CN103067159A - Geographic information system (GIS) vector data reversible decryption method - Google Patents

Geographic information system (GIS) vector data reversible decryption method Download PDF

Info

Publication number
CN103067159A
CN103067159A CN2012105862833A CN201210586283A CN103067159A CN 103067159 A CN103067159 A CN 103067159A CN 2012105862833 A CN2012105862833 A CN 2012105862833A CN 201210586283 A CN201210586283 A CN 201210586283A CN 103067159 A CN103067159 A CN 103067159A
Authority
CN
China
Prior art keywords
control point
formula
mid
prime
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105862833A
Other languages
Chinese (zh)
Other versions
CN103067159B (en
Inventor
周卫
闫娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201210586283.3A priority Critical patent/CN103067159B/en
Publication of CN103067159A publication Critical patent/CN103067159A/en
Application granted granted Critical
Publication of CN103067159B publication Critical patent/CN103067159B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a geographic information system (GIS) vector data reversible decryption method, and belongs to the field of geographic information safety. The method includes a secret key generating process, a decryption process and a recovering process, wherein the secret key generating process includes that a data range is confirmed, data conversion quantity is confirmed, mean square errors caused by linear conversion quantity are calculated, parameters are confirmed, mean square errors caused by non-linear conversion quantity are calculated, parameters are confirmed, and the secret key is encrypted through an asymmetric cryptographic algorithm RSA and is stored in a secret key file. The decryption process includes that the secret key file is read, deciphering is conducted and the secret key is extracted, original vector data are opened, an element point coordinate set is obtained, coordinates are normalized, and circulation process is conducted. The GIS vector data reversible decryption method has the advantages of randomness, gradual change, reversibility and the like, improves reliability of GIS vector data decryption, perfects the geographic information safety protection theory and method system, and can be used for public announcement of the GIS vector data and other aspect.

Description

The reversible DecryptDecryption method of a kind of GIS vector data
Technical field
The invention belongs to the geography information security fields, be specifically related to a kind of reversible DecryptDecryption method for the GIS vector data.
Background technology
The mapping geography information is concerning expanding development space, concerning national security.Especially under the main trend of global IT application, geography information safeguard protection problem is more and more outstanding.Vector data has the characteristics such as precision height, output quality is good, data volume is little, uses very extensively, and its safeguard protection research is very important.
According to national relevant laws and regulations, vector data openly uses to be needed to process through DecryptDecryption, and DecryptDecryption comprises spatial accuracy DecryptDecryption and two aspects of attribute DecryptDecryption.The spatial accuracy DecryptDecryption uses professional DecryptDecryption technology to carry out the displacement of key element, reduces its precision, and the data behind the DecryptDecryption are not having to be difficult for recovery in the situation of key.Spatial accuracy DecryptDecryption method commonly used comprises projection transformation approach, spatial alternation method, random error interference method etc. at present.The projection transformation approach is reversible; The data space converter technique comprises similarity transformation, affine transformation and projective transformation etc., and these several transform methods are linear transformations, is easy to recover the poor reliability that DecryptDecryption is processed; There are the shortcomings such as the topological relation that can not guarantee key element or algorithm be irreversible in meeting that the random error interference method has.
Summary of the invention
The present invention is directed to the defective that existing DecryptDecryption method exists, provide a kind of non-linear mixed model that vector data is carried out the method that DecryptDecryption is processed, have randomness, the element relationship of error Topological, algorithm invertibity and the characteristics such as be difficult to crack.
The reversible DecryptDecryption method of a kind of GIS vector data take the line chart layer as example, comprises following process:
(1) key generative process
Step 11, the specified data scope: obtain the minimum boundary rectangle R of original vector data V, R lower left corner coordinate is (x Min, y Min), upper right corner coordinate is (x Max, y Max), get data center point coordinate (x according to formula (1) Mid, y Mid), data length XL and data width YL;
x mid = ( x min + x max ) / 2 y mid = ( y min + y max ) / 2 XL = x max - x min YL = y max - y min - - - ( 1 )
Step 12, the specified data converted quantity: concrete steps are as follows: input data global transformation amount offset, offset>0, nonlinear transformation amount nonlinear, 0<nonlinear<=offset obtains linear transformation amount linear according to formula (2);
linear = offset 2 - nonlinear 2 - - - ( 2 )
Step 13 is calculated the middle error that linear transformation amount linear causes, determines to affect the parameter of transform effect: focal distance f, flying height H, drift angle
Figure BDA00002673299300013
Inclination angle ω, swing angle κ, concrete steps are as follows:
C) focal distance f ∈ (0,1),
D) calculate flying height H according to formula (3),
H = XL * YL / f - - - ( 3 )
C) calculate the range of disturbance linearExtent of linear change amount linear according to formula (4),
linearExtent = linear - - - ( 4 )
D) generate the control point set, concrete steps are as follows: generate the individual even control point of m*n (m*n>=6) and form control point, source set FromPoints={ (Fx in minimum boundary rectangle R scope i, Fy i) | i=1,2 ... m*n}; Calculate each target control point coordinates (Tx according to formula (5) i, Ty i) composition target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
Tx i = Fx i + dir 1 × linear + random 1 × linearExtent Ty i = Fy i + dir 2 × linear + random 2 × linearExtent - - - ( 5 )
Wherein: directioin parameter dir 1In [0.0,1.0] scope, directioin parameter
Figure BDA00002673299300024
Perturbation of control points parameter random 1And random 2In [1.0,1.0] scope, choose at random,
E) Unitary coordinate is gathered ToPoints according to formula (6) to control point, source set FromPoints and target control point and is carried out normalized and obtain new coordinate set FromPoints '={ (Fx i', Fy i') | i=1,2 ... m*n}, ToPoints '={ (Tx i', Ty i') | i=1,2 ... m*n},
Fx i ′ = ( Fx i - x mid ) * f / H Fy i ′ = ( Fy i - y mid ) * f / H Tx i ′ = ( Tx i - x mid ) * f / H Ty i ′ = ( Ty i - y mid ) * f / H - - - ( 6 )
F) calculate the drift angle
Figure BDA00002673299300026
Inclination angle ω, swing angle κ utilize least square method that target control point among FromPoints ' Zhong Yuan control point and the ToPoints ' is carried out match according to formula (7) and resolve and obtain the drift angle
Figure BDA00002673299300027
Inclination angle ω, swing angle κ,
Figure BDA00002673299300028
G) calculate error accuracy in the linear transformation 1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate "={ (Tx i", Ty i") | i=1,2 ... m*n},
Figure BDA00002673299300029
According to error accuracy1 in formula (9) calculating,
accuracy 1 = Σ ( ( Tx i ′ ′ - Fx i ) 2 + ( Ty i ′ ′ - Fy i ) 2 ) / ( m * n ) - - - ( 9 )
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy 1Each former target control point coordinates (Tx is then regulated according to formula (10) in-1|>0.01 i, Ty i), obtain new target control point coordinates (NTx i, NTy i), substituting former target control point with new target control point is Tx i=NTx i, Ty i=NTy i, obtain target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
NTx i = Fx i + ( linear / accuracy ) ( Tx i - Fx i ) NTy i = Fy i + ( linear / accuracy ) ( Ty i - Fy i ) - - - ( 10 )
I) circulation step e)-h) until | linear/accuracy 1-1|<=0.01 obtains final drift angle Inclination angle ω, swing angle κ;
Step 14 is calculated the middle error that nonlinear transformation amount nonlinear causes, determines parameter j 0-j 5, concrete steps are as follows:
B) generate the control point elevation, utilize formula (11) to calculate the required elevation Fz of each some displacement nonlinear of control point, source set FromPoints i, control point, generating three-dimensional source set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... m*n},
Fz i = H * nonlinear / ( x mid - Fx i ) 2 + ( y mid - Fy i ) 2 - - - ( 11 )
B) according to formula (12) the three-dimensional source control point set FromPoints that generates is carried out least square and resolve, obtain parameter j 0-j 5,
Fz i=j 0+j 1Fx i+j 2Fy i+j 3Fx i 2+j 4Fy i 2+j 5Fx iFy i (12)
C) calculate error accuracy in the nonlinear transformation 2, concrete steps are as follows: according to formula (12) and parameter j 0-j 5Resolve the Fz at each control point, source iValue is saved among the three-dimensional source control point set FromPoints, according to formula (13) three-dimensional source control point set FromPoints is calculated target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
Tx i = ( - f ( Fx i - x mid ) / ( Fz i - H ) ) * H / f + x mid Ty i = ( - f ( Fy i - y mid ) / ( Fz i - H ) ) * H / f + y mid - - - ( 13 )
According to error accuracy in formula (14) calculating 2,
accuracy 2 = Σ ( ( Tx i - Fx i ) 2 + ( Ty i - Fy i ) 2 ) / ( m * n ) - - - ( 14 )
D) regulate control point, source height value, if | nonlinear/accuracy 2Each control point, source coordinate height value is then regulated according to formula (15) in-1|>0.01, obtains new height value NFzi, and substituting former height value with new height value is Fzi=NFzi, obtains three-dimensional source control point set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... m*n},
NFz i &Element; ( Fz i / 2 , ( nonlinear / accuracy 2 ) * Fz i ) if ( nonlinear / accuracy 2 > 1 ) NFz i &Element; ( ( nonlinear / accuracy 2 ) * Fz i / 2 , Fz i ) if ( nonlinear / accuracy 2 < 1 ) - - - ( 15 )
E) circulation step b)-d), until | nonlinear/accuracy 2-1|<=0.01 obtains final argument j 0-j 5
Step 15, focal distance f, flying height H, drift angle
Figure BDA00002673299300041
Inclination angle ω, swing angle κ, the point coordinates (x of data center Mid, y Mid), parameter j 0-j 5Form key K ey, with rivest, shamir, adelman RSA key K ey is encrypted and deposits in key file Key.txt;
(2) DecryptDecryption process
Step 21 reads key file Key.txt, extracts key K ey after the deciphering, opens original vector data V;
Step 22 generates each point height value z j, converted coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data V obtains key element point coordinates set P={ (x j, y j, z j) | j=1,2 ..., k}, wherein k is the some number that key element comprises,
B) according to each point coordinates p among key K ey and formula (16) the cycle calculations set P j(x j, y j, z j) height value z jAnd be saved among the set P,
z j=j 0+j 1x j+j 2y j+j 3x j 2+j 4y j 2+j 5x jy j (16)
C) according to formula (17) and key K ey, to each point coordinates p j(x j, y j, z j) calculate, obtain point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k};
Figure BDA00002673299300042
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p j' (x j', y j', z j) carry out normalized and obtain point coordinates set P behind the DecryptDecryption "={ (x j", y j", z j) | j=1,2 ..., k};
x j &prime; &prime; = x mid + x j &prime; * H / f y j &prime; &prime; = y mid + y j &prime; * H / f - - - ( 18 )
Step 24, circulation step 22 to 23 is until each key element is disposed the data file W behind the preservation DecryptDecryption;
(3) recovery process
Step 31 reads key file Key.txt, extracts key K ey after the deciphering, opens the vector data W behind the DecryptDecryption;
Step 32, Unitary coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data W obtains coordinate set P "={ (x j", y j", z j) | j=1,2 ..., k},
B) according to key K ey and formula (19), pair set P " set in each point coordinates p j" (x j", y j", z j) carry out normalized and generate point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k;
x j &prime; = ( x j &prime; &prime; - x mid ) * f / H y j &prime; = ( y j &prime; &prime; - y mid ) * f / H - - - ( 19 )
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p j' (x j', y j', z j) calculate, then with height value z jZero setting, the point coordinates p after being restored j(x j, y j, 0), generate coordinate set P={ (x j, y j, 0) | j=1,2 ..., k};
Figure BDA00002673299300051
Step 34, circulation step 32 to 33 is until each key element is disposed the data file Q behind the saving/restoring.
The present invention proposes a kind of non-linear mixed model the GIS vector data is carried out DecryptDecryption and Recovery processing.This method is guaranteeing can to carry out DecryptDecryption to data according to key under the prerequisite that the vector data topological relation does not change for the safeguard protection problem of GIS vector data, and the data behind the DecryptDecryption can be carried out Distortionless according to key.This method has the characteristics such as randomness, gradually changeable, invertibity, has improved the reliability of GIS vector data DecryptDecryption, and perfect theory and the method system of geography information safeguard protection can be used for the aspects such as publishing of GIS vector data.
Description of drawings
Fig. 1 is the inventive method DecryptDecryption process flow diagram.
Fig. 2 is the inventive method recovery process flow chart.
Fig. 3 is the original vector data that the embodiment of the invention is selected.
Fig. 4 is the design sketch of vector data stack behind initial data of the present invention and the DecryptDecryption.
Embodiment
Below in conjunction with accompanying drawing embodiments of the invention are elaborated.
Present embodiment is selected shp form vector data, to data read, DecryptDecryption and recovery operation, further describe the present invention.Present embodiment selects the shp line chart layer data (such as Fig. 3) of a certain building as original vector data, may further comprise the steps:
(1) key generative process
Step 11, specified data scope: the minimum boundary rectangle R that obtains original vector data V, R lower left corner coordinate is (123451.63676768,142705.11870332), upper right corner coordinate is (123726.302067681,142994.494303319), get data center point coordinate (123588.969417681,142849.80650332), data length XL=274.665300000459 and data width YL=289.375599998981 according to formula (1);
Step 12, the specified data converted quantity: concrete steps are as follows: input data global transformation amount offset=50, nonlinear transformation amount nonlinear=7 obtains linear transformation amount linear=49.5075751779463 according to formula (2);
Step 13 is calculated the middle error that linear transformation amount linear causes, determines to affect the parameter of transform effect: focal distance f, flying height H, drift angle
Figure BDA00002673299300052
Inclination angle ω, swing angle κ, concrete steps are as follows:
E) focal distance f=0.15,
F) calculate flying height H=1879.49681193348 according to formula (3),
C) calculate the range of disturbance linearExtent=7.03616196359537 of linear change amount linear according to formula (4),
D) generate the control point set, concrete steps are as follows: generate 4*4 even control point and form control point, source set FromPoints={ (Fx in minimum boundary rectangle R scope i, Fy i) | i=1,2 ... 4*4}; Calculate each target control point coordinates (Tx according to formula (5) i, Ty i) composition target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... 4*4},
E) Unitary coordinate is gathered ToPoints according to formula (6) to control point, source set FromPoints and target control point and is carried out normalized and obtain new coordinate set FromPoints '={ (Fx i', Fy i') | i=1,2 ... 4*4}, ToPoints '={ (Tx i', Ty i') | i=1,2 ... 4*4},
F) calculate the drift angle
Figure BDA00002673299300061
Inclination angle ω, swing angle κ utilize least square method that target control point among FromPoints ' Zhong Yuan control point and the ToPoints ' is carried out match according to formula (7) and resolve and obtain the drift angle
Figure BDA00002673299300062
Inclination angle ω=0.00921638185358357, swing angle κ=0.0206308078601073,
G) calculate error accuracy in the linear transformation 1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate "={ (Tx i", Ty i") | i=1,2 ... 4*4}, according to error accuracy in formula (9) calculating 1=50.6202842886151,
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy 1Each former target control point coordinates (Tx is then regulated according to formula (10) in-1|>0.01 i, Ty i), obtain new target control point coordinates (NTx i, NTy i), substituting former target control point with new target control point is Tx i=NTx i, Ty i=NTy i, obtain target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... 4*4},
I) circulation step e)-h), work as accuracy 1=49.5075776592392 o'clock | linear/accuracy 1-1|<=0.01 obtains final drift angle
Figure BDA00002673299300063
Inclination angle ω=0.00901382354283439, swing angle κ=0.0201770830635741;
Step 14 is calculated the middle error that nonlinear transformation amount nonlinear causes, determines parameter j 0-j 5, concrete steps are as follows:
A) generate the control point elevation, utilize formula (11) to calculate the required elevation Fz of each some displacement nonlinear of control point, source set FromPoints i, control point, generating three-dimensional source set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... 4*4},
B) according to formula (12) the three-dimensional source control point set FromPoints that generates is carried out least square and resolve, obtain parameter j 0=-134576645.0625, j 1=957.075539588928, j 2=1056.14212036133, j 3=-0.00386110281764473, j 4=-0.00368852281107479, j 5=-1.88736757991137E-05,
C) calculate error accuracy in the nonlinear transformation 2, concrete steps are as follows: according to formula (12) and parameter j 0-j 5Resolve the Fz at each control point, source iValue is saved among the three-dimensional source control point set FromPoints, according to formula (13) three-dimensional source control point set FromPoints is calculated target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... 4*4}, according to error accuracy in formula (14) calculating 2=8.33449148774509,
D) regulate control point, source height value, if | nonlinear/accuracy 2Each control point, source coordinate height value is then regulated according to formula (15) in-1|>0.01, obtains new height value NFzi, and substituting former height value with new height value is Fzi=NFzi, obtains three-dimensional source control point set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... 4*4},
E) circulation step b)-d), work as accuracy 2=6.9961779687363 o'clock | nonlinear/accuracy 2-1|<=0.01 obtains final argument j 0=-92384371.34375, j 1=544.834728956223, j 2=822.104847669601, j 3=-0.00253963583136851, j 4=-0.00312865154306508, j 5=0.000580351679673186;
Step 15, focal distance f, flying height H, drift angle Inclination angle ω, swing angle κ, the point coordinates (x of data center Mid, y Mid), parameter j 0-j 5Form key K ey, with rivest, shamir, adelman RSA key K ey is encrypted and deposits in key file Key.txt;
(2) DecryptDecryption process
Step 21 reads key file Key.txt, extracts key K ey after the deciphering, opens original vector data V;
Step 22 generates each point height value z j, converted coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data V obtains key element point coordinates set P={ (x j, y j, z j) | j=1,2 ..., k}, wherein k is the some number that key element comprises, the below with 1 p (123677.937667681,142928.252103319,0) among the P for example describes,
B) according to each point coordinates p among key K ey and formula (16) the cycle calculations set P j(x j, y j, z j) height value z jAnd be saved among the set P, the height value z=119.892017556354 of example points p,
C) according to formula (17) and key K ey, to each point coordinates p j(x j, y j, z j) calculate, obtain point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k}, example points p (123677.937667681,142928.252103319,119.892017556354) conversion after point coordinates be p ' (0.00402027927973795,0.00517358718854751,119.892017556354);
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p j' (x j', y j', z j) carry out normalized and obtain point coordinates set P behind the DecryptDecryption "={ (x j", y j", z j) | j=1,2 ..., k}, point coordinates is p after the some p ' normalization " (123639.34343161,142914.631440834,119.892017556354);
Step 24, circulation step 22 to 23 is until each key element is disposed the data file W behind the preservation DecryptDecryption;
(3) recovery process
Step 31 reads key file Key.txt, extracts key K ey after the deciphering, opens the vector data W behind the DecryptDecryption;
Step 32, Unitary coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data W obtains coordinate set P "={ (x j", y j", z j) | j=1,2 ..., k}, the below is with a P " in 1 p " (123639.34343161,142914.631440834,119.892017556354) for example describes,
B) according to key K ey and formula (19), pair set P " set in each point coordinates p j" (x j", y j", z j) carry out normalized and generate point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k} is to example points p " carry out normalized and obtain a p ' (0.00402027927973827,0.00517358718854753,119.892017556354);
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p j' (x j', y j', z j) calculate, then with height value z jZero setting, the point coordinates p after being restored j(x j, y j, 0), generate coordinate set P={ (x j, y j, 0) | j=1,2 ..., k}, the point coordinates after conversion p ' coordinate is restored is p (123677.937667681,142928.252103319,0);
Step 34, circulation step 32 to 33 is until each key element is disposed the data file Q behind the saving/restoring.
Only carry out DecryptDecryption and the recovery of vector data in the embodiment of the invention as an example of the line chart layer example, the method also can be used for DecryptDecryption and the recovery of point diagram layer and face figure layer.
The present invention is guaranteeing under the prerequisite that the vector data topological relation does not change vector data to be carried out DecryptDecryption and recovery, and setup parameter is to reach required DecryptDecryption effect according to demand, and the data based key behind the DecryptDecryption can carry out Distortionless.

Claims (1)

1. the reversible DecryptDecryption method of GIS vector data is characterized in that, comprises following process:
(1) key generative process
Step 11, the specified data scope: obtain the minimum boundary rectangle R of original vector data V, R lower left corner coordinate is (x Min, y Min), upper right corner coordinate is (x Max, y Max), get data center point coordinate (x according to formula (1) Mid, y Mid), data length XL and data width YL;
x mid = ( x min + x max ) / 2 y mid = ( y min + y max ) / 2 XL = x max - x min YL = y max - y min - - - ( 1 )
Step 12, the specified data converted quantity: concrete steps are as follows: input data global transformation amount offset, offset>0, nonlinear transformation amount nonlinear, 0<nonlinear<=offset obtains linear transformation amount linear according to formula (2);
linear = offset 2 - nonlinear 2 - - - ( 2 )
Step 13 is calculated the middle error that linear transformation amount linear causes, determines to affect the parameter of transform effect: focal distance f, flying height H, drift angle
Figure FDA00002673299200013
Inclination angle ω, swing angle κ, concrete steps are as follows:
A) focal distance f ∈ (0,1),
B) calculate flying height H according to formula (3),
H = XL * YL / f - - - ( 3 )
C) calculate the range of disturbance linearExtent of linear change amount linear according to formula (4),
linearExtent = linear - - - ( 4 )
D) generate the control point set, concrete steps are as follows: generate m*n even control point and form control point, source set FromPoints={ (Fx in minimum boundary rectangle R scope i, Fy i) | i=1,2 ... m*n}, m*n>=6; Calculate each target control point coordinates (Tx according to formula (5) i, Ty i) composition target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
Tx i = Fx i + dir 1 &times; linear + random 1 &times; linearExtent Ty i = Fy i + dir 2 &times; linear + random 2 &times; linearExtent - - - ( 5 )
Wherein: directioin parameter dir 1In [0.0,1.0] scope, directioin parameter Perturbation of control points parameter random 1And random 2In [1.0,1.0] scope, choose at random,
E) Unitary coordinate is gathered ToPoints according to formula (6) to control point, source set FromPoints and target control point and is carried out normalized and obtain new coordinate set FromPoints '={ (Fx i', Fy i') | i=1,2 ... m*n}, ToPoints '={ (Tx i', Ty i') | i=1,2 ... m*n},
Fx i &prime; = ( Fx i - x mid ) * f / H Fy i &prime; = ( Fy i - y mid ) * f / H Tx i &prime; = ( Tx i - x mid ) * f / H Ty i &prime; = ( Ty i - y mid ) * f / H - - - ( 6 )
F) calculate the drift angle
Figure FDA00002673299200022
Inclination angle ω, swing angle κ utilize least square method that target control point among FromPoints ' Zhong Yuan control point and the ToPoints ' is carried out match according to formula (7) and resolve and obtain the drift angle
Figure FDA00002673299200023
Inclination angle ω, swing angle κ,
G) calculate error accuracy in the linear transformation 1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate "={ (Tx i", Ty i") | i=1,2 ... m*n},
Figure FDA00002673299200025
According to error accuracy in formula (9) calculating 1,
accuracy 1 = &Sigma; ( ( Tx i &prime; &prime; - Fx i ) 2 + ( Ty i &prime; &prime; - Fy i ) 2 ) / ( m * n ) - - - ( 9 )
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy 1Each former target control point coordinates (Tx is then regulated according to formula (10) in-1|>0.01 i, Ty i), obtain new target control point coordinates (NTx i, NTy i), substituting former target control point with new target control point is Tx i=NTx i, Ty i=NTy i, obtain target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
NTx i = Fx i + ( linear / accuracy 1 ) ( Tx i - Fx i ) NTy i = Fy i + ( linear / accuracy 1 ) ( Ty i - Fy i ) - - - ( 10 )
I) circulation step e)-h) until | linear/accuracy 1-1|<=0.01 obtains final drift angle
Figure FDA00002673299200028
Inclination angle ω, swing angle κ;
Step 14 is calculated the middle error that nonlinear transformation amount nonlinear causes, determines parameter j 0-j 5, concrete steps are as follows:
A) generate the control point elevation, utilize formula (11) to calculate the required elevation Fz of each some displacement nonlinear of control point, source set FromPoints i, control point, generating three-dimensional source set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... m*n},
Fz i = H * nonlinear / ( x mid - Fx i ) 2 + ( y mid - Fy i ) 2 - - - ( 11 )
B) according to formula (12) the three-dimensional source control point set FromPoints that generates is carried out least square and resolve, obtain parameter j 0-j 5,
Fz i=j 0+j 1Fx i+j 2Fy i+j 3Fx i 2+j 4Fy i 2+j 5Fx iFy i (12)
C) calculate error accuracy in the nonlinear transformation 2, concrete steps are as follows: according to formula (12) and parameter j 0-j 5Resolve the Fz at each control point, source iValue is saved among the three-dimensional source control point set FromPoints, according to formula (13) three-dimensional source control point set FromPoints is calculated target control point set ToPoints={ (Tx i, Ty i) | i=1,2 ... m*n},
Tx i = ( - f ( Fx i - x mid ) / ( Fz i - H ) ) * H / f + x mid Ty i = ( - f ( Fy i - y mid ) / ( Fz i - H ) ) * H / f + y mid - - - ( 13 )
According to error accuracy in formula (14) calculating 2,
accuracy 2 = &Sigma; ( ( Tx i - Fx i ) 2 + ( Ty i - Fy i ) 2 ) / ( m * n ) - - - ( 14 )
D) regulate control point, source height value, if | nonlinear/accuracy 2Each control point, source coordinate height value is then regulated according to formula (15) in-1|>0.01, obtains new height value NFz i, substituting former height value with new height value is Fz i=NFz i, obtain three-dimensional source control point set FromPoints={ (Fx i, Fy i, Fz i) | i=1,2 ... m*n},
NFz i &Element; ( Fz i / 2 , ( nonlinear / accuracy 2 ) * Fz i ) if ( nonlinear / accuracy 2 > 1 ) NFz i &Element; ( ( nonlinear / accuracy 2 ) * Fz i / 2 , Fz i ) if ( nonlinear / accuracy 2 < 1 ) - - - ( 15 )
E) circulation step b)-d), until | nonlinear/accuracy 2-1|<=0.01 obtains final argument j 0-j 5
Step 15, focal distance f, flying height H, drift angle
Figure FDA00002673299200034
Inclination angle ω, swing angle κ, the point coordinates (x of data center Mid, y Mid), parameter j 0-j 5Form key K ey, with rivest, shamir, adelman RSA key K ey is encrypted and deposits in key file Key.txt;
(2) DecryptDecryption process
Step 21 reads key file Key.txt, extracts key K ey after the deciphering, opens original vector data V;
Step 22 generates each point height value z j, converted coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data V obtains key element point coordinates set P={ (x j, y j, z j) | j=1,2 ..., k}, wherein k is the some number that key element comprises,
B) according to each point coordinates p among key K ey and formula (16) the cycle calculations set P j(x j, y j, z j) height value z jAnd be saved among the set P,
z j=j 0+j 1x j+j 2y j+j 3x j 2+j 4y j 2+j 5x jy j (16)
C) according to formula (17) and key K ey, to each point coordinates p j(x j, y j, z j) calculate, obtain point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k};
Figure FDA00002673299200041
Step 23, Unitary coordinate, according to+key K ey and formula (18) to each point coordinates p j' (x j', y j', z j) carry out normalized and obtain point coordinates set P behind the DecryptDecryption "={ (x j", y j", z j) | j=1,2 ..., k};
x j &prime; &prime; = x mid + x j &prime; * H / f y j &prime; &prime; = y mid + y j &prime; * H / f - - - ( 18 )
Step 24, circulation step 22 to 23 is until each key element is disposed the data file W behind the preservation DecryptDecryption;
(3) recovery process
Step 31 reads key file Key.txt, extracts key K ey after the deciphering, opens the vector data W behind the DecryptDecryption;
Step 32, Unitary coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data W obtains coordinate set P "={ (x j", y j", z j) | j=1,2 ..., k},
B) according to key K ey and formula (19), pair set P " set in each point coordinates p j" (x j", y j", z j) carry out normalized and generate point coordinates set P '={ (x j', y j', z j) | j=1,2 ..., k;
x j &prime; = ( x j &prime; &prime; - x mid ) * f / H y j &prime; = ( y j &prime; &prime; - y mid ) * f / H - - - ( 19 )
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p j' (x j', y j', z j) calculate, then with height value z jZero setting, the point coordinates p after being restored j(x j, y j, 0), generate coordinate set P={ (x j, y j, 0) | j=1,2 ..., k};
Figure FDA00002673299200044
Step 34, circulation step 32 to 33 is until each key element is disposed the data file Q behind the saving/restoring.
CN201210586283.3A 2012-12-28 2012-12-28 A kind of reversible DecryptDecryption method of GIS vector data Expired - Fee Related CN103067159B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210586283.3A CN103067159B (en) 2012-12-28 2012-12-28 A kind of reversible DecryptDecryption method of GIS vector data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210586283.3A CN103067159B (en) 2012-12-28 2012-12-28 A kind of reversible DecryptDecryption method of GIS vector data

Publications (2)

Publication Number Publication Date
CN103067159A true CN103067159A (en) 2013-04-24
CN103067159B CN103067159B (en) 2016-03-02

Family

ID=48109630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210586283.3A Expired - Fee Related CN103067159B (en) 2012-12-28 2012-12-28 A kind of reversible DecryptDecryption method of GIS vector data

Country Status (1)

Country Link
CN (1) CN103067159B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559452A (en) * 2013-10-30 2014-02-05 南京师范大学 Altitude data decryption and recovery method
CN104077535A (en) * 2014-06-19 2014-10-01 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN104103031A (en) * 2014-08-03 2014-10-15 兰州交通大学 Normalization-based vector spatial data blind watermark method
CN106778347A (en) * 2016-12-22 2017-05-31 南京师范大学 A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function
CN108090369A (en) * 2017-12-29 2018-05-29 南京师范大学 One kind is based on the polynomial GIS vector data DecryptDecryptions of Chebyshev and restoration methods
CN108629190A (en) * 2018-03-23 2018-10-09 国网陕西省电力公司电力科学研究院 Geographic information data DecryptDecryption method
CN109002724A (en) * 2018-06-07 2018-12-14 南京师范大学 A kind of part DEM DecryptDecryption and restoration methods based on Compactly supported radial basis function

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574561B2 (en) * 2001-03-30 2003-06-03 The University Of North Florida Emergency management system
CN101968841A (en) * 2010-11-09 2011-02-09 北京安天电子设备有限公司 Anti-virus and decryption method and device for USB mobile storage apparatus
CN102332079A (en) * 2011-09-16 2012-01-25 南京师范大学 GIS (geographic information system) vector data disguising and restoring method based on error random interference

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574561B2 (en) * 2001-03-30 2003-06-03 The University Of North Florida Emergency management system
CN101968841A (en) * 2010-11-09 2011-02-09 北京安天电子设备有限公司 Anti-virus and decryption method and device for USB mobile storage apparatus
CN102332079A (en) * 2011-09-16 2012-01-25 南京师范大学 GIS (geographic information system) vector data disguising and restoring method based on error random interference

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
傅宏: "公众版地图地理要素脱密处理方法", 《地理空间信息》, vol. 8, no. 4, 31 August 2010 (2010-08-31), pages 133 - 134 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559452A (en) * 2013-10-30 2014-02-05 南京师范大学 Altitude data decryption and recovery method
CN103559452B (en) * 2013-10-30 2016-03-30 南京师范大学 A kind of altitude data decryption and restoration methods
CN104077535A (en) * 2014-06-19 2014-10-01 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN104077535B (en) * 2014-06-19 2017-01-25 南京师范大学 Graphic information system (GIS) vector data local decryption and restoring method
CN104103031A (en) * 2014-08-03 2014-10-15 兰州交通大学 Normalization-based vector spatial data blind watermark method
CN106778347A (en) * 2016-12-22 2017-05-31 南京师范大学 A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function
CN108090369A (en) * 2017-12-29 2018-05-29 南京师范大学 One kind is based on the polynomial GIS vector data DecryptDecryptions of Chebyshev and restoration methods
CN108090369B (en) * 2017-12-29 2021-06-08 南京师范大学 Chebyshev polynomial-based GIS vector data decryption and recovery method
CN108629190A (en) * 2018-03-23 2018-10-09 国网陕西省电力公司电力科学研究院 Geographic information data DecryptDecryption method
CN108629190B (en) * 2018-03-23 2020-08-25 国网陕西省电力公司电力科学研究院 Geographic information data decryption method
CN109002724A (en) * 2018-06-07 2018-12-14 南京师范大学 A kind of part DEM DecryptDecryption and restoration methods based on Compactly supported radial basis function
CN109002724B (en) * 2018-06-07 2021-03-23 南京师范大学 DEM local decryption and recovery method based on tight support radial basis function

Also Published As

Publication number Publication date
CN103067159B (en) 2016-03-02

Similar Documents

Publication Publication Date Title
CN103067159A (en) Geographic information system (GIS) vector data reversible decryption method
CN103093414B (en) A kind of DOM raster data DecryptDecryption and restoration methods
CN106301760B (en) A kind of 3D point cloud model encryption method based on chaotic maps
CN106790303B (en) The data integrity verification method completed in cloud storage by third party
Chen et al. Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding
CN104077536A (en) Radial basis function based GIS (Geographic Information System) vector data reversible decryption method
CN106778347B (en) A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function
CN105592085A (en) Privacy protection method specific to location awareness recommendation system
CN103916248A (en) Fully homomorphic encryption public key space compression method
CN105162590A (en) Parallel homomorphic data encryption method in cloud computation environment
Zeidan et al. On the computations of gas-solid mixture two-phase flow
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
CN102664727A (en) Virtual optical encryption method based on chaotic mapping
CN106802958B (en) Conversion method and system of the CAD data to GIS data
Moodi et al. Robust observer design for Sugeno systems with incremental quadratic nonlinearity in the consequent
CN106301776A (en) Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system
CN103559452A (en) Altitude data decryption and recovery method
Wang et al. A conservative Eulerian numerical scheme for elastoplasticity and application to plate impact problems
CN103516526B (en) A kind of TTS method of improvement
CN104618098A (en) Cryptographic construction method and system for set member relation determination
CN103778383B (en) A kind of cad model local refinement method of painting based on grass
Takatsuka et al. Towards many-dimensional real-time quantum theory for heavy-particle dynamics. II. Beyond semiclassics by quantum smoothing of the singularity in quantum-classical correspondence
CN104077535B (en) Graphic information system (GIS) vector data local decryption and restoring method
Leidinger et al. Explicit isogeometric b-rep analysis on trimmed nurbs-based multi-patch cad models in ls-dyna
Jinjie et al. A new chaotic system and its synchronization with phase spatial rotation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160302

Termination date: 20181228