Share this post on:

Jtu.edu.cn (X.W.); [email protected] (Q.Z.) National Regional Joint Engineering Investigation Center of Technologies and Application for National Geographic State Monitoring, Lanzhou 730070, China Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, China College of Geography and Ocean Science, Nanjing University, Nanjing 210008, China; [email protected] Correspondence: [email protected]; Tel.: +86-1363-932-Citation: Li, Y.; Zhang, L.; Wang, X.; Zhang, X.; Zhang, Q. A Novel Invariant Primarily based Commutative Encryption and Watermarking Algorithm for Vector Maps. ISPRS Int. J. Geo-Inf. 2021, ten, 718. https:// doi.org/10.3390/ijgi10110718 Academic Editors: Giedre Beconyte and Wolfgang Kainz Received: 24 August 2021 Accepted: 22 October 2021 Published: 25 OctoberAbstract: Commutative encryption and watermarking (CEW) is an emerging system that combines encryption technologies with digital watermarking technology. It has the dual capability of safe 4-Hydroxytamoxifen custom synthesis transmission and copyright protection. Having said that, the current CEW techniques for vector maps have superior robustness in resisting geometric attacks but poor resistance to vertex attacks (e.g., addition, deletion, and so on.). To solve this problem, right here we propose a novel invariant-based CEW algorithm for vector maps, which consists of permutation-based encryption scheme and coordinates-based watermarking scheme. In the encryption scheme, the encryption key is generated by means of the Gaussian distribution method combined using the SHA-512 hash process; then, the double random position permutation tactic is applied for the vector map encryption. In watermarking embedding scheme, the original RWJ-67657 Purity & Documentation watermark image is scrambled through logistic chaotic encryption prior to embedding, as well as the coordinates of each of the vertices are normalized. Then, the scrambled watermark image is embedded into the normalized coordinates. Final results show that: proposed technique is far more robust to conventional attacks (e.g., vertex addition and deletion, reordering and data format conversion) and geometric attacks (e.g., scaling and translation). In addition, compared together with the current CEW techniques for vector maps, the proposed method has greater security and stronger robustness against vertex attacks. Keywords and phrases: commutative encryption and watermarking; vector map; safe transmission; copyright protection1. Introduction Vector maps are one of several most significant geospatial data [1,2], which play a vital function in financial improvement and national security [3,4]. At the moment, vector maps happen to be extensively utilized in navigation, cadastral management, urban preparing and quite a few other fields [5]. Having said that, the improvement of information-sharing technology makes it simpler to be leaked and illegally copied in the process of storage, transmission and application. To address the increasing urgent issues of information security, a series of laws, guidelines and regulations have been issued [6]. For instance, the “Surveying and Mapping Law from the People’s Republic of China” was revised in 2017 to strengthen the protection of geospatial data (e.g., vector maps) [7]. Correspondingly, the safety protection algorithm for vector maps needs to be created. Several technologies happen to be developed to make sure the secure transmission and copyright security of vector maps (e.g., encryption technology and digital watermarking technologies). Encryption is an efficient method to defend data from getting illegal intercepted and tampered with, and it might offer safe p.

Share this post on:

Author: HMTase- hmtase