine, 53(12):26-31. https://doi.org/10.1109/mcom.2015.7355562
|
Bloch, M.R., 2016.Covert Communication over Noisy Channels:A Resolvability Perspective.IEEE Transactions on Information Theory, 62(5):2334-2354. https://doi.org/10.1109/tit.2016.2530089
|
Cao, Y., Xiao, J., Zhang, W.C., 2016.A Multiple Watermarking Algorithm for Vector Map Based on Zero-Watermark and Reversible Watermark.Journal of South China Normal University (Natural Science Edition), 48(3):69-74(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-HNSF201603012.htm
|
Che, S., Deng, S.J., 2008.Watermarking Arithmetic of 2D Vector Maps Based on Two-Tier Grids.Hydrographic Surveying and Charting, 28(1):13-17(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-HYCH200801006.htm
|
Coppersmith, D., 1994.The Data Encryption Standard (DES) and Its Strength against Attacks.IBM Journal of Research and Development, 38(3):243-250. https://doi.org/10.1147/rd.383.0243
|
Cui, H.C., 2013.Research on the Sharing Security of Vector Geography Data (Dissertation).Nanjing Normal University, Nanjing(in Chinese with English abstract).
|
Da, Q.G., Sun, J.G., Zhang, L.G., et al., 2018.A Novel Hybrid Information Security Scheme for 2D Vector Map.Mobile Networks and Applications, 23(4):734-742. https://doi.org/10.1007/s11036-018-0997-z
|
Daemen, J., Rijmen, V., 2002.The Design of Rijndael:AES-The Advanced Encryption Standard.Springer Science & Business Media, Berlin. http://ci.nii.ac.jp/ncid/BA56454560
|
Dakroury, Y., El-Ghafar, I.A., Tammam, A., 2010.Protecting GIS Data Using Cryptography and Digital Watermarking.International Journal of Computer Science and Network Security, 10(1):75-84. http://smartsearch.nstl.gov.cn/paper_detail.html?id=cfae695feabc4faf7dfc2eb276ff7e58
|
Deng, T., 2009.The Research on 2D Engineering Graphics Encryption Technology Based on Transform Domain (Dissertation).Hunan University, Changsha(in Chinese with English abstract).
|
Fridrich, J., 1998.Symmetric Ciphers Based on Two-Dimensional Chaotic Maps.International Journal of Bifurcation and Chaos, 8(6):1259-1284. https://doi.org/10.1142/s021812749800098x
|
Fu, H., 2010.Decipherment Methods of Geography Elements of the Public Version Map.Geospatial Information, 8(4):133-134(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DXKJ201004045.htm
|
Gedik, B., Liu, L., 2005.Location Privacy in Mobile Systems: A Personalized Anonymization Model.25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).IEEE, Columbus, OH, USA, 620-629.https://doi.org/10.1109/icdcs.2005.48
|
Gedik, B., Liu, L., 2008.Protecting Location Privacy with Personalized K-Anonymity:Architecture and Algorithms.IEEE Transactions on Mobile Computing, 7(1):1-18. https://doi.org/10.1109/tmc.2007.1062
|
Giao, P.N., Kwon, O.J., Lee, S.H., et al., 2016.Perceptual Encryption Method for Vector Map Based on Geometric Transformations.2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).IEEE, Jeju, South Korea, 1-4.https://doi.org/10.1109/apsipa.2016.7820846
|
He, B., 2010.A Digital Image Watermarking Method against Rotation Attack Based on LSB.System Simulation Technology, 6(4):304-307(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-XTFJ201004010.htm
|
Hu, C.J., 2017.Research on Image Encryption Algorithm Based on Chaos Theory (Dissertation).Nanjing University of Information Science & Technology, Nanjing(in Chinese with English abstract).
|
Jang, B.J., Lee, S.H., Kwon, K.R., 2014.Perceptual Encryption with Compression for Secure Vector Map Data Processing.Digital Signal Processing, 25:224-243. https://doi.org/10.1016/j.dsp.2013.09.013
|
Jang, B.J., Lee, S.H., Lee, E.J., et al., 2017.A Crypto-Marking Method for Secure Vector Map.Multimedia Tools and Applications, 76(14):16011-16044. https://doi.org/10.1007/s11042-016-3893-1
|
Jiang, N., Zhao, N., Wang, L., 2016.LSB Based Quantum Image Steganography Algorithm.International Journal of Theoretical Physics, 55(1):107-123. https://doi.org/10.1007/s10773-015-2640-0
|
Kalnis, P., Ghinita, G., Mouratidis, K., et al., 2007.Preventing Location-Based Identity Inference in Anonymous Spatial Queries.IEEE Transactions on Knowledge and Data Engineering, 19(12):1719-1733. https://doi.org/10.1109/tkde.2007.190662
|
Kang, H.I., Kim, K.I., Choi, J.U., 2001.A Vector Watermarking Using the Generalized Square Mask.Proceedings International Conference on Information Technology: Coding and Computing.IEEE, Las Vegas, NV, USA, 234-236.https://doi.org/10.1109/itcc.2001.918797
|
Kang, J., Wang, Q.J., Yan, S.Q., 2012.A Tentative Discussion on the Application of the Public Version of 1:250 000 Topographic Map to 1:250 000 Geological Map.Geology in China, 39(4):1087-1093(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DIZI201204026.htm
|
Kido, H., Yanagisawa, Y., Satoh, T., 2005.An Anonymous Communication Technique Using Dummies for Location-Based Services.International Conference on Pervasive Services.IEEE, Santorini, Greece, 88-97.https://doi.org/10.1109/perser.2005.1506394
|
Koblitz, N., 1987.Elliptic Curve Cryptosystems.Mathematics of Computation, 48(177):203. https://doi.org/10.1090/s0025-5718-1987-0866109-5
|
Li, A.B., Wang, H.R., Zhou, W., 2015.Scrambling Encryption of Vector Digital Map Based on 2D Chaos System.Journal of China University of Mining & Technology, 44(4):747-753(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-ZGKD201504023.htm
|
Li, B.F., Shen, Y.Z., Zhang, X.F., et al., 2013.Seamless Multivariate Affine Error-in-Variables Transformation and Its Application to Map Rectification.International Journal of Geographical Information Science, 27(8):1572-1592. https://doi.org/10.1080/13658816.2012.760202
|
Li, G.S., Meng, X.R., 2012.Vector Data Safety Protection Method in Oracle.Computer Engineering, 38(10):102-104(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-JSJC201210032.htm
|
Li, Y.F., Ding, L.P., Wu, J.Z., et al., 2019.Survey on Key Issues in Networks Covert Channel.Journal of Software, 30(8):2470-2490(in Chinese with English abstract). http://www.zhangqiaokeyan.com/academic-journal-cn_journal-software_thesis/0201273281017.html
|
Liang, W.D., Zhang, X.C., Xi, X., et al., 2018.A Multiple Watermarking Algorithm for Vector Geographic Data Based on Zero-Watermarking and Fragile Watermarking.Acta Scientiarum Naturalium Universitatis Sunyatseni, 57(4):1-8(in Chinese with English abstract). http://www.researchgate.net/publication/330036138_A_multiple_watermarking_algorithm_for_vector_geographic_data_based_on_zero-watermarking_and_fragile_watermarking
|
Liu, Z., 2017.Research on Vector Map Data Encryption Technology (Dissertation).Harbin Engineering University, Harbin(in Chinese with English abstract).
|
Lou, J.P., Zhang, M., Fu, P., et al., 2016.Design of Network Covert Transmission Scheme Based on TCP.Netinfo Security, (1):34-39(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-XXAQ201601007.htm
|
Lü, H.Y., Zhou, W., Sheng, Y.H., et al., 2017.Topology and Shape Preservable Geometric Decryption Method for Vector Geographic Data.Journal of China University of Mining & Technology, 46(3):648-654(in Chinese with English abstract). http://www.researchgate.net/publication/317948358_Topology_and_shape_preservable_geometric_decryption_method_for_vector_geographic_data
|
Mavani, M., Ragha, L., 2014.Covert Channel in IPv6 Destination Option Extension Header.2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA).IEEE, Mumbai, India, 219-224.https://doi.org/10.1109/cscita.2014.6839262
|
Ngoc, G.P., Lee, S.H., Kwon, K.R., 2015.Selective Encryption Algorithm for GIS Vector Map Using Geometric Objects.International Journal of Security and Its Applications, 9(2):61-72. https://doi.org/10.14257/ijsia.2015.9.2.07
|
Ngoc, G.P., Moon, K.S., Lee, S.H., et al., 2016.GIS Map Encryption Algorithm for Drone Security Based on Geographical Features.2016 International Conference on Computational Science and Computational Intelligence (CSCI).IEEE, Las Vegas, NV, USA, 1422-1423.https://doi.org/10.1109/csci.2016.0279
|
Ohbuchi, R., Ueda, H., Endoh, S., 2002.Robust Watermarking of Vector Digital Maps.Proceedings.IEEE International Conference on Multimedia and Expo.Lausanne, Switzerland, 577-580.https://doi.org/10.1109/icme.2002.1035847
|
Peng, X.Y., Long, Y., Wu, H.H., 2002.Coordinate Adjustment on Vector Graph in Mapinfo Using Affine Transformation.Journal of Geomatics, 27(5):6-7(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-CHXG200205002.htm
|
Pfitzmann, A., Hansen, M., 2010.A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management.http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
|
Pham, G.N., Lee, H.S., Kwon, R.K., 2017.Perceptual Encryption Based on Features of Interpolating Curve for Vector Map.IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E100.A(5): 1156-1164.https://doi.org/10.1587/transfun.e100.a.1156
|
Pham, G.N., Ngo, S.T., Bui A.N., et al., 2019.Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution.Applied Sciences, 9(22):4889. https://doi.org/10.3390/app9224889
|
Pingley, A., Zhang, N., Fu, X.W., et al., 2011.Protection of Query Privacy for Continuous Location Based Services.Proceedings IEEE INFOCOM.IEEE, Shanghai, China, 1710-1718.https://doi.org/10.1109/infcom.2011.5934968
|
Qu, J., Bao, Y.L., 2006.The Discrete Nonlinear Geo-Adjusting of Traffic Vector Map.Computer Simulation, 23(5):77-80(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJZ200605022.htm
|
Ren, N., Wu, W., Zhu, C.Q., et al., 2015.An Accuracy Authentication Algorithm of Anti-Deleting Elements for Vector Geographic Data.Geography and Geo-Information Science, 31(4):43-46(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DLGT201504009.htm
|
Rivest, R.L., Shamir, A., Adleman, L., 1978.A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.Communications of the ACM, 21(2):120-126. https://doi.org/10.1145/359340.359342
|
Shekhar, S., Huang, Y., Djugash, J., et al., 2002.Vector Map Compression: A Clustering Approach.Proceedings of the 10th ACM International Symposium on Advances in Geographic Information Systems.ACM, 74-80.https://doi.org/10.1145/585147.585164
|
Shiu, H.J., Lin, B.S., Lin, B.S., et al., 2018.Data Hiding on Social Media Communications Using Text Steganography.Lecture Notes in Computer Science.Springer International Publishing, Cham, 217-224.https://doi.org/10.1007/978-3-319-76687-4_15
|
Shokri, R., Theodorakopoulos, G., Troncoso, C., et al., 2012.Protecting Location Privacy: Optimal Strategy Against Localization Attacks.Proceedings of the 2012 ACM Conference on Computer and Communications Security.ACM, 617-627.https://doi.org/10.1145/2382196.2382261
|
Song, X., Liu, F., Yang, C., et al., 2015.Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security.ACM, 15-23.https://doi.org/10.1145/2756601.2756608
|
Sun, H.R., Zhu, J.J., Yin, P.C., et al., 2012. A Zero-Watermarking Algorithm Based on Vector Map Feature Points and Blocks.Geography and Geo-Information Science, 28(4):111-112(in Chinese). http://en.cnki.com.cn/Article_en/CJFDTotal-JSJK201207024.htm
|
Sun, Y.C., 2017.Research on the Application of Vector Map Watermarking Technology in Geographic Information Management (Dissertation).Yanbian University, Yanbian(in Chinese with English abstract).
|
Sun, Y.C., Li, D., 2017.Vector Map Zero-Watermark Algorithm Based on Node Feature.Geography and Geo-Information Science, 33(3):17-21(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DLGT201703004.htm
|
Tang, Y.L., Zhang, Y.P., Ye, Q., et al., 2017.Logarithmic Quantization Index Modulation Digital Watermarking Algorithm Based on DWT Domain.Computer Applications and Software, 34(8):206-212(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-JYRJ201708037.htm
|
Wang, C., Wang, W., Wu, B.Y., et al., 2009.A Watermarking Algorithm for Vector Data Based on Spatial Domain.2009 First International Conference on Information Science and Engineering.IEEE, Nanjing, China, 1959-1962.https://doi.org/10.1109/icise.2009.199
|
Wang, H.R., 2014.Scrambling Encryption Methods and Scrambling Performance Evaluation for Vector Geographic Data (Dissertation).Nanjing Normal University, Nanjing(in Chinese with English abstract).
|
Wang, H.W., 2012.Method of Map Data Processing of Changde Geographic Information Platform.Geomatics & Spatial Information Technology, 35(6):144-147(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DBCH201206044.htm
|
Wang, J.J., Zhang, X.Q., Wei, Y.Q., 2008.Hiding Algorithm of Digital Image Sharing Based on LSB.Computer Engineering and Design, 29(23):6167-6170(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-SJSJ200823076.htm
|
Wang, J.Y., 2009.Development of Geographic Information System and Developing Geographic Information System.Engineering Science, 11(2):10-16(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-GCKX200902004.htm
|
Wang, Q.S., Zhu, C.Q., Xu, D.H., 2011.Watermarking Algorithm for Vector Geo-Spatial Data Based on DFT Phase.Geomatics and Information Science of Wuhan University, 36(5):523-526(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-WHCH201105005.htm
|
Wang, X., Huang, D.J., Zhang, Z.Y., 2012.A Robust Zero-Watermarking Algorithm for Vector Digital Maps Based on Statistical Characteristics.Journal of Software, 7(10):2349-2356. https://doi.org/10.4304/jsw.7.10.2349-2356
|
Wang, Y.F., Zhao, J., Cui, W.H., et al., 2012.A Vector Data Watermarking Algorithm Based on Minimum Quadtree Division.Computer Engineering, 38(22):111-113(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJC201222029.htm
|
Wang, Y.Y., Yang, C.S., Zhu, C.Q., et al., 2018a.An Efficient Robust Multiple Watermarking Algorithm for Vector Geographic Data.Information, 9(12):296. https://doi.org/10.3390/info9120296
|
Wang, Y.Y., Yang, C.S., Zhu, C.Q., 2018b.A Multiple Watermarking Algorithm for Vector Geographic Data Based on Coordinate Mapping and Domain Subdivision.Multimedia Tools and Applications, 77(15):19261-19279. https://doi.org/10.1007/s11042-017-5358-6
|
Wen, C.C., Wang, Q., Miao, X.N., et al., 2012.Digital Image Encryption:A Survey.Computer Science, 39(12):6-9(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-JSJA201212003.htm
|
Wen, Z.C., Guo, J.Z., Ai, B., et al., 2013.Application of Information Hiding Techniques to Geospatial Data Security.Engineering of Surveying and Mapping, 22(3):65-68(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-CHGC201303018.htm
|
Wendzel, S., Zander, S., Fechner, B., et al., 2015.Pattern-Based Survey and Categorization of Network Covert Channel Techniques.ACM Computing Surveys, 47(3):1-26. https://doi.org/10.1145/2684195
|
Wu, F.Q., Cui, W.H., Chen, H.W., 2008.A Compound Chaos-Based Encryption Algorithm for Vector Geographic Data under Network Circumstance.2008 Congress on Image and Signal Processing.IEEE, Sanya, China, 254-258.https://doi.org/10.1109/cisp.2008.86
|
Wu, X.Q., Zhang, L., 2008.Research on Vector Data Encryption Method Based on Chaotic System and GPS.Journal of Kunming University of Science and Technology (Science and Technology), 33(4):119-122(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-KMLG200804029.htm
|
Xi, X., Zhang, X.C., Liang, W.D., et al., 2019.Dual Zero-Watermarking Scheme for Two-Dimensional Vector Map Based on Delaunay Triangle Mesh and Singular Value Decomposition.Applied Sciences, 9(4):642. https://doi.org/10.3390/app9040642
|
Xia, Z.H., Wang, X.H., Sun, X.M., et al., 2016.Steganalysis of LSB Matching Using Differences between Nonadjacent Pixels.Multimedia Tools and Applications, 75(4):1947-1962. https://doi.org/10.1007/s11042-014-2381-8
|
Xie, Y.C., Lin, Y.Q., Li, Y., 2010.New Improvement of Douglas-Peucker Algorithm in Non-Topology Vector Data Compression.Computer Applications and Software, 27(1):141-144(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-JYRJ201001045.htm
|
Xu, D.H., Wang, Q.S., Zhu, C.Q., 2008.Watermarking Algorithm for Vector Geo-Spatial Data Based on Amplitude of DFT Domain.Science of Surveying and Mapping, 33(5):129-131(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-CHKD200805045.htm
|
Xue, S., Wang, G.X., Guo, J.Z., et al., 2017.An Encryption Algorithm for High Precision Vector Map Based on Layered Compression.Journal of Geomatics Science and Technology, 34(5):535-540(in Chinese with English abstract). http://www.zhangqiaokeyan.com/academic-journal-cn_journal-geomatics-science-technology_thesis/0201252546395.html
|
Yang, C.S., Zhu, C.Q., Wang, Y.Y., 2011.Self-Detection Watermarking Algorithm and Its Application to Vector Geo-Spatial Data.Geomatics and Information Science of Wuhan University, 36(12):1402-1405(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-WHCH201112004.htm
|
Yang, M.M., Wang, H., 2008.Discuss on Key Technique of Public Map Compiling Based on Fundamental Geographic Information Data.Geomatics Technology and Equipment, 10(2):5-7(in Chinese with English abstract).
|
Yao, C., Tang, Z.G., Li, H.Z., et al., 2016.Covert Channels of FTP Protocol Based on Encoding Directory.Computer Engineering and Design, 37(11):2944-2948(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-SJSJ201611016.htm
|
Yue, D.J., Mei, H., 2007.Processing of Vectorization Error to Scanned Map Based on Least Squares Collocation Method.Science of Surveying and Mapping, 32(2):51-53(in Chinese with English abstract). http://www.en.cnki.com.cn/Article_en/CJFDTOTAL-CHKD200702017.htm
|
Zeeshan, M., Ullah, S., Anayat, S., et al., 2017.A Review Study on Unique Way of Information Hiding:Steganography.International Journal on Data Science and Technology, 3(5):45. https://doi.org/10.11648/j.ijdst.20170305.11
|
Zeng, D.Y., Yan, H.W., Niu, L.T., et al., 2013.A Non-Blind Digital Watermarking Algorithm for Vector Map Data.Journal of Lanzhou Jiaotong University, 32(4):176-180(in Chinese with English abstract). http://www.en.cnki.com.cn/Article_en/CJFDTotal-LZTX201304040.htm
|
Zhang, G.R., Yin, J., 2006.Privacy Preserving Clustering by Isometric Transformation.Application Research of Computers, 23(10):95-97(in Chinese with English abstract). http://d.wanfangdata.com.cn/Periodical_jsjyyyj200607028.aspx
|
Zhang, H.L., Wang, Q.S., Zou, Y.C., 2012.Encryption of Vector Data Based on Composite Chaotic System.Science of Surveying and Mapping, 37(5):87-89(in Chinese with English abstract). http://www.en.cnki.com.cn/Article_en/CJFDTOTAL-CHKD201205028.htm
|
Zhang, L.J., Li, A.B., Lü, G.N., et al., 2008.Study on Adaptive Watermark of GIS Vector Data.Geo-Information Science, 10(6):6724-6729(in Chinese with English abstract). http://www.oalib.com/paper/1553901
|
Zhang, L.M., Yan, H.W., Qi, J.X., et al., 2015.DFT Domain Watermarking Algorithm for Point Data Based on Grid Partitioning.Journal of Lanzhou Jiaotong University, 34(4):166-172(in Chinese with English abstract). http://www.en.cnki.com.cn/Article_en/CJFDTotal-LZTX201504032.htm
|
Zhang, Y., Qin, C., Zhang, W.M., et al., 2018.On the Fault-Tolerant Performance for a Class of Robust Image Steganography.Signal Processing, 146:99-111. https://doi.org/10.1016/j.sigpro.2018.01.011
|
Zhang, Z.L., Xu, J.Y., 2011.An Improvement of Image Scrambling Method Based on Gravity Model.Techniques of Automation and Applications, 30(10):45-47(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-ZDHJ201110014.htm
|
Zhao, Y.X., Li, G., Li, L., 2007.Electronic Chart Encryption Method Based on Chaotic Stream Cipher.Journal of Harbin Engineering University, 28(1):60-64(in Chinese with English abstract). http://www.sciencedirect.com/science/article/pii/S0960077905012257
|
Zheng, L.B., You, F.C., 2009.A Fragile Digital Watermark Used to Verify the Integrity of Vector Map.2009 International Conference on E-Business and Information System Security.IEEE, Wuhan, China, 1-4.https://doi.org/10.1109/ebiss.2009.5137869
|
Zhong, S.P., Gao, Q.S., 2004a.Practical Map Encryption Algorithm Based on Chaos System under Network Circumstance.Journal of Computer Aided Design & Computer Graphics, 16(2):238-242(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJF200402016.htm
|
Zhong, S.P., Gao, Q.S., 2004b.An Efficient Lossless Compression Algorithm for a Kind of Two-Dimension Vector Maps. Acta Simulata Systematica Sinica, 16(10):2189-2194(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-XTFZ20041000I.htm
|
Zhong, S.P., Liu, Z.F., Chen, Q.J., 2009.Reversible Watermarking Algorithm for Vector Maps Using the Difference Expansion Method of a Composite Integer Transform.Journal of Computer-Aided Design & Computer Graphics, 21(12):1839-1849(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJF200912022.htm
|
Zhou, C.H., 2015.Prospects on Pan-Spatial Information System.Progress in Geography, 34(2):129-131(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DLKJ201502001.htm
|
Zhou, L., Hu, Y.J., Zeng, H.F., 2009.Reversible Data Hiding Algorithm for Vector Digital Maps.Journal of Computer Applications, 29(4):990-993(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJY200904026.htm
|
Zhou, L.N., Lü, X.Y., 2019.The Review of Information Hiding Technology Based on GAN Image Generation.Journal of Information Security Research, 5(9):771-777(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-XAQY201909002.htm
|
Zhu, C.Q., 2015.Research on the Policy and Law of Geographic Information Security in China.Science Press, Beijing(in Chinese).
|
Zhu, C.Q., 2017.Research Progresses in Digital Watermarking and Encryption Control for Geographical Data.Acta Geodaetica et Cartographica Sinica, 46(10):1609-1619 (in Chinese with English abstract). http://www.ingentaconnect.com/content/doaj/10011595/2017/00000046/00000010/art00041
|
Zhu, F.X., Miao, L.M., Liu, W., 2014.Research on Vessel Trajectory Multi-Dimensional Compression Algorithm Based on Douglas-Peucker Theory.Applied Mechanics and Materials, 694:59-62. https://doi.org/10.4028/www.scientific.net/amm.694.59
|
Zhu, Y.F., Zhang, G., 2015.Geospatial Data Encryption Based on Logistic Map.Computer Applications and Software, 32(12):310-312(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JYRJ201512074.htm
|
Zope-Chaudhari, S., Venkatachalam, P., Mohan, K., 2017.Copyright Protection of Vector Data Using Vector Watermark.2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).IEEE, Fort Worth, TX, USA, 6110-6113. https://doi.org/10.1109/igarss.2017.8128403
|
曹阳, 肖菁, 张文才, 2016.基于零水印和可逆水印的矢量地图多重水印算法.华南师范大学学报(自然科学版), 48(3):69-74. https://www.cnki.com.cn/Article/CJFDTOTAL-HNSF201603012.htm
|
车森, 邓术军, 2008.基于双重网格的矢量地图数字水印算法.海洋测绘, 28(1):13-17. https://www.cnki.com.cn/Article/CJFDTOTAL-HYCH200801006.htm
|
崔翰川, 2013.面向共享的矢量地理数据安全关键技术研究(博士学位论文).南京: 南京师范大学.
|
邓韬, 2009.基于变换域的二维工程图加密技术研究(硕士学位论文).长沙: 湖南大学.
|
傅宏, 2010.公众版地图地理要素脱密处理方法.地理空间信息, 8(4):133-134. https://www.cnki.com.cn/Article/CJFDTOTAL-DXKJ201004045.htm
|
何冰, 2010.基于LSB的抗旋转攻击鲁棒性数字水印算法.系统仿真技术, 6(4):304-307. https://www.cnki.com.cn/Article/CJFDTOTAL-XTFJ201004010.htm
|
胡春杰, 2017.基于混沌理论的空域图像加密算法研究(硕士学位论文).南京: 南京信息工程大学.
|
康健, 王黔驹, 颜世强, 2012.1:25万公众版地形图应用于1:25万地质图的技术方法研究与探讨.中国地质, 39(4):1087-1093. https://www.cnki.com.cn/Article/CJFDTOTAL-DIZI201204026.htm
|
李安波, 王海荣, 周卫, 2015.基于二维混沌系统的矢量数字地图置乱加密.中国矿业大学学报, 44(4):747-753. https://www.cnki.com.cn/Article/CJFDTOTAL-ZGKD201504023.htm
|
李光师, 孟祥茹, 2012.Oracle中矢量数据安全保护方法.计算机工程, 38(10):102-104. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJC201210032.htm
|
李彦峰, 丁丽萍, 吴敬征, 等, 2019.网络隐蔽信道关键技术研究综述.软件学报, 30(8):2470-2490. https://www.cnki.com.cn/Article/CJFDTOTAL-RJXB201908014.htm
|
梁伟东, 张新长, 奚旭, 等, 2018.基于零水印与脆弱水印的矢量地理数据多重水印算法.中山大学学报(自然科学版), 57(4):1-8. https://www.cnki.com.cn/Article/CJFDTOTAL-ZSDZ201804001.htm
|
刘正, 2017.矢量地图数据加密技术研究(硕士学位论文).哈尔滨: 哈尔滨工程大学.
|
娄嘉鹏, 张萌, 付鹏, 等, 2016.一种基于TCP协议的网络隐蔽传输方案设计.信息网络安全, (1):34-39. https://www.cnki.com.cn/Article/CJFDTOTAL-XXAQ201601007.htm
|
吕海洋, 周卫, 盛业华, 等, 2017.拓扑保形的矢量地理数据几何脱密方法.中国矿业大学学报, 46(3):648-654. https://www.cnki.com.cn/Article/CJFDTOTAL-ZGKD201703026.htm
|
彭晓艳, 龙毅, 毋河海, 2002.基于仿射变换的MapInfo矢量图形坐标纠正的方法探讨.测绘信息与工程, 27(5):6-7. https://www.cnki.com.cn/Article/CJFDTOTAL-CHXG200205002.htm
|
屈静, 鲍远律, 2006.交通矢量地图离散非线性校正算法.计算机仿真, 23(5):77-80. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJZ200605022.htm
|
任娜, 吴维, 朱长青, 等, 2015.一种抗要素删除的矢量地理数据精确认证算法.地理与地理信息科学, 31(4):43-46. https://www.cnki.com.cn/Article/CJFDTOTAL-DLGT201504009.htm
|
孙鸿睿, 朱建军, 尹鹏程, 等, 2012.一种基于矢量地图特征点和分块的零水印算法.地理与地理信息科学, 28(4):111-112. https://www.cnki.com.cn/Article/CJFDTOTAL-DLGT201204026.htm
|
孙俞超, 2017.矢量地图水印技术在地理信息管理中的应用研究(硕士学位论文).延吉: 延边大学.
|
孙俞超, 李德, 2017.基于节点特征的矢量地图零水印算法.地理与地理信息科学, 33(3):17-21. https://www.cnki.com.cn/Article/CJFDTOTAL-DLGT201703004.htm
|
汤永利, 张亚萍, 叶青, 等, 2017.基于DWT域对数量化索引调制的数字水印算法.计算机应用与软件, 34(8):206-212. https://www.cnki.com.cn/Article/CJFDTOTAL-JYRJ201708037.htm
|
王海荣, 2014.矢量地理数据的置乱加密方法及置乱性能评测(硕士学位论文).南京: 南京师范大学.
|
王宏伟, 2012.常德市地理信息平台中地图数据的处理方法.测绘与空间地理信息, 35(6):144-147. https://www.cnki.com.cn/Article/CJFDTOTAL-DBCH201206044.htm
|
王继军, 张显全, 韦月琼, 2008.基于LSB的数字图像分存隐藏算法.计算机工程与设计, 29(23):6167-6170. https://www.cnki.com.cn/Article/CJFDTOTAL-SJSJ200823076.htm
|
王家耀, 2009.地理信息系统的发展与发展中的地理信息系统.中国工程科学, 11(2):10-16. https://www.cnki.com.cn/Article/CJFDTOTAL-GCKX200902004.htm
|
王奇胜, 朱长青, 许德合, 2011.利用DFT相位的矢量地理空间数据水印方法.武汉大学学报(信息科学版), 36(5):523-526. https://www.cnki.com.cn/Article/CJFDTOTAL-WHCH201105005.htm
|
王云飞, 赵婧, 崔伟宏, 等, 2012.一种基于最小四叉树划分的矢量数据水印算法.计算机工程, 38(22):111-113. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJC201222029.htm
|
文昌辞, 王沁, 苗晓宁, 等, 2012.数字图像加密综述.计算机科学, 39(12):6-9. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJA201212003.htm
|
文志成, 郭建忠, 艾彬, 等, 2013.信息隐藏技术在地理空间数据安全中的应用.测绘工程, 22(3):65-68. https://www.cnki.com.cn/Article/CJFDTOTAL-CHGC201303018.htm
|
吴学群, 张凌, 2008.基于混沌和GPS的矢量数据加密方法的研究.昆明理工大学学报(理工版), 33(4):119-122. https://www.cnki.com.cn/Article/CJFDTOTAL-KMLG200804029.htm
|
谢亦才, 林渝淇, 李岩, 2010.Douglas-Peucker算法在无拓扑矢量数据压缩中的新改进.计算机应用与软件, 27(1):141-144. https://www.cnki.com.cn/Article/CJFDTOTAL-JYRJ201001045.htm
|
许德合, 王奇胜, 朱长青, 2008.基于DFT幅度的矢量地理空间数据数字水印算法.测绘科学, 33(5):129-131. https://www.cnki.com.cn/Article/CJFDTOTAL-CHKD200805045.htm
|
薛帅, 王光霞, 郭建忠, 等, 2017.一种分层压缩的高精度矢量地图加密方法.测绘科学技术学报, 34(5):535-540. https://www.cnki.com.cn/Article/CJFDTOTAL-JFJC201705019.htm
|
杨成松, 朱长青, 王莹莹, 2011.矢量地理数据自检测水印算法及其应用研究.武汉大学学报(信息科学版), 36(12):1402-1405. https://www.cnki.com.cn/Article/CJFDTOTAL-WHCH201112004.htm
|
杨梦梅, 王辉, 2008.利用基础地理信息数据编制公开版地图的关键技术探讨.测绘技术装备, 10(2):5-7. https://www.cnki.com.cn/Article/CJFDTOTAL-CHKJ200802001.htm
|
姚诚, 唐彰国, 李焕洲, 等, 2016.基于FTP目录编码的隐蔽信道.计算机工程与设计, 37(11):2944-2948. https://www.cnki.com.cn/Article/CJFDTOTAL-SJSJ201611016.htm
|
岳东杰, 梅红, 2007.地图扫描矢量化误差的最小二乘配置法处理研究.测绘科学, 32(2):51-53. https://www.cnki.com.cn/Article/CJFDTOTAL-CHKD200702017.htm
|
曾端阳, 闫浩文, 牛莉婷, 等, 2013.矢量地图的一种非盲数字水印算法.兰州交通大学学报, 32(4):176-180. https://www.cnki.com.cn/Article/CJFDTOTAL-LZTX201304040.htm
|
张国荣, 印鉴, 2006.应用正交变换保护数据中的隐私信息.计算机应用研究, 23(10):95-97. https://www.cnki.com.cn/Article/CJFDTOTAL-JSYJ200610032.htm
|
张翰林, 王青山, 邹永初, 2012.复合混沌系统的矢量数据加密研究.测绘科学, 37(5):87-89. https://www.cnki.com.cn/Article/CJFDTOTAL-CHKD201205028.htm
|
张丽娟, 李安波, 闾国年, 等, 2008.GIS矢量数据的自适应水印研究.地球信息科学, 10(6):6724-6729. https://www.cnki.com.cn/Article/CJFDTOTAL-DQXX200806008.htm
|
张黎明, 闫浩文, 齐建勋, 等, 2015.一种网格划分的点数据DFT域盲水印算法.兰州交通大学学报, 34(4):166-172. https://www.cnki.com.cn/Article/CJFDTOTAL-LZTX201504032.htm
|
张泽麟, 徐金玉, 2011.改进的基于万有引力模型的图像置乱方法.自动化技术与应用, 30(10):45-47. https://www.cnki.com.cn/Article/CJFDTOTAL-ZDHJ201110014.htm
|
赵玉新, 李刚, 李磊, 2007.基于混沌流密码体制的电子海图数据加密方法.哈尔滨工程大学学报, 28(1):60-64. https://www.cnki.com.cn/Article/CJFDTOTAL-HEBG200701013.htm
|
钟尚平, 高庆狮, 2004a.网络环境下地图的混沌加密实用算法.计算机辅助设计与图形学学报, 16(2):238-242. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJF200402016.htm
|
钟尚平, 高庆狮, 2004b.一类矢量地图的无损压缩算法.系统仿真学报, 16(10):2189-2194. https://www.cnki.com.cn/Article/CJFDTOTAL-XTFZ20041000I.htm
|
钟尚平, 刘志峰, 陈群杰, 2009.采用复合整数变换差值扩大法的矢量地图可逆水印算法.计算机辅助设计与图形学学报, 21(12):1839-1849. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJF200912022.htm
|
周成虎, 2015.全空间地理信息系统展望.地理科学进展, 34(2):129-131. https://www.cnki.com.cn/Article/CJFDTOTAL-DLKJ201502001.htm
|
周琳娜, 吕欣一, 2019.基于GAN图像生成的信息隐藏技术综述.信息安全研究, 5(9):771-777. https://www.cnki.com.cn/Article/CJFDTOTAL-XAQY201909002.htm
|
周璐, 胡永健, 曾华飞, 2009.用于矢量数字地图的可逆数据隐藏算法.计算机应用, 29(4):990-993. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJY200904026.htm
|
朱长青, 2015.中国地理信息安全的政策和法律研究.北京:科学出版社.
|
朱长青, 2017.地理数据数字水印和加密控制技术研究进展.测绘学报, 46(10):1609-1619. https://www.cnki.com.cn/Article/CJFDTOTAL-CHXB201710043.htm
|
朱颖芳, 张贵, 2015.基于Logistic映射的地理空间数据加密.计算机应用与软件, 32(12):310-312. https://www.cnki.com.cn/Article/CJFDTOTAL-JYRJ201512074.htm
|