Selective Encryption Algorithm Based on DCT for GIS Vector Map |
Giao, Pham Ngoc
(Dept. of IT Convergence and Applications Eng., Pukyong National University)
Kwon, Gi-Chang (Dept. of IT Cooperative System, Gyeongbuk Provincial College) Lee, Suk-Hwan (Dept. of Information Security, Tongmyong University) Kwon, Ki-Ryong (Dept. of IT Convergence and Applications Eng., Pukyong National University) |
1 | M.G Nazneen, S. Banu, Z. Tabassum, K. Fatima, and A. Shariff, "Selective Bitplane Encryption for Secure Transmission Of Image Data In Mobile Environment," International Journal of Scientific & Technology Research, Vol. 2, Issue 6, pp. 92-96, June 2013. |
2 | Mac Queen, Some Methods for Classification and Analysis of Multivariate Observations, University of California Press, Berkeley, Calif., Vol. 1, pp. 281-297, 1967. |
3 | G. Strang, "The Discrete Cosine Transform," Society for Industrial and Applied Mathematics, Vol. 41, No. 1, pp. 135-147, 1999. |
4 | K.E. Foote and M. Lynch, Geographic Information Systems as an Integrating Technology: Context, Concepts, and Definitions, June 2011. |
5 | M.F. Goodchild, "Twenty Years of Progress: GIS Science in 2010," Journal of Spatial Information Science, No. 1, pp. 3-20, July 2010. |
6 | Geographic Information System(2004), http://en.wikipedia.org/wiki/Geographic_information_ system. (accessed Nov. 2013) |
7 | GIS Vector Map(2006), http://en.wikipedia. org/wiki/Vector_map. (accessed Nov. 2013) |
8 | A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, and J.-J.Quisquater, "Overview on Selective Encryption of Image and Video: Challenges and Perspectives," Hindawi Publishing Corporation EURASIP J ournal on Information Security, Vol. 2008, No. 5, Article ID:179290, pp. 18, 2008. |
9 | M. Abomhara, Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard, University of Malaya, Kuala Lumpur, 2011. |
10 | M.Y. Hasan, F.A. Ahmed, and K. Abdelhamid, "Image Adaptive Selective Encryption of Vector Quantization Index Compression," Proceeding of IEEE International Conference on Image Processing, pp. 1277-1280, 2009. |
11 | W. Puech and J.M. Rodrigues, "Crypto- Compression of Medical Images By Selective Encryption of DCT," Proceeding of European Signal Processing Conference, Vol. 1, pp. 225-228, 2005. |
12 | S. Sharma and P. Pateriya, "A Study on Different Approaches of Selective Encryption Technique," International Journal of Computer Science & Communication Networks, Vol. 2, Issue 6, pp. 658-662, 2012. |
13 | B.J. Jang. K.S. Moon. S.H. Lee. and K.R. Kwon. "Effective Compression Technique for Secure Transmission and Storage of GIS Digital Map," Journal of Korea Multimedia Society Vol.14. No2. pp.210-218, Feb. 2011. 과학기술학회마을 DOI ScienceOn |