CN103067159A - Geographic information system (GIS) vector data reversible decryption method - Google Patents
Geographic information system (GIS) vector data reversible decryption method Download PDFInfo
- Publication number
- CN103067159A CN103067159A CN2012105862833A CN201210586283A CN103067159A CN 103067159 A CN103067159 A CN 103067159A CN 2012105862833 A CN2012105862833 A CN 2012105862833A CN 201210586283 A CN201210586283 A CN 201210586283A CN 103067159 A CN103067159 A CN 103067159A
- Authority
- CN
- China
- Prior art keywords
- control point
- formula
- mid
- prime
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a geographic information system (GIS) vector data reversible decryption method, and belongs to the field of geographic information safety. The method includes a secret key generating process, a decryption process and a recovering process, wherein the secret key generating process includes that a data range is confirmed, data conversion quantity is confirmed, mean square errors caused by linear conversion quantity are calculated, parameters are confirmed, mean square errors caused by non-linear conversion quantity are calculated, parameters are confirmed, and the secret key is encrypted through an asymmetric cryptographic algorithm RSA and is stored in a secret key file. The decryption process includes that the secret key file is read, deciphering is conducted and the secret key is extracted, original vector data are opened, an element point coordinate set is obtained, coordinates are normalized, and circulation process is conducted. The GIS vector data reversible decryption method has the advantages of randomness, gradual change, reversibility and the like, improves reliability of GIS vector data decryption, perfects the geographic information safety protection theory and method system, and can be used for public announcement of the GIS vector data and other aspect.
Description
Technical field
The invention belongs to the geography information security fields, be specifically related to a kind of reversible DecryptDecryption method for the GIS vector data.
Background technology
The mapping geography information is concerning expanding development space, concerning national security.Especially under the main trend of global IT application, geography information safeguard protection problem is more and more outstanding.Vector data has the characteristics such as precision height, output quality is good, data volume is little, uses very extensively, and its safeguard protection research is very important.
According to national relevant laws and regulations, vector data openly uses to be needed to process through DecryptDecryption, and DecryptDecryption comprises spatial accuracy DecryptDecryption and two aspects of attribute DecryptDecryption.The spatial accuracy DecryptDecryption uses professional DecryptDecryption technology to carry out the displacement of key element, reduces its precision, and the data behind the DecryptDecryption are not having to be difficult for recovery in the situation of key.Spatial accuracy DecryptDecryption method commonly used comprises projection transformation approach, spatial alternation method, random error interference method etc. at present.The projection transformation approach is reversible; The data space converter technique comprises similarity transformation, affine transformation and projective transformation etc., and these several transform methods are linear transformations, is easy to recover the poor reliability that DecryptDecryption is processed; There are the shortcomings such as the topological relation that can not guarantee key element or algorithm be irreversible in meeting that the random error interference method has.
Summary of the invention
The present invention is directed to the defective that existing DecryptDecryption method exists, provide a kind of non-linear mixed model that vector data is carried out the method that DecryptDecryption is processed, have randomness, the element relationship of error Topological, algorithm invertibity and the characteristics such as be difficult to crack.
The reversible DecryptDecryption method of a kind of GIS vector data take the line chart layer as example, comprises following process:
(1) key generative process
Step 11, the specified data scope: obtain the minimum boundary rectangle R of original vector data V, R lower left corner coordinate is (x
Min, y
Min), upper right corner coordinate is (x
Max, y
Max), get data center point coordinate (x according to formula (1)
Mid, y
Mid), data length XL and data width YL;
Step 12, the specified data converted quantity: concrete steps are as follows: input data global transformation amount offset, offset>0, nonlinear transformation amount nonlinear, 0<nonlinear<=offset obtains linear transformation amount linear according to formula (2);
Step 13 is calculated the middle error that linear transformation amount linear causes, determines to affect the parameter of transform effect: focal distance f, flying height H, drift angle
Inclination angle ω, swing angle κ, concrete steps are as follows:
C) focal distance f ∈ (0,1),
D) calculate flying height H according to formula (3),
C) calculate the range of disturbance linearExtent of linear change amount linear according to formula (4),
D) generate the control point set, concrete steps are as follows: generate the individual even control point of m*n (m*n>=6) and form control point, source set FromPoints={ (Fx in minimum boundary rectangle R scope
i, Fy
i) | i=1,2 ... m*n}; Calculate each target control point coordinates (Tx according to formula (5)
i, Ty
i) composition target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
Wherein: directioin parameter dir
1In [0.0,1.0] scope, directioin parameter
Perturbation of control points parameter random
1And random
2In [1.0,1.0] scope, choose at random,
E) Unitary coordinate is gathered ToPoints according to formula (6) to control point, source set FromPoints and target control point and is carried out normalized and obtain new coordinate set FromPoints '={ (Fx
i', Fy
i') | i=1,2 ... m*n}, ToPoints '={ (Tx
i', Ty
i') | i=1,2 ... m*n},
F) calculate the drift angle
Inclination angle ω, swing angle κ utilize least square method that target control point among FromPoints ' Zhong Yuan control point and the ToPoints ' is carried out match according to formula (7) and resolve and obtain the drift angle
Inclination angle ω, swing angle κ,
G) calculate error accuracy in the linear transformation
1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate "={ (Tx
i", Ty
i") | i=1,2 ... m*n},
According to error accuracy1 in formula (9) calculating,
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy
1Each former target control point coordinates (Tx is then regulated according to formula (10) in-1|>0.01
i, Ty
i), obtain new target control point coordinates (NTx
i, NTy
i), substituting former target control point with new target control point is Tx
i=NTx
i, Ty
i=NTy
i, obtain target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
I) circulation step e)-h) until | linear/accuracy
1-1|<=0.01 obtains final drift angle
Inclination angle ω, swing angle κ;
Step 14 is calculated the middle error that nonlinear transformation amount nonlinear causes, determines parameter j
0-j
5, concrete steps are as follows:
B) generate the control point elevation, utilize formula (11) to calculate the required elevation Fz of each some displacement nonlinear of control point, source set FromPoints
i, control point, generating three-dimensional source set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... m*n},
B) according to formula (12) the three-dimensional source control point set FromPoints that generates is carried out least square and resolve, obtain parameter j
0-j
5,
Fz
i=j
0+j
1Fx
i+j
2Fy
i+j
3Fx
i 2+j
4Fy
i 2+j
5Fx
iFy
i (12)
C) calculate error accuracy in the nonlinear transformation
2, concrete steps are as follows: according to formula (12) and parameter j
0-j
5Resolve the Fz at each control point, source
iValue is saved among the three-dimensional source control point set FromPoints, according to formula (13) three-dimensional source control point set FromPoints is calculated target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
According to error accuracy in formula (14) calculating
2,
D) regulate control point, source height value, if | nonlinear/accuracy
2Each control point, source coordinate height value is then regulated according to formula (15) in-1|>0.01, obtains new height value NFzi, and substituting former height value with new height value is Fzi=NFzi, obtains three-dimensional source control point set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... m*n},
E) circulation step b)-d), until | nonlinear/accuracy
2-1|<=0.01 obtains final argument j
0-j
5
Step 15, focal distance f, flying height H, drift angle
Inclination angle ω, swing angle κ, the point coordinates (x of data center
Mid, y
Mid), parameter j
0-j
5Form key K ey, with rivest, shamir, adelman RSA key K ey is encrypted and deposits in key file Key.txt;
(2) DecryptDecryption process
Step 21 reads key file Key.txt, extracts key K ey after the deciphering, opens original vector data V;
Step 22 generates each point height value z
j, converted coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data V obtains key element point coordinates set P={ (x
j, y
j, z
j) | j=1,2 ..., k}, wherein k is the some number that key element comprises,
B) according to each point coordinates p among key K ey and formula (16) the cycle calculations set P
j(x
j, y
j, z
j) height value z
jAnd be saved among the set P,
z
j=j
0+j
1x
j+j
2y
j+j
3x
j 2+j
4y
j 2+j
5x
jy
j (16)
C) according to formula (17) and key K ey, to each point coordinates p
j(x
j, y
j, z
j) calculate, obtain point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k};
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p
j' (x
j', y
j', z
j) carry out normalized and obtain point coordinates set P behind the DecryptDecryption "={ (x
j", y
j", z
j) | j=1,2 ..., k};
Step 24, circulation step 22 to 23 is until each key element is disposed the data file W behind the preservation DecryptDecryption;
(3) recovery process
Step 31 reads key file Key.txt, extracts key K ey after the deciphering, opens the vector data W behind the DecryptDecryption;
Step 32, Unitary coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data W obtains coordinate set P "={ (x
j", y
j", z
j) | j=1,2 ..., k},
B) according to key K ey and formula (19), pair set P " set in each point coordinates p
j" (x
j", y
j", z
j) carry out normalized and generate point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k;
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p
j' (x
j', y
j', z
j) calculate, then with height value z
jZero setting, the point coordinates p after being restored
j(x
j, y
j, 0), generate coordinate set P={ (x
j, y
j, 0) | j=1,2 ..., k};
Step 34, circulation step 32 to 33 is until each key element is disposed the data file Q behind the saving/restoring.
The present invention proposes a kind of non-linear mixed model the GIS vector data is carried out DecryptDecryption and Recovery processing.This method is guaranteeing can to carry out DecryptDecryption to data according to key under the prerequisite that the vector data topological relation does not change for the safeguard protection problem of GIS vector data, and the data behind the DecryptDecryption can be carried out Distortionless according to key.This method has the characteristics such as randomness, gradually changeable, invertibity, has improved the reliability of GIS vector data DecryptDecryption, and perfect theory and the method system of geography information safeguard protection can be used for the aspects such as publishing of GIS vector data.
Description of drawings
Fig. 1 is the inventive method DecryptDecryption process flow diagram.
Fig. 2 is the inventive method recovery process flow chart.
Fig. 3 is the original vector data that the embodiment of the invention is selected.
Fig. 4 is the design sketch of vector data stack behind initial data of the present invention and the DecryptDecryption.
Embodiment
Below in conjunction with accompanying drawing embodiments of the invention are elaborated.
Present embodiment is selected shp form vector data, to data read, DecryptDecryption and recovery operation, further describe the present invention.Present embodiment selects the shp line chart layer data (such as Fig. 3) of a certain building as original vector data, may further comprise the steps:
(1) key generative process
Step 11, specified data scope: the minimum boundary rectangle R that obtains original vector data V, R lower left corner coordinate is (123451.63676768,142705.11870332), upper right corner coordinate is (123726.302067681,142994.494303319), get data center point coordinate (123588.969417681,142849.80650332), data length XL=274.665300000459 and data width YL=289.375599998981 according to formula (1);
Step 12, the specified data converted quantity: concrete steps are as follows: input data global transformation amount offset=50, nonlinear transformation amount nonlinear=7 obtains linear transformation amount linear=49.5075751779463 according to formula (2);
Step 13 is calculated the middle error that linear transformation amount linear causes, determines to affect the parameter of transform effect: focal distance f, flying height H, drift angle
Inclination angle ω, swing angle κ, concrete steps are as follows:
E) focal distance f=0.15,
F) calculate flying height H=1879.49681193348 according to formula (3),
C) calculate the range of disturbance linearExtent=7.03616196359537 of linear change amount linear according to formula (4),
D) generate the control point set, concrete steps are as follows: generate 4*4 even control point and form control point, source set FromPoints={ (Fx in minimum boundary rectangle R scope
i, Fy
i) | i=1,2 ... 4*4}; Calculate each target control point coordinates (Tx according to formula (5)
i, Ty
i) composition target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... 4*4},
E) Unitary coordinate is gathered ToPoints according to formula (6) to control point, source set FromPoints and target control point and is carried out normalized and obtain new coordinate set FromPoints '={ (Fx
i', Fy
i') | i=1,2 ... 4*4}, ToPoints '={ (Tx
i', Ty
i') | i=1,2 ... 4*4},
F) calculate the drift angle
Inclination angle ω, swing angle κ utilize least square method that target control point among FromPoints ' Zhong Yuan control point and the ToPoints ' is carried out match according to formula (7) and resolve and obtain the drift angle
Inclination angle ω=0.00921638185358357, swing angle κ=0.0206308078601073,
G) calculate error accuracy in the linear transformation
1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate "={ (Tx
i", Ty
i") | i=1,2 ... 4*4}, according to error accuracy in formula (9) calculating
1=50.6202842886151,
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy
1Each former target control point coordinates (Tx is then regulated according to formula (10) in-1|>0.01
i, Ty
i), obtain new target control point coordinates (NTx
i, NTy
i), substituting former target control point with new target control point is Tx
i=NTx
i, Ty
i=NTy
i, obtain target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... 4*4},
I) circulation step e)-h), work as accuracy
1=49.5075776592392 o'clock | linear/accuracy
1-1|<=0.01 obtains final drift angle
Inclination angle ω=0.00901382354283439, swing angle κ=0.0201770830635741;
Step 14 is calculated the middle error that nonlinear transformation amount nonlinear causes, determines parameter j
0-j
5, concrete steps are as follows:
A) generate the control point elevation, utilize formula (11) to calculate the required elevation Fz of each some displacement nonlinear of control point, source set FromPoints
i, control point, generating three-dimensional source set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... 4*4},
B) according to formula (12) the three-dimensional source control point set FromPoints that generates is carried out least square and resolve, obtain parameter j
0=-134576645.0625, j
1=957.075539588928, j
2=1056.14212036133, j
3=-0.00386110281764473, j
4=-0.00368852281107479, j
5=-1.88736757991137E-05,
C) calculate error accuracy in the nonlinear transformation
2, concrete steps are as follows: according to formula (12) and parameter j
0-j
5Resolve the Fz at each control point, source
iValue is saved among the three-dimensional source control point set FromPoints, according to formula (13) three-dimensional source control point set FromPoints is calculated target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... 4*4}, according to error accuracy in formula (14) calculating
2=8.33449148774509,
D) regulate control point, source height value, if | nonlinear/accuracy
2Each control point, source coordinate height value is then regulated according to formula (15) in-1|>0.01, obtains new height value NFzi, and substituting former height value with new height value is Fzi=NFzi, obtains three-dimensional source control point set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... 4*4},
E) circulation step b)-d), work as accuracy
2=6.9961779687363 o'clock | nonlinear/accuracy
2-1|<=0.01 obtains final argument j
0=-92384371.34375, j
1=544.834728956223, j
2=822.104847669601, j
3=-0.00253963583136851, j
4=-0.00312865154306508, j
5=0.000580351679673186;
Step 15, focal distance f, flying height H, drift angle
Inclination angle ω, swing angle κ, the point coordinates (x of data center
Mid, y
Mid), parameter j
0-j
5Form key K ey, with rivest, shamir, adelman RSA key K ey is encrypted and deposits in key file Key.txt;
(2) DecryptDecryption process
Step 21 reads key file Key.txt, extracts key K ey after the deciphering, opens original vector data V;
Step 22 generates each point height value z
j, converted coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data V obtains key element point coordinates set P={ (x
j, y
j, z
j) | j=1,2 ..., k}, wherein k is the some number that key element comprises, the below with 1 p (123677.937667681,142928.252103319,0) among the P for example describes,
B) according to each point coordinates p among key K ey and formula (16) the cycle calculations set P
j(x
j, y
j, z
j) height value z
jAnd be saved among the set P, the height value z=119.892017556354 of example points p,
C) according to formula (17) and key K ey, to each point coordinates p
j(x
j, y
j, z
j) calculate, obtain point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k}, example points p (123677.937667681,142928.252103319,119.892017556354) conversion after point coordinates be p ' (0.00402027927973795,0.00517358718854751,119.892017556354);
Step 23, Unitary coordinate, according to key K ey and formula (18) to each point coordinates p
j' (x
j', y
j', z
j) carry out normalized and obtain point coordinates set P behind the DecryptDecryption "={ (x
j", y
j", z
j) | j=1,2 ..., k}, point coordinates is p after the some p ' normalization " (123639.34343161,142914.631440834,119.892017556354);
Step 24, circulation step 22 to 23 is until each key element is disposed the data file W behind the preservation DecryptDecryption;
(3) recovery process
Step 31 reads key file Key.txt, extracts key K ey after the deciphering, opens the vector data W behind the DecryptDecryption;
Step 32, Unitary coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data W obtains coordinate set P "={ (x
j", y
j", z
j) | j=1,2 ..., k}, the below is with a P " in 1 p " (123639.34343161,142914.631440834,119.892017556354) for example describes,
B) according to key K ey and formula (19), pair set P " set in each point coordinates p
j" (x
j", y
j", z
j) carry out normalized and generate point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k} is to example points p " carry out normalized and obtain a p ' (0.00402027927973827,0.00517358718854753,119.892017556354);
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p
j' (x
j', y
j', z
j) calculate, then with height value z
jZero setting, the point coordinates p after being restored
j(x
j, y
j, 0), generate coordinate set P={ (x
j, y
j, 0) | j=1,2 ..., k}, the point coordinates after conversion p ' coordinate is restored is p (123677.937667681,142928.252103319,0);
Step 34, circulation step 32 to 33 is until each key element is disposed the data file Q behind the saving/restoring.
Only carry out DecryptDecryption and the recovery of vector data in the embodiment of the invention as an example of the line chart layer example, the method also can be used for DecryptDecryption and the recovery of point diagram layer and face figure layer.
The present invention is guaranteeing under the prerequisite that the vector data topological relation does not change vector data to be carried out DecryptDecryption and recovery, and setup parameter is to reach required DecryptDecryption effect according to demand, and the data based key behind the DecryptDecryption can carry out Distortionless.
Claims (1)
1. the reversible DecryptDecryption method of GIS vector data is characterized in that, comprises following process:
(1) key generative process
Step 11, the specified data scope: obtain the minimum boundary rectangle R of original vector data V, R lower left corner coordinate is (x
Min, y
Min), upper right corner coordinate is (x
Max, y
Max), get data center point coordinate (x according to formula (1)
Mid, y
Mid), data length XL and data width YL;
Step 12, the specified data converted quantity: concrete steps are as follows: input data global transformation amount offset, offset>0, nonlinear transformation amount nonlinear, 0<nonlinear<=offset obtains linear transformation amount linear according to formula (2);
Step 13 is calculated the middle error that linear transformation amount linear causes, determines to affect the parameter of transform effect: focal distance f, flying height H, drift angle
Inclination angle ω, swing angle κ, concrete steps are as follows:
A) focal distance f ∈ (0,1),
B) calculate flying height H according to formula (3),
C) calculate the range of disturbance linearExtent of linear change amount linear according to formula (4),
D) generate the control point set, concrete steps are as follows: generate m*n even control point and form control point, source set FromPoints={ (Fx in minimum boundary rectangle R scope
i, Fy
i) | i=1,2 ... m*n}, m*n>=6; Calculate each target control point coordinates (Tx according to formula (5)
i, Ty
i) composition target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
Wherein: directioin parameter dir
1In [0.0,1.0] scope, directioin parameter
Perturbation of control points parameter random
1And random
2In [1.0,1.0] scope, choose at random,
E) Unitary coordinate is gathered ToPoints according to formula (6) to control point, source set FromPoints and target control point and is carried out normalized and obtain new coordinate set FromPoints '={ (Fx
i', Fy
i') | i=1,2 ... m*n}, ToPoints '={ (Tx
i', Ty
i') | i=1,2 ... m*n},
F) calculate the drift angle
Inclination angle ω, swing angle κ utilize least square method that target control point among FromPoints ' Zhong Yuan control point and the ToPoints ' is carried out match according to formula (7) and resolve and obtain the drift angle
Inclination angle ω, swing angle κ,
G) calculate error accuracy in the linear transformation
1, concrete steps are as follows: obtain target control point set ToPoints according to formula (8) conversion source control point set FromPoints ' coordinate "={ (Tx
i", Ty
i") | i=1,2 ... m*n},
According to error accuracy in formula (9) calculating
1,
H) regulate the set of target control point, concrete steps are as follows: if | linear/accuracy
1Each former target control point coordinates (Tx is then regulated according to formula (10) in-1|>0.01
i, Ty
i), obtain new target control point coordinates (NTx
i, NTy
i), substituting former target control point with new target control point is Tx
i=NTx
i, Ty
i=NTy
i, obtain target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
I) circulation step e)-h) until | linear/accuracy
1-1|<=0.01 obtains final drift angle
Inclination angle ω, swing angle κ;
Step 14 is calculated the middle error that nonlinear transformation amount nonlinear causes, determines parameter j
0-j
5, concrete steps are as follows:
A) generate the control point elevation, utilize formula (11) to calculate the required elevation Fz of each some displacement nonlinear of control point, source set FromPoints
i, control point, generating three-dimensional source set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... m*n},
B) according to formula (12) the three-dimensional source control point set FromPoints that generates is carried out least square and resolve, obtain parameter j
0-j
5,
Fz
i=j
0+j
1Fx
i+j
2Fy
i+j
3Fx
i 2+j
4Fy
i 2+j
5Fx
iFy
i (12)
C) calculate error accuracy in the nonlinear transformation
2, concrete steps are as follows: according to formula (12) and parameter j
0-j
5Resolve the Fz at each control point, source
iValue is saved among the three-dimensional source control point set FromPoints, according to formula (13) three-dimensional source control point set FromPoints is calculated target control point set ToPoints={ (Tx
i, Ty
i) | i=1,2 ... m*n},
According to error accuracy in formula (14) calculating
2,
D) regulate control point, source height value, if | nonlinear/accuracy
2Each control point, source coordinate height value is then regulated according to formula (15) in-1|>0.01, obtains new height value NFz
i, substituting former height value with new height value is Fz
i=NFz
i, obtain three-dimensional source control point set FromPoints={ (Fx
i, Fy
i, Fz
i) | i=1,2 ... m*n},
E) circulation step b)-d), until | nonlinear/accuracy
2-1|<=0.01 obtains final argument j
0-j
5
Step 15, focal distance f, flying height H, drift angle
Inclination angle ω, swing angle κ, the point coordinates (x of data center
Mid, y
Mid), parameter j
0-j
5Form key K ey, with rivest, shamir, adelman RSA key K ey is encrypted and deposits in key file Key.txt;
(2) DecryptDecryption process
Step 21 reads key file Key.txt, extracts key K ey after the deciphering, opens original vector data V;
Step 22 generates each point height value z
j, converted coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data V obtains key element point coordinates set P={ (x
j, y
j, z
j) | j=1,2 ..., k}, wherein k is the some number that key element comprises,
B) according to each point coordinates p among key K ey and formula (16) the cycle calculations set P
j(x
j, y
j, z
j) height value z
jAnd be saved among the set P,
z
j=j
0+j
1x
j+j
2y
j+j
3x
j 2+j
4y
j 2+j
5x
jy
j (16)
C) according to formula (17) and key K ey, to each point coordinates p
j(x
j, y
j, z
j) calculate, obtain point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k};
Step 23, Unitary coordinate, according to+key K ey and formula (18) to each point coordinates p
j' (x
j', y
j', z
j) carry out normalized and obtain point coordinates set P behind the DecryptDecryption "={ (x
j", y
j", z
j) | j=1,2 ..., k};
Step 24, circulation step 22 to 23 is until each key element is disposed the data file W behind the preservation DecryptDecryption;
(3) recovery process
Step 31 reads key file Key.txt, extracts key K ey after the deciphering, opens the vector data W behind the DecryptDecryption;
Step 32, Unitary coordinate, concrete steps are as follows:
A) the key element point coordinates of extraction vector data W obtains coordinate set P "={ (x
j", y
j", z
j) | j=1,2 ..., k},
B) according to key K ey and formula (19), pair set P " set in each point coordinates p
j" (x
j", y
j", z
j) carry out normalized and generate point coordinates set P '={ (x
j', y
j', z
j) | j=1,2 ..., k;
Step 33, converted coordinate, according to formula (20) and key K ey to each point coordinates p
j' (x
j', y
j', z
j) calculate, then with height value z
jZero setting, the point coordinates p after being restored
j(x
j, y
j, 0), generate coordinate set P={ (x
j, y
j, 0) | j=1,2 ..., k};
Step 34, circulation step 32 to 33 is until each key element is disposed the data file Q behind the saving/restoring.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210586283.3A CN103067159B (en) | 2012-12-28 | 2012-12-28 | A kind of reversible DecryptDecryption method of GIS vector data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210586283.3A CN103067159B (en) | 2012-12-28 | 2012-12-28 | A kind of reversible DecryptDecryption method of GIS vector data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103067159A true CN103067159A (en) | 2013-04-24 |
CN103067159B CN103067159B (en) | 2016-03-02 |
Family
ID=48109630
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210586283.3A Expired - Fee Related CN103067159B (en) | 2012-12-28 | 2012-12-28 | A kind of reversible DecryptDecryption method of GIS vector data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103067159B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103559452A (en) * | 2013-10-30 | 2014-02-05 | 南京师范大学 | Altitude data decryption and recovery method |
CN104077535A (en) * | 2014-06-19 | 2014-10-01 | 南京师范大学 | Graphic information system (GIS) vector data local decryption and restoring method |
CN104103031A (en) * | 2014-08-03 | 2014-10-15 | 兰州交通大学 | Normalization-based vector spatial data blind watermark method |
CN106778347A (en) * | 2016-12-22 | 2017-05-31 | 南京师范大学 | A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function |
CN108090369A (en) * | 2017-12-29 | 2018-05-29 | 南京师范大学 | One kind is based on the polynomial GIS vector data DecryptDecryptions of Chebyshev and restoration methods |
CN108629190A (en) * | 2018-03-23 | 2018-10-09 | 国网陕西省电力公司电力科学研究院 | Geographic information data DecryptDecryption method |
CN109002724A (en) * | 2018-06-07 | 2018-12-14 | 南京师范大学 | A kind of part DEM DecryptDecryption and restoration methods based on Compactly supported radial basis function |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6574561B2 (en) * | 2001-03-30 | 2003-06-03 | The University Of North Florida | Emergency management system |
CN101968841A (en) * | 2010-11-09 | 2011-02-09 | 北京安天电子设备有限公司 | Anti-virus and decryption method and device for USB mobile storage apparatus |
CN102332079A (en) * | 2011-09-16 | 2012-01-25 | 南京师范大学 | GIS (geographic information system) vector data disguising and restoring method based on error random interference |
-
2012
- 2012-12-28 CN CN201210586283.3A patent/CN103067159B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6574561B2 (en) * | 2001-03-30 | 2003-06-03 | The University Of North Florida | Emergency management system |
CN101968841A (en) * | 2010-11-09 | 2011-02-09 | 北京安天电子设备有限公司 | Anti-virus and decryption method and device for USB mobile storage apparatus |
CN102332079A (en) * | 2011-09-16 | 2012-01-25 | 南京师范大学 | GIS (geographic information system) vector data disguising and restoring method based on error random interference |
Non-Patent Citations (1)
Title |
---|
傅宏: "公众版地图地理要素脱密处理方法", 《地理空间信息》, vol. 8, no. 4, 31 August 2010 (2010-08-31), pages 133 - 134 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103559452A (en) * | 2013-10-30 | 2014-02-05 | 南京师范大学 | Altitude data decryption and recovery method |
CN103559452B (en) * | 2013-10-30 | 2016-03-30 | 南京师范大学 | A kind of altitude data decryption and restoration methods |
CN104077535A (en) * | 2014-06-19 | 2014-10-01 | 南京师范大学 | Graphic information system (GIS) vector data local decryption and restoring method |
CN104077535B (en) * | 2014-06-19 | 2017-01-25 | 南京师范大学 | Graphic information system (GIS) vector data local decryption and restoring method |
CN104103031A (en) * | 2014-08-03 | 2014-10-15 | 兰州交通大学 | Normalization-based vector spatial data blind watermark method |
CN106778347A (en) * | 2016-12-22 | 2017-05-31 | 南京师范大学 | A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function |
CN108090369A (en) * | 2017-12-29 | 2018-05-29 | 南京师范大学 | One kind is based on the polynomial GIS vector data DecryptDecryptions of Chebyshev and restoration methods |
CN108090369B (en) * | 2017-12-29 | 2021-06-08 | 南京师范大学 | Chebyshev polynomial-based GIS vector data decryption and recovery method |
CN108629190A (en) * | 2018-03-23 | 2018-10-09 | 国网陕西省电力公司电力科学研究院 | Geographic information data DecryptDecryption method |
CN108629190B (en) * | 2018-03-23 | 2020-08-25 | 国网陕西省电力公司电力科学研究院 | Geographic information data decryption method |
CN109002724A (en) * | 2018-06-07 | 2018-12-14 | 南京师范大学 | A kind of part DEM DecryptDecryption and restoration methods based on Compactly supported radial basis function |
CN109002724B (en) * | 2018-06-07 | 2021-03-23 | 南京师范大学 | DEM local decryption and recovery method based on tight support radial basis function |
Also Published As
Publication number | Publication date |
---|---|
CN103067159B (en) | 2016-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103067159A (en) | Geographic information system (GIS) vector data reversible decryption method | |
CN103093414B (en) | A kind of DOM raster data DecryptDecryption and restoration methods | |
CN106301760B (en) | A kind of 3D point cloud model encryption method based on chaotic maps | |
CN106790303B (en) | The data integrity verification method completed in cloud storage by third party | |
Chen et al. | Cryptanalysis and improvement of an optical image encryption scheme using a chaotic Baker map and double random phase encoding | |
CN104077536A (en) | Radial basis function based GIS (Geographic Information System) vector data reversible decryption method | |
CN106778347B (en) | A kind of reversible DecryptDecryption method of arrow grid geodata based on trigonometric function | |
CN105592085A (en) | Privacy protection method specific to location awareness recommendation system | |
CN103916248A (en) | Fully homomorphic encryption public key space compression method | |
CN105162590A (en) | Parallel homomorphic data encryption method in cloud computation environment | |
Zeidan et al. | On the computations of gas-solid mixture two-phase flow | |
CN106127669B (en) | Based on the New chaotic image encryption method for protecting area B aker mapping | |
CN102664727A (en) | Virtual optical encryption method based on chaotic mapping | |
CN106802958B (en) | Conversion method and system of the CAD data to GIS data | |
Moodi et al. | Robust observer design for Sugeno systems with incremental quadratic nonlinearity in the consequent | |
CN106301776A (en) | Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system | |
CN103559452A (en) | Altitude data decryption and recovery method | |
Wang et al. | A conservative Eulerian numerical scheme for elastoplasticity and application to plate impact problems | |
CN103516526B (en) | A kind of TTS method of improvement | |
CN104618098A (en) | Cryptographic construction method and system for set member relation determination | |
CN103778383B (en) | A kind of cad model local refinement method of painting based on grass | |
Takatsuka et al. | Towards many-dimensional real-time quantum theory for heavy-particle dynamics. II. Beyond semiclassics by quantum smoothing of the singularity in quantum-classical correspondence | |
CN104077535B (en) | Graphic information system (GIS) vector data local decryption and restoring method | |
Leidinger et al. | Explicit isogeometric b-rep analysis on trimmed nurbs-based multi-patch cad models in ls-dyna | |
Jinjie et al. | A new chaotic system and its synchronization with phase spatial rotation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160302 Termination date: 20181228 |