DOI QR코드

DOI QR Code

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map

  • Van, Bang Nguyen (Dept. of IT Convergence and Applications Engineering, Pukyong National University) ;
  • Lee, Suk-Hwan (Dept. of Information Security, Tongmyong University) ;
  • Kwon, Ki-Ryong (Dept. of IT Convergence and Applications Engineering, Pukyong National University)
  • Received : 2015.05.19
  • Accepted : 2016.01.19
  • Published : 2017.02.28

Abstract

Nowadays, geographic information system (GIS) is developed and implemented in many areas. A huge volume of vector map data has been accessed unlawfully by hackers, pirates, or unauthorized users. For this reason, we need the methods that help to protect GIS data for storage, multimedia applications, and transmission. In our paper, a selective encryption method is presented based on vertex randomization and hybrid transform in the GIS vector map. In the proposed algorithm, polylines and polygons are focused as the targets for encryption. Objects are classified in each layer, and all coordinates of the significant objects are encrypted by the key sets generated by using chaotic map before changing them in DWT, DFT domain. Experimental results verify the high efficiency visualization by low complexity, high security performance by random processes.

Keywords

References

  1. K. E. Foote and M. Lynch, "Geographic information systems as an integrating technology: context, concepts, and definitions," 2014 [Online]. Available: http://www.colorado.edu/geography/gcraft/notes/intro/intro_f.html.
  2. M. F. Goodchild, "Twenty years of progress: GIScience in 2010," Journal of Spatial Information Science, vol. 2010, no. 1, pp. 3-20, 2010.
  3. The GIS spatial data model, 2015 [Online]. Available: https://courses.washington.edu/gis250/lessons/introduction_gis/spatial_data_model.html.
  4. GIS digital vector maps, 2015 [Online]. Available: http://www.mapmart.com/Products/DigitalVectorMapping.aspx.
  5. Vector data, 2015 [Online]. Available: https://docs.qgis.org/2.8/en/docs/gentle_gis_introduction/vector_data.html.
  6. Advantage of vector map, 2015 [Online]. Available: https://maxdisruption.wordpress.com/2011/01/14/advantage-and-disadvantages-of-vectorraster-data/.
  7. E. Bertino and M. L. Damiani, "A controlled access to spatial data on web," in Proceedings of 7th AGILE Conference on Geographic Information Science, Crete, Greece, pp. 82-91, 2004.
  8. S. C. Chen, X. Wang, N. Rishe, and M. A. Weiss, "A web-based spatial data access system using semantic Rtrees," Journal of Information Sciences, vol. 167, no. 1-4, pp. 41-61, 2004. https://doi.org/10.1016/j.ins.2003.07.019
  9. R. Ohbuchi, H. Ueda, and S. Endoh, "Robust watermarking of vector digital maps," in Proceedings of IEEE International Conference on Multimedia and Expo, Lausanne, Switzerland, 2002, pp. 577-580.
  10. M. Voigt and C. Busch, "Feature-based watermarking of 2D vector data," in Proceedings of the SPIE 5020: Security and Watermarking of Multimedia Content. Bellingham, WA: International Society for Optics and Photonics, 2003, pp. 359-366.
  11. G. Schulz and M. Voigt, "A high capacity watermarking system for digital maps," in Proceedings of the 2004 Workshop on Multimedia and Security, Magdeburg, Germany, 2004, pp. 180-186.
  12. C. Wang, Z. Peng, Y. Peng, L. Yu, J. Wang, and Q. Zhao, "Watermarking geographical data on spatial topological relations," Multimedia Tools and Applications, vol. 57, no. 1, pp. 67-89, 2012. https://doi.org/10.1007/s11042-010-0536-9
  13. S. H. Lee and K. R. Kwon, "Vector watermarking scheme for GIS vector map management," Multimedia Tools and Applications, vol. 63, no. 3, pp. 757-790, 2013. https://doi.org/10.1007/s11042-011-0894-y
  14. F. Wu, W. Cui, and H. Chen, "A compound chaos-based encryption algorithm for vector geographic data under network circumstance," in Proceedings of 1st International Congress on Image and Signal Processing, Sanya, China, 2008, pp. 254-258.
  15. G. Li, "Research of key technologies on encrypting vector spatial data in oracle spatial," in Proceedings of 2nd International Conference on Information Engineering and Computer Science, Wuhan, China, 2010, pp. 1-4.
  16. Y. Dakroury, I. A. El-ghafar, and A Tammam, "Protecting GIS data using cryptography and digital watermarking," International Journal of Computer Science and Network Security, vol. 10, no. 1, pp. 75-84, 2010.
  17. B. J. Jang, S. H. Lee, and K. R. Kwon, "Perceptual encryption with compression for secure vector map data processing," Digital Signal Processing, vol. 25, pp. 224-243, 2014. https://doi.org/10.1016/j.dsp.2013.09.013
  18. Y. Pomeau and P. Manneville, "Intermittent Transition to Turbulence in Dissipative Dynamical Systems," Communications in Mathematical Physics, vol. 74, no. 2, pp. 189-197, 1980. https://doi.org/10.1007/BF01197757
  19. RSA Laboratories, PKCS #5: Password-Based Cryptography Standard (version 2.1) [Online]. Available: https://germany.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-5-password-based-cryptography-standard.htm.
  20. P. N. Giao, S. H. Lee, and K. R. Kwon, "Selective encryption algorithm for GIS vector map using geometric objects," International Journal of Security and Its Applications, vol. 9, no. 2, pp. 61-72, 2015. https://doi.org/10.14257/ijsia.2015.9.2.07
  21. P. N. Giao, G. C. Kwon, S. H. Lee, and K. R. Kwon, "Selective encryption algorithm based on DCT for GIS vector map," Journal of Korea Multimedia Society, vol. 17, no. 7, pp. 769-777, 2014. https://doi.org/10.9717/kmms.2014.17.7.769
  22. Wikipedia, Kerckhoffs's principle [Online]. Available: http://en.wikipedia.org/wiki/Kerckhoffs's_principle.