An encryption algorithm for vector maps based on the Gaussian random and Haar transform

被引:7
|
作者
Wang, Xiaolong [1 ,2 ,3 ]
Yan, Haowen [1 ,2 ,3 ]
Zhang, Liming [1 ,2 ,3 ]
Zhang, Xingang [1 ,2 ,3 ]
Li, Pengbo [1 ,2 ,3 ]
机构
[1] Lanzhou Jiaotong Univ, Fac Geomat, Lanzhou, Peoples R China
[2] Natl Local Joint Engn Res Ctr Technol & Applicat, Lanzhou, Peoples R China
[3] Gansu Prov Engn Lab Natl Geog State Monitoring, Lanzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Vector map; encryption; Haar transform; Gaussian random; SHA; WATERMARKING SCHEME; INFORMATION;
D O I
10.1080/14498596.2021.1982420
中图分类号
P9 [自然地理学];
学科分类号
0705 ; 070501 ;
摘要
Security of vector maps is of importance in the community of geographic information sciences. Although some encryption techniques can protect vector maps from piracy, they need to decrypt the entire map in order to extract parts of the data, which obviously brings inconvenience to the users. To solve the problem, an encryption algorithm for vector maps based on Gaussian random and Haar transform is proposed in this paper. First, all vertices are randomized via the Gaussian random method to get the shuffled vector map coordinates. Then, the average coefficient and the differential coefficient generated by the Haar transform are encrypted. Lastly, the encrypted map data is obtained through performing the inverse Haar transformation. Experiments show that (1) the proposed algorithm guarantees authorized users can decrypt any parts (layers) of encrypted vector maps; and (2) the algorithm outperforms other existing encryption methods in security and efficiency.
引用
收藏
页码:303 / 318
页数:16
相关论文
共 50 条
  • [21] Novel image encryption algorithm based on multiple-parameter discrete fractional random transform
    Zhou, Nanrun
    Dong, Taiji
    Wu, Jianhua
    OPTICS COMMUNICATIONS, 2010, 283 (15) : 3037 - 3042
  • [22] Selective encryption algorithm using hybrid transform for GIS vector map
    Van B.N.
    Lee S.-H.
    Kwon K.-R.
    Journal of Information Processing Systems, 2017, 13 (01): : 68 - 82
  • [23] Detecting Algorithm for Object Based-Double Haar Transform
    Liu, Yingxia
    Chang, Faliang
    COMPUTER SCIENCE FOR ENVIRONMENTAL ENGINEERING AND ECOINFORMATICS, PT 2, 2011, 159 : 442 - 446
  • [24] Robust audio blind watermarking algorithm based on Haar transform
    Chen, B.-Y. (chenbaoyuan@126.com), 1600, Harbin Institute of Technology, P.O. Box 136, Harbin, 150001, China (20):
  • [25] Quantum Image Watermarking Algorithm Based on Haar Wavelet Transform
    Hu, Wen-Wen
    Zhou, Ri-Gui
    El-Rafei, Ahmed
    Jiang, She-Xiang
    IEEE ACCESS, 2019, 7 : 121303 - 121320
  • [26] Image Encryption Based On Gyrator Transform Using Chaotic Maps
    Khanzadi, Himan
    Omam, Mojtaba Amini
    Lotfifar, Foad
    Eshghi, Mohammad
    2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III, 2010, : 2608 - +
  • [27] Robust Audio Blind Watermarking Algorithm Based on Haar Transform
    Bao-Yuan Chen
    Yi-Qiang Zhu
    Lei-Lei Tian
    Ying-Ying Li
    Ya-Qiong Lan
    Journal of Harbin Institute of Technology(New series), 2013, (03) : 104 - 108
  • [28] Robust Audio Blind Watermarking Algorithm Based on Haar Transform
    Bao-Yuan Chen
    Yi-Qiang Zhu
    Lei-Lei Tian
    Ying-Ying Li
    Ya-Qiong Lan
    Journal of Harbin Institute of Technology, 2013, 20 (03) : 104 - 108
  • [29] Double-image encryption using discrete fractional random transform and logistic maps
    Sui, Liansheng
    Lu, Haiwei
    Wang, Zhanmin
    Sun, Qindong
    OPTICS AND LASERS IN ENGINEERING, 2014, 56 : 1 - 12
  • [30] Image block encryption algorithm based on chaotic maps
    Liu, Lingfeng
    Hao, Shidi
    Lin, Jun
    Wang, Ze
    Hu, Xinyi
    Miao, Suoxia
    IET SIGNAL PROCESSING, 2018, 12 (01) : 22 - 30