• Title/Summary/Keyword: Vector map storage

Search Result 14, Processing Time 0.029 seconds

Vector Map Simplification Using Poyline Curvature

  • Pham, Ngoc-Giao;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.249-254
    • /
    • 2017
  • Digital vector maps must be compressed effectively for transmission or storage in Web GIS (geographic information system) and mobile GIS applications. This paper presents a polyline compression method that consists of polyline feature-based hybrid simplification and second derivative-based data compression. Experimental results verify that our method has higher simplification and compression efficiency than conventional methods and produces good quality compressed maps.

Selective Encryption Algorithm for Vector Map using Geometric Objects in Frequency Domain

  • Pham, Ngoc-Giao;Kwon, Ki-Ryong;Lee, Suk-Hwan;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.8
    • /
    • pp.1312-1320
    • /
    • 2017
  • Recently, vector map data is developed and used in many domains widely. In the most cases, vector map data contains confidential information which must be kept away from unauthorized users. Moreover, the production process of vector maps is considerably complex and consumes a lot of money and human resources. Therefore, the secured storage and transmission are necessary to prevent the illegal copying and distribution from hacker. This paper presents a selective encryption algorithm using geometric objects in frequency domain for vector map data. In the proposed algorithm, polyline and polygon data in vector map is the target of the selective encryption process. Experimental results verified that proposed algorithm is effectively and adaptive the requirements of security.

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map

  • Van, Bang Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Nowadays, geographic information system (GIS) is developed and implemented in many areas. A huge volume of vector map data has been accessed unlawfully by hackers, pirates, or unauthorized users. For this reason, we need the methods that help to protect GIS data for storage, multimedia applications, and transmission. In our paper, a selective encryption method is presented based on vertex randomization and hybrid transform in the GIS vector map. In the proposed algorithm, polylines and polygons are focused as the targets for encryption. Objects are classified in each layer, and all coordinates of the significant objects are encrypted by the key sets generated by using chaotic map before changing them in DWT, DFT domain. Experimental results verify the high efficiency visualization by low complexity, high security performance by random processes.

Selective Encryption Algorithm Based on DCT for GIS Vector Map

  • Giao, Pham Ngoc;Kwon, Gi-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.769-777
    • /
    • 2014
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. At this point, GIS security techniques focusing on secure network and data encryption have been studied and developed to solve the copyright protection and illegal copy prevention for GIS digital map. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents a novel selective encryption scheme for GIS vector map data protection to store, transmit or distribute to authorized users using K-means algorithm. The proposed algorithm only encrypts a small part of data based on properties of polylines and polygons in GIS vector map but it can change whole data of GIS vector map. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

Selective Encryption Scheme for Vector Map Data using Chaotic Map

  • Bang, N.V.;Moon, Kwang-Seok;Lim, Sanghun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.818-826
    • /
    • 2015
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

Effective Compression Technique for Secure Transmission and Storage of GIS Digital Map (GIS 디지털 맵의 안전한 전송 및 저장을 위한 효율적인 압축 기법)

  • Jang, Bong-Joo;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.2
    • /
    • pp.210-218
    • /
    • 2011
  • Generally, GIS digital map has been represented and transmitted by ASCII and Binary data forms. Among these forms, Binary form has been widely used in many GIS application fields for the transmission of mass map data. In this paper, we present a hierarchical compression technique of polyline and polygon components for effective storage and transmission of vector map with various degree of decision. These components are core geometric components that represent main layers in vector map. The proposed technique performs firstly the energy compaction of all polyline and polygon components in spatial domain for the lossless compression of detailed vector map and compress independently integer parts and fraction parts of 64bit floating points. From experimental results, we confirmed that the proposed technique has superior compressive performance to the conventional data compression of 7z, zip, rar and gz.

Combining Empirical Feature Map and Conjugate Least Squares Support Vector Machine for Real Time Image Recognition : Research with Jade Solution Company

  • Kim, Byung Joo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.9-17
    • /
    • 2017
  • This paper describes a process of developing commercial real time image recognition system with company. In this paper we will make a system that is combining an empirical kernel map method and conjugate least squares support vector machine in order to represent images in a low-dimensional subspace for real time image recognition. In the traditional approach calculating these eigenspace models, known as traditional PCA method, model must capture all the images needed to build the internal representation. Updating of the existing eigenspace is only possible when all the images must be kept in order to update the eigenspace, requiring a lot of storage capability. Proposed method allows discarding the acquired images immediately after the update. By experimental results we can show that empirical kernel map has similar accuracy compare to traditional batch way eigenspace method and more efficient in memory requirement than traditional one. This experimental result shows that proposed model is suitable for commercial real time image recognition system.

A Design and Implementation of HTML5 Vector Map for Individual Purpose Service (개인화 지도 서비스를 위한 HTML5 벡터지도 설계 및 구현)

  • Kwon, Jin-Young;Choi, Se-Hyu
    • Spatial Information Research
    • /
    • v.23 no.4
    • /
    • pp.57-66
    • /
    • 2015
  • At these day, owing to functional limitations and cost issues, used image map in web service have a problem which can not make exactly meet the user needs. This study aims to create an individual map for user suitable purposes using HTML5 technology that implement the vector map creation and its functions with services. The results of this study, the invisible problems of the tilting and rotation functions in image-based map utilizing the existing web environment were solved in HTML5 vector map. And to access the map information, by implementing the function of expressing the background and name data to selectively derive, various results were expressed in the map. Also, as a result of a comparison of performance the time required was measured at 0.88sec which comes in the range of the first loading time between 0.78sec and 7.56sec in a commercial map service, which showed the possibility of its commercialization. compared to 180GB of image maps for the production of a national map index system, the volume to produce a vector map was 2.5GB, a decrease by over 90%, which solved the issue of costs for a storage space. As a result, this study of HTML5 vector map design and implementation presented a plan for providing information suitable for the requirements of the users who use spatial information through utilizing a variety of information and expanding functions.

GIS Application Model for Spatial Simulation of Surface Runoff from a Small Watershed( II) (소유역 지표유출의 공간적 해석을 위한 지리정보시스템의 응용모형(II) - 격자 물수지 모형을 위한 GIS응용 모형 개발 -)

  • 김대식;정하우;김성준;최진용
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.37 no.5
    • /
    • pp.35-42
    • /
    • 1995
  • his paper is to develop a GIS application model (GISCELWAB) for the spatial simulation of surface runoff from a small watershed. The model was constituted by three submodels : The input data extraction model (GISINDATA) which prepares cell-based input data automatically for a given watershed, the cell water balance model (CELWAB) which calculates the water balance for a cell and simulates surface runoff of watershed simultaneously by the interaction of cells, and the output data management model (GISOUTDISP) which visualize the results of temporal and spatial variation of surface runoff. The input data extraction model was developed to solve the time-consuming problems for the input-data preparation of distributed hydrologic model. The input data for CELWAB can be obtained by extracting ASCII data from a vector map. The output data management model was developed to convert the storage depth and discharge of cells into grid map. This model enables to visualize the spatial formulation process of watershed storage depth and surface runoff wholly with time increment.

  • PDF

Hybrid Color and Grayscale Images Encryption Scheme Based on Quaternion Hartley Transform and Logistic Map in Gyrator Domain

  • Li, Jianzhong
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.42-54
    • /
    • 2016
  • A hybrid color and grayscale images encryption scheme based on the quaternion Hartley transform (QHT), the two-dimensional (2D) logistic map, the double random phase encoding (DRPE) in gyrator transform (GT) domain and the three-step phase-shifting interferometry (PSI) is presented. First, we propose a new color image processing tool termed as the quaternion Hartley transform, and we develop an efficient method to calculate the QHT of a quaternion matrix. In the presented encryption scheme, the original color and grayscale images are represented by quaternion algebra and processed holistically in a vector manner using QHT. To enhance the security level, a 2D logistic map-based scrambling technique is designed to permute the complex amplitude, which is formed by the components of the QHT-transformed original images. Subsequently, the scrambled data is encoded by the GT-based DRPE system. For the convenience of storage and transmission, the resulting encrypted signal is recorded as the real-valued interferograms using three-step PSI. The parameters of the scrambling method, the GT orders and the two random phase masks form the keys for decryption of the secret images. Simulation results demonstrate that the proposed scheme has high security level and certain robustness against data loss, noise disturbance and some attacks such as chosen plaintext attack.