JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Selective Encryption Scheme for Vector Map Data using Chaotic Map
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Selective Encryption Scheme for Vector Map Data using Chaotic Map
Bang, N.V.; Moon, Kwang-Seok; Lim, Sanghun; Lee, Suk-Hwan; Kwon, Ki-Ryong;
  PDF(new window)
 Abstract
With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.
 Keywords
GIS Vector Map;Selective Encryption;DWT;DFT;Chaotic Map;
 Language
English
 Cited by
 References
1.
Geographic Information Systems (GIS), https://en.wikipedia.org/wiki/Geographic_information_system , (accessed Mar., 2015).

2.
M.F. Goodchild, “Twenty Years of Progress: GIS Science in 2010,” Journal of Spatial Information Science, Vol. 1, No. 1, pp. 3-20, 2010.

3.
Vector Data, https://www.qgis.org/en/docs/gentle_gis_introduction/vector_data.html, (accessed Mar., 2015).

4.
Vector Map, http://bgis.sanbi.org/gis-primer/page_19.htm (accessed Mar., 2015).

5.
E. Bertino and M.L. Damiani, "A Controlled Access to Spatial Data on Web," Proceeding of AGILE Conference on Geographic Information Science, pp. 369-377, 2004.

6.
S.C. Chena, X. Wangb, N. Rishea, and M.A. Weiss, “A Web-based Spatial Data Access System using Semantic R-trees,” Journal of Information Sciences, Vol. 167, Issues 1-4, pp. 41-61, 2003. crossref(new window)

7.
E. Bertino, B. Thuraisingham, M. Gertz, and M.L. Damiani, “Security and Privacy for Geospatial Data: Concepts and Research Directions,” Proceeding of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 6-19, 2008.

8.
N.B. Rybalov and O.I. Zhukovsky, "Access to the Spatial Data in the Web-Oriented GIS," Proceeding of Siberian Conference on Control and Communications, pp. 104-107, 2007.

9.
M. Fuguang, G. Yong, Y. Menglong, X. Fuchun, and L. Ding, "The Fine-grained Security Access Control of Spatial Data," Proceednig of 18th International Conference on Geoinformatics, pp. 1-4, 2010.

10.
F. Wu, W. Cui, and H. Chen, "A Compound Chaos-Based Encryption Algorithm for Vector Geographic Data under Network Circumstance," Proceeding of Cardholder Information Security Program, Vol. 1, pp. 254-258, 2008.

11.
B.J. Jang, K.S. Moon, S.H. Lee and K.R. Kwon, “Effective Compression Technique for Secure Transmission and Storage of GIS Digital Map,” Journal of Korea Multimedia Society, Vol. 14, No 2, pp. 210-218, Feb. 2011. crossref(new window)

12.
Ch. Zhu, Ch. Yang, and Q. Wang, "A Watermarking Algorithm for Vector Spatial Geo- Data based on Integer Wavelet Transform," The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 37, No. B4, pp. 15-18, 2008.

13.
A. Li, B. Lin, Y. Chen, and G. Lu, "Study on Copyright Authentication of GIS Vector Data Based on Zero-Watermarking," The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. 37, No. B4, pp. 1783-1786, 2008.

14.
S.L. Chen, T. Hwang, and W.W. Lin, “Randomness Enhancement using Digitalized Modified Logistic Map,” IEEE Transactions on Circuits and SystemsI I : Express Briefs, Vol. 57, No. 12, pp. 996-1000, 2010. crossref(new window)

15.
S.M. Chang, M.C. Li, and W.W. Lin, “Asymptotic Synchronization of Modified Logistic Hyper-chaotic Systems and its Applications,” Nonlinear Analysis: Real World Applicaions, Vol. 10, No. 2, pp. 869-880, 2009. crossref(new window)

16.
Z. Liu, Q. Guo, L. Xu, M.A. Ahmad, and S. Liu, “Double Image Encryption by using Iterative Random Binary Encoding in Gyrator Domains,” Optics Express, Vol. 18, No. 11, pp. 12033-12043, 2010. crossref(new window)