Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution

In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Applied sciences 2019-11, Vol.9 (22), p.4889
Hauptverfasser: Pham, Giao N., Ngo, Son T., Bui, Anh N., Tran, Dinh V., Lee, Suk-Hwan, Kwon, Ki-Ryong
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 22
container_start_page 4889
container_title Applied sciences
container_volume 9
creator Pham, Giao N.
Ngo, Son T.
Bui, Anh N.
Tran, Dinh V.
Lee, Suk-Hwan
Kwon, Ki-Ryong
description In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.
doi_str_mv 10.3390/app9224889
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2409115229</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2409115229</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-2344b70ea8c222d756e734ef9c5ad3566f265e415fb1955212e3863e39bbe47f3</originalsourceid><addsrcrecordid>eNpNkE1PwzAMhiMEEtPYhV8QiRtSIZ9tcxxjDKRNSAy4VmmaQKa2CUl62L-nY0jgiy378Wv5BeASoxtKBbqV3gtCWFmKEzAhqMgzynBx-q8-B7MYd2gMgWmJ0QQ071olF-BGevgi-8Z1cNmrsPfJuh7O2w8XbPrs4J2MuoFjazO0yWZbJVsNt7bzrTVWyR96XIcrOcRoZQ_vbUzB1sNhcgHOjGyjnv3mKXh7WL4uHrP18-ppMV9nigieMkIZqwukZakIIU3Bc11Qpo1QXDaU57khOdcMc1NjwTnBRNMyp5qKutasMHQKro66PrivQcdU7dwQ-vFkRdj4MuaEiJG6PlIquBiDNpUPtpNhX2FUHYys_oyk351KZaY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2409115229</pqid></control><display><type>article</type><title>Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution</title><source>MDPI - Multidisciplinary Digital Publishing Institute</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Pham, Giao N. ; Ngo, Son T. ; Bui, Anh N. ; Tran, Dinh V. ; Lee, Suk-Hwan ; Kwon, Ki-Ryong</creator><creatorcontrib>Pham, Giao N. ; Ngo, Son T. ; Bui, Anh N. ; Tran, Dinh V. ; Lee, Suk-Hwan ; Kwon, Ki-Ryong</creatorcontrib><description>In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.</description><identifier>ISSN: 2076-3417</identifier><identifier>EISSN: 2076-3417</identifier><identifier>DOI: 10.3390/app9224889</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Access control ; Algorithms ; Apexes ; Backbone ; Copying ; Data base management systems ; Data encryption ; Data integrity ; Geographic information systems ; Normal distribution ; Performance evaluation ; Polygons ; Security ; Simplification ; Wavelet transforms</subject><ispartof>Applied sciences, 2019-11, Vol.9 (22), p.4889</ispartof><rights>2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-2344b70ea8c222d756e734ef9c5ad3566f265e415fb1955212e3863e39bbe47f3</citedby><cites>FETCH-LOGICAL-c295t-2344b70ea8c222d756e734ef9c5ad3566f265e415fb1955212e3863e39bbe47f3</cites><orcidid>0000-0002-3532-9434 ; 0000-0003-4098-3147 ; 0000-0001-8064-5594</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,860,27903,27904</link.rule.ids></links><search><creatorcontrib>Pham, Giao N.</creatorcontrib><creatorcontrib>Ngo, Son T.</creatorcontrib><creatorcontrib>Bui, Anh N.</creatorcontrib><creatorcontrib>Tran, Dinh V.</creatorcontrib><creatorcontrib>Lee, Suk-Hwan</creatorcontrib><creatorcontrib>Kwon, Ki-Ryong</creatorcontrib><title>Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution</title><title>Applied sciences</title><description>In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.</description><subject>Access control</subject><subject>Algorithms</subject><subject>Apexes</subject><subject>Backbone</subject><subject>Copying</subject><subject>Data base management systems</subject><subject>Data encryption</subject><subject>Data integrity</subject><subject>Geographic information systems</subject><subject>Normal distribution</subject><subject>Performance evaluation</subject><subject>Polygons</subject><subject>Security</subject><subject>Simplification</subject><subject>Wavelet transforms</subject><issn>2076-3417</issn><issn>2076-3417</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkE1PwzAMhiMEEtPYhV8QiRtSIZ9tcxxjDKRNSAy4VmmaQKa2CUl62L-nY0jgiy378Wv5BeASoxtKBbqV3gtCWFmKEzAhqMgzynBx-q8-B7MYd2gMgWmJ0QQ071olF-BGevgi-8Z1cNmrsPfJuh7O2w8XbPrs4J2MuoFjazO0yWZbJVsNt7bzrTVWyR96XIcrOcRoZQ_vbUzB1sNhcgHOjGyjnv3mKXh7WL4uHrP18-ppMV9nigieMkIZqwukZakIIU3Bc11Qpo1QXDaU57khOdcMc1NjwTnBRNMyp5qKutasMHQKro66PrivQcdU7dwQ-vFkRdj4MuaEiJG6PlIquBiDNpUPtpNhX2FUHYys_oyk351KZaY</recordid><startdate>20191114</startdate><enddate>20191114</enddate><creator>Pham, Giao N.</creator><creator>Ngo, Son T.</creator><creator>Bui, Anh N.</creator><creator>Tran, Dinh V.</creator><creator>Lee, Suk-Hwan</creator><creator>Kwon, Ki-Ryong</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-3532-9434</orcidid><orcidid>https://orcid.org/0000-0003-4098-3147</orcidid><orcidid>https://orcid.org/0000-0001-8064-5594</orcidid></search><sort><creationdate>20191114</creationdate><title>Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution</title><author>Pham, Giao N. ; Ngo, Son T. ; Bui, Anh N. ; Tran, Dinh V. ; Lee, Suk-Hwan ; Kwon, Ki-Ryong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-2344b70ea8c222d756e734ef9c5ad3566f265e415fb1955212e3863e39bbe47f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Access control</topic><topic>Algorithms</topic><topic>Apexes</topic><topic>Backbone</topic><topic>Copying</topic><topic>Data base management systems</topic><topic>Data encryption</topic><topic>Data integrity</topic><topic>Geographic information systems</topic><topic>Normal distribution</topic><topic>Performance evaluation</topic><topic>Polygons</topic><topic>Security</topic><topic>Simplification</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Pham, Giao N.</creatorcontrib><creatorcontrib>Ngo, Son T.</creatorcontrib><creatorcontrib>Bui, Anh N.</creatorcontrib><creatorcontrib>Tran, Dinh V.</creatorcontrib><creatorcontrib>Lee, Suk-Hwan</creatorcontrib><creatorcontrib>Kwon, Ki-Ryong</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Applied sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pham, Giao N.</au><au>Ngo, Son T.</au><au>Bui, Anh N.</au><au>Tran, Dinh V.</au><au>Lee, Suk-Hwan</au><au>Kwon, Ki-Ryong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution</atitle><jtitle>Applied sciences</jtitle><date>2019-11-14</date><risdate>2019</risdate><volume>9</volume><issue>22</issue><spage>4889</spage><pages>4889-</pages><issn>2076-3417</issn><eissn>2076-3417</eissn><abstract>In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/app9224889</doi><orcidid>https://orcid.org/0000-0002-3532-9434</orcidid><orcidid>https://orcid.org/0000-0003-4098-3147</orcidid><orcidid>https://orcid.org/0000-0001-8064-5594</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2076-3417
ispartof Applied sciences, 2019-11, Vol.9 (22), p.4889
issn 2076-3417
2076-3417
language eng
recordid cdi_proquest_journals_2409115229
source MDPI - Multidisciplinary Digital Publishing Institute; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Access control
Algorithms
Apexes
Backbone
Copying
Data base management systems
Data encryption
Data integrity
Geographic information systems
Normal distribution
Performance evaluation
Polygons
Security
Simplification
Wavelet transforms
title Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T03%3A35%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Vector%20Map%20Random%20Encryption%20Algorithm%20Based%20on%20Multi-Scale%20Simplification%20and%20Gaussian%20Distribution&rft.jtitle=Applied%20sciences&rft.au=Pham,%20Giao%20N.&rft.date=2019-11-14&rft.volume=9&rft.issue=22&rft.spage=4889&rft.pages=4889-&rft.issn=2076-3417&rft.eissn=2076-3417&rft_id=info:doi/10.3390/app9224889&rft_dat=%3Cproquest_cross%3E2409115229%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2409115229&rft_id=info:pmid/&rfr_iscdi=true