Browse > Article
http://dx.doi.org/10.9717/kmms.2016.19.8.1453

Encryption Algorithm using Polyline Simplification for GIS Vector Map  

Bang, N.V. (Dept. of IT Convergence and Applications Engineering, Pukyong National University)
Lee, Suk-Hwan (Dept. of Information Security, Tongmyong University)
Moon, Kwang-Seok (Dept. of Electronics Engineering, Pukyong National University)
Kwon, Ki-Ryong (Dept. of IT Convergence and Applications Engineering, Pukyong National University)
Publication Information
Abstract
Recently, vector map has developed, used in many domains, and in most cases vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the manufacturing process of a vector map is complex and the maintenance of a digital map requires substantial monetary and human resources. This paper presents the selective encryption scheme based on polyline simplification methods for GIS vector map data protection to store, transmit or distribute to authorized users. Main advantages of our algorithm are random vertices and transformation processes but it still meets requirements of security by random processes, and this algorithm can be implement to many types of vector map formats.
Keywords
GIS Vector Map; Selective Encryption; DWT; Randomization;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 M.F. Goodchild, "Twenty Years of Progress: GIS Science in 2010," Journal of Spatial Information Science, No. 1, pp. 3-20, 2010.
2 GIS Vector Map, http://www.mapmart.com/Products/DigitalVectorMapping.aspx, (accessed Mar. 2016).
3 R. Ohbuchi, H. Ueda, and S. Endoh, "Robust Watermarking of Vector Digital Maps," Proceeding of IEEE International Conference on Multimedia and Expo, Vol. 1, pp. 577-580, 2002.
4 C. Wang, Z. Peng, Y. Peng, L. Yu, J. Wang, and Q. Zhao, "Watermarking Geographical Data on Spatial Topological Relations," Proceeding of Multimedia Tools and Applications, Vol. 57, Issue 1, pp. 67-69, 2012.   DOI
5 F. Wu, W. Cui, and H. Chen, "A Compound Chaos-Based Encryption Algorithm for Vector Geographic Data under Network Circumstance," Proceeding of Cardholder Information Security Program, Vol. 1, pp. 254-258, 2008.
6 G. Li "Research of Key Technologies on Encrypting Vector Spatial Data in Oracle Spatial," Proceeding of International Conference on Industrial Electronics and Computer Science, pp.1-4, 2010.
7 Y. Dakroury, I.A. El-ghafar, and A. Tammam, "Protecting GIS Data Using Cryptography and Digital Watermarking," International Journal of Computer Science and Network Security, Vol. 10, No. 1, pp. 75-84, 2010.
8 B. Jang, S. Lee, and K. Kwon, "Perceptual Encryption with Compression for Secure Vector Map Data Processing," Journal Digital Signal Processing, Vol. 25, pp. 224-243, 2014.   DOI
9 RSA Laboratories, PKCS #5 v2.1: Password-Based Cryptography Standard, 2006.
10 G.P. Ngoc, G.C. Kwon, S.H. Lee, and K.R. Kwon, "Selective Encryption Algorithm Based on DCT for GIS Vector Map," Journal of Korea Multimedia Society, Vol. 17, No. 7, pp. 769-777, 2014.   DOI
11 N.V. Bang, K.S. Moon, S.H. Lee, and K.R. Kwon, "Selective Encryption Scheme Based on DFT, DWT Domain for GIS Vector Map Data," Proceeding of The 11th International Conference on Multimedia Information Technology and Applications, pp. 115-117, 2015.