Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0059

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map  

Van, Bang Nguyen (Dept. of IT Convergence and Applications Engineering, Pukyong National University)
Lee, Suk-Hwan (Dept. of Information Security, Tongmyong University)
Kwon, Ki-Ryong (Dept. of IT Convergence and Applications Engineering, Pukyong National University)
Publication Information
Journal of Information Processing Systems / v.13, no.1, 2017 , pp. 68-82 More about this Journal
Abstract
Nowadays, geographic information system (GIS) is developed and implemented in many areas. A huge volume of vector map data has been accessed unlawfully by hackers, pirates, or unauthorized users. For this reason, we need the methods that help to protect GIS data for storage, multimedia applications, and transmission. In our paper, a selective encryption method is presented based on vertex randomization and hybrid transform in the GIS vector map. In the proposed algorithm, polylines and polygons are focused as the targets for encryption. Objects are classified in each layer, and all coordinates of the significant objects are encrypted by the key sets generated by using chaotic map before changing them in DWT, DFT domain. Experimental results verify the high efficiency visualization by low complexity, high security performance by random processes.
Keywords
Chaotic Map; GIS Vector Map; Selective Encryption; Vector Map Security;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 K. E. Foote and M. Lynch, "Geographic information systems as an integrating technology: context, concepts, and definitions," 2014 [Online]. Available: http://www.colorado.edu/geography/gcraft/notes/intro/intro_f.html.
2 M. F. Goodchild, "Twenty years of progress: GIScience in 2010," Journal of Spatial Information Science, vol. 2010, no. 1, pp. 3-20, 2010.
3 The GIS spatial data model, 2015 [Online]. Available: https://courses.washington.edu/gis250/lessons/introduction_gis/spatial_data_model.html.
4 GIS digital vector maps, 2015 [Online]. Available: http://www.mapmart.com/Products/DigitalVectorMapping.aspx.
5 Vector data, 2015 [Online]. Available: https://docs.qgis.org/2.8/en/docs/gentle_gis_introduction/vector_data.html.
6 M. Voigt and C. Busch, "Feature-based watermarking of 2D vector data," in Proceedings of the SPIE 5020: Security and Watermarking of Multimedia Content. Bellingham, WA: International Society for Optics and Photonics, 2003, pp. 359-366.
7 E. Bertino and M. L. Damiani, "A controlled access to spatial data on web," in Proceedings of 7th AGILE Conference on Geographic Information Science, Crete, Greece, pp. 82-91, 2004.
8 S. C. Chen, X. Wang, N. Rishe, and M. A. Weiss, "A web-based spatial data access system using semantic Rtrees," Journal of Information Sciences, vol. 167, no. 1-4, pp. 41-61, 2004.   DOI
9 R. Ohbuchi, H. Ueda, and S. Endoh, "Robust watermarking of vector digital maps," in Proceedings of IEEE International Conference on Multimedia and Expo, Lausanne, Switzerland, 2002, pp. 577-580.
10 G. Schulz and M. Voigt, "A high capacity watermarking system for digital maps," in Proceedings of the 2004 Workshop on Multimedia and Security, Magdeburg, Germany, 2004, pp. 180-186.
11 C. Wang, Z. Peng, Y. Peng, L. Yu, J. Wang, and Q. Zhao, "Watermarking geographical data on spatial topological relations," Multimedia Tools and Applications, vol. 57, no. 1, pp. 67-89, 2012.   DOI
12 S. H. Lee and K. R. Kwon, "Vector watermarking scheme for GIS vector map management," Multimedia Tools and Applications, vol. 63, no. 3, pp. 757-790, 2013.   DOI
13 F. Wu, W. Cui, and H. Chen, "A compound chaos-based encryption algorithm for vector geographic data under network circumstance," in Proceedings of 1st International Congress on Image and Signal Processing, Sanya, China, 2008, pp. 254-258.
14 RSA Laboratories, PKCS #5: Password-Based Cryptography Standard (version 2.1) [Online]. Available: https://germany.emc.com/emc-plus/rsa-labs/standards-initiatives/pkcs-5-password-based-cryptography-standard.htm.
15 Advantage of vector map, 2015 [Online]. Available: https://maxdisruption.wordpress.com/2011/01/14/advantage-and-disadvantages-of-vectorraster-data/.
16 G. Li, "Research of key technologies on encrypting vector spatial data in oracle spatial," in Proceedings of 2nd International Conference on Information Engineering and Computer Science, Wuhan, China, 2010, pp. 1-4.
17 Y. Dakroury, I. A. El-ghafar, and A Tammam, "Protecting GIS data using cryptography and digital watermarking," International Journal of Computer Science and Network Security, vol. 10, no. 1, pp. 75-84, 2010.
18 B. J. Jang, S. H. Lee, and K. R. Kwon, "Perceptual encryption with compression for secure vector map data processing," Digital Signal Processing, vol. 25, pp. 224-243, 2014.   DOI
19 Y. Pomeau and P. Manneville, "Intermittent Transition to Turbulence in Dissipative Dynamical Systems," Communications in Mathematical Physics, vol. 74, no. 2, pp. 189-197, 1980.   DOI
20 P. N. Giao, S. H. Lee, and K. R. Kwon, "Selective encryption algorithm for GIS vector map using geometric objects," International Journal of Security and Its Applications, vol. 9, no. 2, pp. 61-72, 2015.   DOI
21 P. N. Giao, G. C. Kwon, S. H. Lee, and K. R. Kwon, "Selective encryption algorithm based on DCT for GIS vector map," Journal of Korea Multimedia Society, vol. 17, no. 7, pp. 769-777, 2014.   DOI
22 Wikipedia, Kerckhoffs's principle [Online]. Available: http://en.wikipedia.org/wiki/Kerckhoffs's_principle.