Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution
In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers...
Gespeichert in:
Veröffentlicht in: | Applied sciences 2019-11, Vol.9 (22), p.4889 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 22 |
container_start_page | 4889 |
container_title | Applied sciences |
container_volume | 9 |
creator | Pham, Giao N. Ngo, Son T. Bui, Anh N. Tran, Dinh V. Lee, Suk-Hwan Kwon, Ki-Ryong |
description | In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods. |
doi_str_mv | 10.3390/app9224889 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2409115229</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2409115229</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-2344b70ea8c222d756e734ef9c5ad3566f265e415fb1955212e3863e39bbe47f3</originalsourceid><addsrcrecordid>eNpNkE1PwzAMhiMEEtPYhV8QiRtSIZ9tcxxjDKRNSAy4VmmaQKa2CUl62L-nY0jgiy378Wv5BeASoxtKBbqV3gtCWFmKEzAhqMgzynBx-q8-B7MYd2gMgWmJ0QQ071olF-BGevgi-8Z1cNmrsPfJuh7O2w8XbPrs4J2MuoFjazO0yWZbJVsNt7bzrTVWyR96XIcrOcRoZQ_vbUzB1sNhcgHOjGyjnv3mKXh7WL4uHrP18-ppMV9nigieMkIZqwukZakIIU3Bc11Qpo1QXDaU57khOdcMc1NjwTnBRNMyp5qKutasMHQKro66PrivQcdU7dwQ-vFkRdj4MuaEiJG6PlIquBiDNpUPtpNhX2FUHYys_oyk351KZaY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2409115229</pqid></control><display><type>article</type><title>Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Pham, Giao N. ; Ngo, Son T. ; Bui, Anh N. ; Tran, Dinh V. ; Lee, Suk-Hwan ; Kwon, Ki-Ryong</creator><creatorcontrib>Pham, Giao N. ; Ngo, Son T. ; Bui, Anh N. ; Tran, Dinh V. ; Lee, Suk-Hwan ; Kwon, Ki-Ryong</creatorcontrib><description>In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.</description><identifier>ISSN: 2076-3417</identifier><identifier>EISSN: 2076-3417</identifier><identifier>DOI: 10.3390/app9224889</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Algorithms ; Apexes ; Backbone ; Copying ; Data base management systems ; Data encryption ; Data integrity ; Geographic information systems ; Normal distribution ; Performance evaluation ; Polygons ; Security ; Simplification ; Wavelet transforms</subject><ispartof>Applied sciences, 2019-11, Vol.9 (22), p.4889</ispartof><rights>2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-2344b70ea8c222d756e734ef9c5ad3566f265e415fb1955212e3863e39bbe47f3</citedby><cites>FETCH-LOGICAL-c295t-2344b70ea8c222d756e734ef9c5ad3566f265e415fb1955212e3863e39bbe47f3</cites><orcidid>0000-0002-3532-9434 ; 0000-0003-4098-3147 ; 0000-0001-8064-5594</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,860,27903,27904</link.rule.ids></links><search><creatorcontrib>Pham, Giao N.</creatorcontrib><creatorcontrib>Ngo, Son T.</creatorcontrib><creatorcontrib>Bui, Anh N.</creatorcontrib><creatorcontrib>Tran, Dinh V.</creatorcontrib><creatorcontrib>Lee, Suk-Hwan</creatorcontrib><creatorcontrib>Kwon, Ki-Ryong</creatorcontrib><title>Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution</title><title>Applied sciences</title><description>In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Apexes</subject><subject>Backbone</subject><subject>Copying</subject><subject>Data base management systems</subject><subject>Data encryption</subject><subject>Data integrity</subject><subject>Geographic information systems</subject><subject>Normal distribution</subject><subject>Performance evaluation</subject><subject>Polygons</subject><subject>Security</subject><subject>Simplification</subject><subject>Wavelet transforms</subject><issn>2076-3417</issn><issn>2076-3417</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkE1PwzAMhiMEEtPYhV8QiRtSIZ9tcxxjDKRNSAy4VmmaQKa2CUl62L-nY0jgiy378Wv5BeASoxtKBbqV3gtCWFmKEzAhqMgzynBx-q8-B7MYd2gMgWmJ0QQ071olF-BGevgi-8Z1cNmrsPfJuh7O2w8XbPrs4J2MuoFjazO0yWZbJVsNt7bzrTVWyR96XIcrOcRoZQ_vbUzB1sNhcgHOjGyjnv3mKXh7WL4uHrP18-ppMV9nigieMkIZqwukZakIIU3Bc11Qpo1QXDaU57khOdcMc1NjwTnBRNMyp5qKutasMHQKro66PrivQcdU7dwQ-vFkRdj4MuaEiJG6PlIquBiDNpUPtpNhX2FUHYys_oyk351KZaY</recordid><startdate>20191114</startdate><enddate>20191114</enddate><creator>Pham, Giao N.</creator><creator>Ngo, Son T.</creator><creator>Bui, Anh N.</creator><creator>Tran, Dinh V.</creator><creator>Lee, Suk-Hwan</creator><creator>Kwon, Ki-Ryong</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-3532-9434</orcidid><orcidid>https://orcid.org/0000-0003-4098-3147</orcidid><orcidid>https://orcid.org/0000-0001-8064-5594</orcidid></search><sort><creationdate>20191114</creationdate><title>Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution</title><author>Pham, Giao N. ; Ngo, Son T. ; Bui, Anh N. ; Tran, Dinh V. ; Lee, Suk-Hwan ; Kwon, Ki-Ryong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-2344b70ea8c222d756e734ef9c5ad3566f265e415fb1955212e3863e39bbe47f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Apexes</topic><topic>Backbone</topic><topic>Copying</topic><topic>Data base management systems</topic><topic>Data encryption</topic><topic>Data integrity</topic><topic>Geographic information systems</topic><topic>Normal distribution</topic><topic>Performance evaluation</topic><topic>Polygons</topic><topic>Security</topic><topic>Simplification</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Pham, Giao N.</creatorcontrib><creatorcontrib>Ngo, Son T.</creatorcontrib><creatorcontrib>Bui, Anh N.</creatorcontrib><creatorcontrib>Tran, Dinh V.</creatorcontrib><creatorcontrib>Lee, Suk-Hwan</creatorcontrib><creatorcontrib>Kwon, Ki-Ryong</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pham, Giao N.</au><au>Ngo, Son T.</au><au>Bui, Anh N.</au><au>Tran, Dinh V.</au><au>Lee, Suk-Hwan</au><au>Kwon, Ki-Ryong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution</atitle><jtitle>Applied sciences</jtitle><date>2019-11-14</date><risdate>2019</risdate><volume>9</volume><issue>22</issue><spage>4889</spage><pages>4889-</pages><issn>2076-3417</issn><eissn>2076-3417</eissn><abstract>In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/app9224889</doi><orcidid>https://orcid.org/0000-0002-3532-9434</orcidid><orcidid>https://orcid.org/0000-0003-4098-3147</orcidid><orcidid>https://orcid.org/0000-0001-8064-5594</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2076-3417 |
ispartof | Applied sciences, 2019-11, Vol.9 (22), p.4889 |
issn | 2076-3417 2076-3417 |
language | eng |
recordid | cdi_proquest_journals_2409115229 |
source | MDPI - Multidisciplinary Digital Publishing Institute; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Access control Algorithms Apexes Backbone Copying Data base management systems Data encryption Data integrity Geographic information systems Normal distribution Performance evaluation Polygons Security Simplification Wavelet transforms |
title | Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T03%3A35%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Vector%20Map%20Random%20Encryption%20Algorithm%20Based%20on%20Multi-Scale%20Simplification%20and%20Gaussian%20Distribution&rft.jtitle=Applied%20sciences&rft.au=Pham,%20Giao%20N.&rft.date=2019-11-14&rft.volume=9&rft.issue=22&rft.spage=4889&rft.pages=4889-&rft.issn=2076-3417&rft.eissn=2076-3417&rft_id=info:doi/10.3390/app9224889&rft_dat=%3Cproquest_cross%3E2409115229%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2409115229&rft_id=info:pmid/&rfr_iscdi=true |