1 |
K. E. Foote and M. Lynch, "Geographic information systems as an integrating technology: context, concepts, and definitions," 2014 [Online]. Available: http://www.colorado.edu/geography/gcraft/notes/intro/intro_f.html.
|
2 |
M. F. Goodchild, "Twenty years of progress: GIScience in 2010," Journal of Spatial Information Science, vol. 2010, no. 1, pp. 3-20, 2010.
|
3 |
The GIS spatial data model, 2015 [Online]. Available: https://courses.washington.edu/gis250/lessons/introduction_gis/spatial_data_model.html.
|
4 |
GIS digital vector maps, 2015 [Online]. Available: http://www.mapmart.com/Products/DigitalVectorMapping.aspx.
|
5 |
Vector data, 2015 [Online]. Available: https://docs.qgis.org/2.8/en/docs/gentle_gis_introduction/vector_data.html.
|
6 |
M. Voigt and C. Busch, "Feature-based watermarking of 2D vector data," in Proceedings of the SPIE 5020: Security and Watermarking of Multimedia Content. Bellingham, WA: International Society for Optics and Photonics, 2003, pp. 359-366.
|
7 |
E. Bertino and M. L. Damiani, "A controlled access to spatial data on web," in Proceedings of 7th AGILE Conference on Geographic Information Science, Crete, Greece, pp. 82-91, 2004.
|
8 |
S. C. Chen, X. Wang, N. Rishe, and M. A. Weiss, "A web-based spatial data access system using semantic Rtrees," Journal of Information Sciences, vol. 167, no. 1-4, pp. 41-61, 2004.
DOI
|
9 |
R. Ohbuchi, H. Ueda, and S. Endoh, "Robust watermarking of vector digital maps," in Proceedings of IEEE International Conference on Multimedia and Expo, Lausanne, Switzerland, 2002, pp. 577-580.
|
10 |
G. Schulz and M. Voigt, "A high capacity watermarking system for digital maps," in Proceedings of the 2004 Workshop on Multimedia and Security, Magdeburg, Germany, 2004, pp. 180-186.
|
11 |
C. Wang, Z. Peng, Y. Peng, L. Yu, J. Wang, and Q. Zhao, "Watermarking geographical data on spatial topological relations," Multimedia Tools and Applications, vol. 57, no. 1, pp. 67-89, 2012.
DOI
|
12 |
S. H. Lee and K. R. Kwon, "Vector watermarking scheme for GIS vector map management," Multimedia Tools and Applications, vol. 63, no. 3, pp. 757-790, 2013.
DOI
|
13 |
F. Wu, W. Cui, and H. Chen, "A compound chaos-based encryption algorithm for vector geographic data under network circumstance," in Proceedings of 1st International Congress on Image and Signal Processing, Sanya, China, 2008, pp. 254-258.
|
14 |
RSA Laboratories, PKCS #5: Password-Based Cryptography Standard (version 2.1) [Online]. Available: https://germany.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-5-password-based-cryptography-standard.htm.
|
15 |
Advantage of vector map, 2015 [Online]. Available: https://maxdisruption.wordpress.com/2011/01/14/advantage-and-disadvantages-of-vectorraster-data/.
|
16 |
G. Li, "Research of key technologies on encrypting vector spatial data in oracle spatial," in Proceedings of 2nd International Conference on Information Engineering and Computer Science, Wuhan, China, 2010, pp. 1-4.
|
17 |
Y. Dakroury, I. A. El-ghafar, and A Tammam, "Protecting GIS data using cryptography and digital watermarking," International Journal of Computer Science and Network Security, vol. 10, no. 1, pp. 75-84, 2010.
|
18 |
B. J. Jang, S. H. Lee, and K. R. Kwon, "Perceptual encryption with compression for secure vector map data processing," Digital Signal Processing, vol. 25, pp. 224-243, 2014.
DOI
|
19 |
Y. Pomeau and P. Manneville, "Intermittent Transition to Turbulence in Dissipative Dynamical Systems," Communications in Mathematical Physics, vol. 74, no. 2, pp. 189-197, 1980.
DOI
|
20 |
P. N. Giao, S. H. Lee, and K. R. Kwon, "Selective encryption algorithm for GIS vector map using geometric objects," International Journal of Security and Its Applications, vol. 9, no. 2, pp. 61-72, 2015.
DOI
|
21 |
P. N. Giao, G. C. Kwon, S. H. Lee, and K. R. Kwon, "Selective encryption algorithm based on DCT for GIS vector map," Journal of Korea Multimedia Society, vol. 17, no. 7, pp. 769-777, 2014.
DOI
|
22 |
Wikipedia, Kerckhoffs's principle [Online]. Available: http://en.wikipedia.org/wiki/Kerckhoffs's_principle.
|