Key Technologies and Methods for Vector Geographic Data Security Protection
-
摘要: 近年来,矢量地理数据在政府、国防、国土、交通、海洋等多个领域广泛应用.矢量地理数据在存储、传输、共享过程中正面临日趋严重的安全威胁.矢量地理数据的安全保护与数据共享矛盾已成为制约地理信息产业发展的关键问题之一.针对上述问题,分析了现有矢量地理数据安全保护中数据加密、数据水印、数据置乱和信息伪装等若干关键技术及其进展,分析了矢量地理数据安全保护所面临的方法及新技术融合带来的技术挑战.结合当前矢量地理数据和网络空间安全领域的新进展,提出了敏感信息度量和局部动态处理等一些未来研究和发展的重要方向,为矢量地理数据安全保护与数据共享技术的研究和应用作出一些有益的探索.Abstract: In recent years, vector geographic data have been widely used in fields of government, national defense, land, transportation, and marine. Vector geographic data are facing increasingly serious security threats in the process of storage, transmission and sharing. The contradiction between the security protection of vector geographic data and data sharing has become one of the key issues restraining the development of geographic information industry. Considering the above concerns, in this paper it analyzes several key technologies and progresses in existing vector geographic data security protection such as data encryption, data watermarking, data scrambling, and information steganography, and discusses the technical challenges that vector geographic data security protection is facing from the methods and integration of new technologies. Combining with the current advances in the field of vector geographic data and cyberspace security, some important directions for future research and development, such as sensitive information measurement and local dynamic processing, are proposed, which provide some advices for the research and application development of vector geographic data security and data sharing.
-
Key words:
- geographic data /
- vector geographic data /
- data security /
- sensitive information
-
表 1 主要技术分析总结
Table 1. Analysis and summary of main technologies
内容 主要适用范围 主要目标 主要优势 主要缺点 传统密码学 存储、传输 机密性、完整性 安全性高 效率低 混沌加密 存储、传输 机密性 处理效率高、安全性高 密钥管理困难、难以同时保持高精度与高保密性 变换域加密 共享、存储 机密性 可选择性强、高效性 难以动态处理特定区域 随机数据置乱 共享、存储 机密性、可控性 简洁性、高效性 难以保持特定结构 数学变换置乱 共享、存储 机密性、可控性 简洁性、拓扑一致性 存在被校正风险 空域水印 存储、传输等阶段 完整性、版权保护 简洁性、鲁棒性 精度影响较大 变换域水印 存储、传输等阶段 完整性、版权保护 鲁棒性、抗差性 算法较复杂 -
[1] Baby, D., Thomas, J., Augustine, G., et al., 2015.A Novel DWT Based Image Securing Method Using Steganography.Procedia Computer Science, 46:612-618. https://doi.org/10.1016/j.procs.2015.02.105 [2] Bang, N.V., Lee, S.H., Moon, K.S., et al., 2016.Encryption Algorithm Using Polyline Simplification for GIS Vector Map.Journal of Korea Multimedia Society, 19(8):1453-1459. https://doi.org/10.9717/kmms.2016.19.8.1453 [3] Bang, N.V., Lee, S.H., Moon, K.S., et al., 2017.Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map.Journal of Information Processing Systems, 13(1):68-82. https://doi.org/10.3745/jips.03.0059 [4] Bansal, M., Upadhyaya, A., 2018.Three-Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.In: Bokhari M., Agrawal N., Saini D., eds., Cyber Security.Advances in Intelligent Systems and Computing, Spinger Nature Singapore Pte Ltd., 241-247.https://doi.org/10.1007/978-981-10-8536-9_24 [5] Bash, B.A., Goeckel, D., Towsley, D., et al., 2015.Hiding Information in Noise:Fundamental Limits of Covert Wireless Communication.IEEE Communications Magazine, 53(12):26-31. https://doi.org/10.1109/mcom.2015.7355562 [6] Bloch, M.R., 2016.Covert Communication over Noisy Channels:A Resolvability Perspective.IEEE Transactions on Information Theory, 62(5):2334-2354. https://doi.org/10.1109/tit.2016.2530089 [7] Cao, Y., Xiao, J., Zhang, W.C., 2016.A Multiple Watermarking Algorithm for Vector Map Based on Zero-Watermark and Reversible Watermark.Journal of South China Normal University (Natural Science Edition), 48(3):69-74(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-HNSF201603012.htm [8] Che, S., Deng, S.J., 2008.Watermarking Arithmetic of 2D Vector Maps Based on Two-Tier Grids.Hydrographic Surveying and Charting, 28(1):13-17(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-HYCH200801006.htm [9] Coppersmith, D., 1994.The Data Encryption Standard (DES) and Its Strength against Attacks.IBM Journal of Research and Development, 38(3):243-250. https://doi.org/10.1147/rd.383.0243 [10] Cui, H.C., 2013.Research on the Sharing Security of Vector Geography Data (Dissertation).Nanjing Normal University, Nanjing(in Chinese with English abstract). [11] Da, Q.G., Sun, J.G., Zhang, L.G., et al., 2018.A Novel Hybrid Information Security Scheme for 2D Vector Map.Mobile Networks and Applications, 23(4):734-742. https://doi.org/10.1007/s11036-018-0997-z [12] Daemen, J., Rijmen, V., 2002.The Design of Rijndael:AES-The Advanced Encryption Standard.Springer Science & Business Media, Berlin. http://ci.nii.ac.jp/ncid/BA56454560 [13] Dakroury, Y., El-Ghafar, I.A., Tammam, A., 2010.Protecting GIS Data Using Cryptography and Digital Watermarking.International Journal of Computer Science and Network Security, 10(1):75-84. http://smartsearch.nstl.gov.cn/paper_detail.html?id=cfae695feabc4faf7dfc2eb276ff7e58 [14] Deng, T., 2009.The Research on 2D Engineering Graphics Encryption Technology Based on Transform Domain (Dissertation).Hunan University, Changsha(in Chinese with English abstract). [15] Fridrich, J., 1998.Symmetric Ciphers Based on Two-Dimensional Chaotic Maps.International Journal of Bifurcation and Chaos, 8(6):1259-1284. https://doi.org/10.1142/s021812749800098x [16] Fu, H., 2010.Decipherment Methods of Geography Elements of the Public Version Map.Geospatial Information, 8(4):133-134(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DXKJ201004045.htm [17] Gedik, B., Liu, L., 2005.Location Privacy in Mobile Systems: A Personalized Anonymization Model.25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).IEEE, Columbus, OH, USA, 620-629.https://doi.org/10.1109/icdcs.2005.48 [18] Gedik, B., Liu, L., 2008.Protecting Location Privacy with Personalized K-Anonymity:Architecture and Algorithms.IEEE Transactions on Mobile Computing, 7(1):1-18. https://doi.org/10.1109/tmc.2007.1062 [19] Giao, P.N., Kwon, O.J., Lee, S.H., et al., 2016.Perceptual Encryption Method for Vector Map Based on Geometric Transformations.2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA).IEEE, Jeju, South Korea, 1-4.https://doi.org/10.1109/apsipa.2016.7820846 [20] He, B., 2010.A Digital Image Watermarking Method against Rotation Attack Based on LSB.System Simulation Technology, 6(4):304-307(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-XTFJ201004010.htm [21] Hu, C.J., 2017.Research on Image Encryption Algorithm Based on Chaos Theory (Dissertation).Nanjing University of Information Science & Technology, Nanjing(in Chinese with English abstract). [22] Jang, B.J., Lee, S.H., Kwon, K.R., 2014.Perceptual Encryption with Compression for Secure Vector Map Data Processing.Digital Signal Processing, 25:224-243. https://doi.org/10.1016/j.dsp.2013.09.013 [23] Jang, B.J., Lee, S.H., Lee, E.J., et al., 2017.A Crypto-Marking Method for Secure Vector Map.Multimedia Tools and Applications, 76(14):16011-16044. https://doi.org/10.1007/s11042-016-3893-1 [24] Jiang, N., Zhao, N., Wang, L., 2016.LSB Based Quantum Image Steganography Algorithm.International Journal of Theoretical Physics, 55(1):107-123. https://doi.org/10.1007/s10773-015-2640-0 [25] Kalnis, P., Ghinita, G., Mouratidis, K., et al., 2007.Preventing Location-Based Identity Inference in Anonymous Spatial Queries.IEEE Transactions on Knowledge and Data Engineering, 19(12):1719-1733. https://doi.org/10.1109/tkde.2007.190662 [26] Kang, H.I., Kim, K.I., Choi, J.U., 2001.A Vector Watermarking Using the Generalized Square Mask.Proceedings International Conference on Information Technology: Coding and Computing.IEEE, Las Vegas, NV, USA, 234-236.https://doi.org/10.1109/itcc.2001.918797 [27] Kang, J., Wang, Q.J., Yan, S.Q., 2012.A Tentative Discussion on the Application of the Public Version of 1:250 000 Topographic Map to 1:250 000 Geological Map.Geology in China, 39(4):1087-1093(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DIZI201204026.htm [28] Kido, H., Yanagisawa, Y., Satoh, T., 2005.An Anonymous Communication Technique Using Dummies for Location-Based Services.International Conference on Pervasive Services.IEEE, Santorini, Greece, 88-97.https://doi.org/10.1109/perser.2005.1506394 [29] Koblitz, N., 1987.Elliptic Curve Cryptosystems.Mathematics of Computation, 48(177):203. https://doi.org/10.1090/s0025-5718-1987-0866109-5 [30] Li, A.B., Wang, H.R., Zhou, W., 2015.Scrambling Encryption of Vector Digital Map Based on 2D Chaos System.Journal of China University of Mining & Technology, 44(4):747-753(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-ZGKD201504023.htm [31] Li, B.F., Shen, Y.Z., Zhang, X.F., et al., 2013.Seamless Multivariate Affine Error-in-Variables Transformation and Its Application to Map Rectification.International Journal of Geographical Information Science, 27(8):1572-1592. https://doi.org/10.1080/13658816.2012.760202 [32] Li, G.S., Meng, X.R., 2012.Vector Data Safety Protection Method in Oracle.Computer Engineering, 38(10):102-104(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-JSJC201210032.htm [33] Li, Y.F., Ding, L.P., Wu, J.Z., et al., 2019.Survey on Key Issues in Networks Covert Channel.Journal of Software, 30(8):2470-2490(in Chinese with English abstract). http://www.zhangqiaokeyan.com/academic-journal-cn_journal-software_thesis/0201273281017.html [34] Liang, W.D., Zhang, X.C., Xi, X., et al., 2018.A Multiple Watermarking Algorithm for Vector Geographic Data Based on Zero-Watermarking and Fragile Watermarking.Acta Scientiarum Naturalium Universitatis Sunyatseni, 57(4):1-8(in Chinese with English abstract). http://www.researchgate.net/publication/330036138_A_multiple_watermarking_algorithm_for_vector_geographic_data_based_on_zero-watermarking_and_fragile_watermarking [35] Liu, Z., 2017.Research on Vector Map Data Encryption Technology (Dissertation).Harbin Engineering University, Harbin(in Chinese with English abstract). [36] Lou, J.P., Zhang, M., Fu, P., et al., 2016.Design of Network Covert Transmission Scheme Based on TCP.Netinfo Security, (1):34-39(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-XXAQ201601007.htm [37] Lü, H.Y., Zhou, W., Sheng, Y.H., et al., 2017.Topology and Shape Preservable Geometric Decryption Method for Vector Geographic Data.Journal of China University of Mining & Technology, 46(3):648-654(in Chinese with English abstract). http://www.researchgate.net/publication/317948358_Topology_and_shape_preservable_geometric_decryption_method_for_vector_geographic_data [38] Mavani, M., Ragha, L., 2014.Covert Channel in IPv6 Destination Option Extension Header.2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA).IEEE, Mumbai, India, 219-224.https://doi.org/10.1109/cscita.2014.6839262 [39] Ngoc, G.P., Lee, S.H., Kwon, K.R., 2015.Selective Encryption Algorithm for GIS Vector Map Using Geometric Objects.International Journal of Security and Its Applications, 9(2):61-72. https://doi.org/10.14257/ijsia.2015.9.2.07 [40] Ngoc, G.P., Moon, K.S., Lee, S.H., et al., 2016.GIS Map Encryption Algorithm for Drone Security Based on Geographical Features.2016 International Conference on Computational Science and Computational Intelligence (CSCI).IEEE, Las Vegas, NV, USA, 1422-1423.https://doi.org/10.1109/csci.2016.0279 [41] Ohbuchi, R., Ueda, H., Endoh, S., 2002.Robust Watermarking of Vector Digital Maps.Proceedings.IEEE International Conference on Multimedia and Expo.Lausanne, Switzerland, 577-580.https://doi.org/10.1109/icme.2002.1035847 [42] Peng, X.Y., Long, Y., Wu, H.H., 2002.Coordinate Adjustment on Vector Graph in Mapinfo Using Affine Transformation.Journal of Geomatics, 27(5):6-7(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-CHXG200205002.htm [43] Pfitzmann, A., Hansen, M., 2010.A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management.http://dud.inf.tu-dresden.de/Anon_Terminology.shtml [44] Pham, G.N., Lee, H.S., Kwon, R.K., 2017.Perceptual Encryption Based on Features of Interpolating Curve for Vector Map.IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E100.A(5): 1156-1164.https://doi.org/10.1587/transfun.e100.a.1156 [45] Pham, G.N., Ngo, S.T., Bui A.N., et al., 2019.Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution.Applied Sciences, 9(22):4889. https://doi.org/10.3390/app9224889 [46] Pingley, A., Zhang, N., Fu, X.W., et al., 2011.Protection of Query Privacy for Continuous Location Based Services.Proceedings IEEE INFOCOM.IEEE, Shanghai, China, 1710-1718.https://doi.org/10.1109/infcom.2011.5934968 [47] Qu, J., Bao, Y.L., 2006.The Discrete Nonlinear Geo-Adjusting of Traffic Vector Map.Computer Simulation, 23(5):77-80(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJZ200605022.htm [48] Ren, N., Wu, W., Zhu, C.Q., et al., 2015.An Accuracy Authentication Algorithm of Anti-Deleting Elements for Vector Geographic Data.Geography and Geo-Information Science, 31(4):43-46(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DLGT201504009.htm [49] Rivest, R.L., Shamir, A., Adleman, L., 1978.A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.Communications of the ACM, 21(2):120-126. https://doi.org/10.1145/359340.359342 [50] Shekhar, S., Huang, Y., Djugash, J., et al., 2002.Vector Map Compression: A Clustering Approach.Proceedings of the 10th ACM International Symposium on Advances in Geographic Information Systems.ACM, 74-80.https://doi.org/10.1145/585147.585164 [51] Shiu, H.J., Lin, B.S., Lin, B.S., et al., 2018.Data Hiding on Social Media Communications Using Text Steganography.Lecture Notes in Computer Science.Springer International Publishing, Cham, 217-224.https://doi.org/10.1007/978-3-319-76687-4_15 [52] Shokri, R., Theodorakopoulos, G., Troncoso, C., et al., 2012.Protecting Location Privacy: Optimal Strategy Against Localization Attacks.Proceedings of the 2012 ACM Conference on Computer and Communications Security.ACM, 617-627.https://doi.org/10.1145/2382196.2382261 [53] Song, X., Liu, F., Yang, C., et al., 2015.Steganalysis of Adaptive JPEG Steganography Using 2D Gabor Filters.Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security.ACM, 15-23.https://doi.org/10.1145/2756601.2756608 [54] Sun, H.R., Zhu, J.J., Yin, P.C., et al., 2012. A Zero-Watermarking Algorithm Based on Vector Map Feature Points and Blocks.Geography and Geo-Information Science, 28(4):111-112(in Chinese). http://en.cnki.com.cn/Article_en/CJFDTotal-JSJK201207024.htm [55] Sun, Y.C., 2017.Research on the Application of Vector Map Watermarking Technology in Geographic Information Management (Dissertation).Yanbian University, Yanbian(in Chinese with English abstract). [56] Sun, Y.C., Li, D., 2017.Vector Map Zero-Watermark Algorithm Based on Node Feature.Geography and Geo-Information Science, 33(3):17-21(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DLGT201703004.htm [57] Tang, Y.L., Zhang, Y.P., Ye, Q., et al., 2017.Logarithmic Quantization Index Modulation Digital Watermarking Algorithm Based on DWT Domain.Computer Applications and Software, 34(8):206-212(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-JYRJ201708037.htm [58] Wang, C., Wang, W., Wu, B.Y., et al., 2009.A Watermarking Algorithm for Vector Data Based on Spatial Domain.2009 First International Conference on Information Science and Engineering.IEEE, Nanjing, China, 1959-1962.https://doi.org/10.1109/icise.2009.199 [59] Wang, H.R., 2014.Scrambling Encryption Methods and Scrambling Performance Evaluation for Vector Geographic Data (Dissertation).Nanjing Normal University, Nanjing(in Chinese with English abstract). [60] Wang, H.W., 2012.Method of Map Data Processing of Changde Geographic Information Platform.Geomatics & Spatial Information Technology, 35(6):144-147(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DBCH201206044.htm [61] Wang, J.J., Zhang, X.Q., Wei, Y.Q., 2008.Hiding Algorithm of Digital Image Sharing Based on LSB.Computer Engineering and Design, 29(23):6167-6170(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-SJSJ200823076.htm [62] Wang, J.Y., 2009.Development of Geographic Information System and Developing Geographic Information System.Engineering Science, 11(2):10-16(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-GCKX200902004.htm [63] Wang, Q.S., Zhu, C.Q., Xu, D.H., 2011.Watermarking Algorithm for Vector Geo-Spatial Data Based on DFT Phase.Geomatics and Information Science of Wuhan University, 36(5):523-526(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-WHCH201105005.htm [64] Wang, X., Huang, D.J., Zhang, Z.Y., 2012.A Robust Zero-Watermarking Algorithm for Vector Digital Maps Based on Statistical Characteristics.Journal of Software, 7(10):2349-2356. https://doi.org/10.4304/jsw.7.10.2349-2356 [65] Wang, Y.F., Zhao, J., Cui, W.H., et al., 2012.A Vector Data Watermarking Algorithm Based on Minimum Quadtree Division.Computer Engineering, 38(22):111-113(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJC201222029.htm [66] Wang, Y.Y., Yang, C.S., Zhu, C.Q., et al., 2018a.An Efficient Robust Multiple Watermarking Algorithm for Vector Geographic Data.Information, 9(12):296. https://doi.org/10.3390/info9120296 [67] Wang, Y.Y., Yang, C.S., Zhu, C.Q., 2018b.A Multiple Watermarking Algorithm for Vector Geographic Data Based on Coordinate Mapping and Domain Subdivision.Multimedia Tools and Applications, 77(15):19261-19279. https://doi.org/10.1007/s11042-017-5358-6 [68] Wen, C.C., Wang, Q., Miao, X.N., et al., 2012.Digital Image Encryption:A Survey.Computer Science, 39(12):6-9(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-JSJA201212003.htm [69] Wen, Z.C., Guo, J.Z., Ai, B., et al., 2013.Application of Information Hiding Techniques to Geospatial Data Security.Engineering of Surveying and Mapping, 22(3):65-68(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-CHGC201303018.htm [70] Wendzel, S., Zander, S., Fechner, B., et al., 2015.Pattern-Based Survey and Categorization of Network Covert Channel Techniques.ACM Computing Surveys, 47(3):1-26. https://doi.org/10.1145/2684195 [71] Wu, F.Q., Cui, W.H., Chen, H.W., 2008.A Compound Chaos-Based Encryption Algorithm for Vector Geographic Data under Network Circumstance.2008 Congress on Image and Signal Processing.IEEE, Sanya, China, 254-258.https://doi.org/10.1109/cisp.2008.86 [72] Wu, X.Q., Zhang, L., 2008.Research on Vector Data Encryption Method Based on Chaotic System and GPS.Journal of Kunming University of Science and Technology (Science and Technology), 33(4):119-122(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-KMLG200804029.htm [73] Xi, X., Zhang, X.C., Liang, W.D., et al., 2019.Dual Zero-Watermarking Scheme for Two-Dimensional Vector Map Based on Delaunay Triangle Mesh and Singular Value Decomposition.Applied Sciences, 9(4):642. https://doi.org/10.3390/app9040642 [74] Xia, Z.H., Wang, X.H., Sun, X.M., et al., 2016.Steganalysis of LSB Matching Using Differences between Nonadjacent Pixels.Multimedia Tools and Applications, 75(4):1947-1962. https://doi.org/10.1007/s11042-014-2381-8 [75] Xie, Y.C., Lin, Y.Q., Li, Y., 2010.New Improvement of Douglas-Peucker Algorithm in Non-Topology Vector Data Compression.Computer Applications and Software, 27(1):141-144(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-JYRJ201001045.htm [76] Xu, D.H., Wang, Q.S., Zhu, C.Q., 2008.Watermarking Algorithm for Vector Geo-Spatial Data Based on Amplitude of DFT Domain.Science of Surveying and Mapping, 33(5):129-131(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-CHKD200805045.htm [77] Xue, S., Wang, G.X., Guo, J.Z., et al., 2017.An Encryption Algorithm for High Precision Vector Map Based on Layered Compression.Journal of Geomatics Science and Technology, 34(5):535-540(in Chinese with English abstract). http://www.zhangqiaokeyan.com/academic-journal-cn_journal-geomatics-science-technology_thesis/0201252546395.html [78] Yang, C.S., Zhu, C.Q., Wang, Y.Y., 2011.Self-Detection Watermarking Algorithm and Its Application to Vector Geo-Spatial Data.Geomatics and Information Science of Wuhan University, 36(12):1402-1405(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-WHCH201112004.htm [79] Yang, M.M., Wang, H., 2008.Discuss on Key Technique of Public Map Compiling Based on Fundamental Geographic Information Data.Geomatics Technology and Equipment, 10(2):5-7(in Chinese with English abstract). [80] Yao, C., Tang, Z.G., Li, H.Z., et al., 2016.Covert Channels of FTP Protocol Based on Encoding Directory.Computer Engineering and Design, 37(11):2944-2948(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-SJSJ201611016.htm [81] Yue, D.J., Mei, H., 2007.Processing of Vectorization Error to Scanned Map Based on Least Squares Collocation Method.Science of Surveying and Mapping, 32(2):51-53(in Chinese with English abstract). http://www.en.cnki.com.cn/Article_en/CJFDTOTAL-CHKD200702017.htm [82] Zeeshan, M., Ullah, S., Anayat, S., et al., 2017.A Review Study on Unique Way of Information Hiding:Steganography.International Journal on Data Science and Technology, 3(5):45. https://doi.org/10.11648/j.ijdst.20170305.11 [83] Zeng, D.Y., Yan, H.W., Niu, L.T., et al., 2013.A Non-Blind Digital Watermarking Algorithm for Vector Map Data.Journal of Lanzhou Jiaotong University, 32(4):176-180(in Chinese with English abstract). http://www.en.cnki.com.cn/Article_en/CJFDTotal-LZTX201304040.htm [84] Zhang, G.R., Yin, J., 2006.Privacy Preserving Clustering by Isometric Transformation.Application Research of Computers, 23(10):95-97(in Chinese with English abstract). http://d.wanfangdata.com.cn/Periodical_jsjyyyj200607028.aspx [85] Zhang, H.L., Wang, Q.S., Zou, Y.C., 2012.Encryption of Vector Data Based on Composite Chaotic System.Science of Surveying and Mapping, 37(5):87-89(in Chinese with English abstract). http://www.en.cnki.com.cn/Article_en/CJFDTOTAL-CHKD201205028.htm [86] Zhang, L.J., Li, A.B., Lü, G.N., et al., 2008.Study on Adaptive Watermark of GIS Vector Data.Geo-Information Science, 10(6):6724-6729(in Chinese with English abstract). http://www.oalib.com/paper/1553901 [87] Zhang, L.M., Yan, H.W., Qi, J.X., et al., 2015.DFT Domain Watermarking Algorithm for Point Data Based on Grid Partitioning.Journal of Lanzhou Jiaotong University, 34(4):166-172(in Chinese with English abstract). http://www.en.cnki.com.cn/Article_en/CJFDTotal-LZTX201504032.htm [88] Zhang, Y., Qin, C., Zhang, W.M., et al., 2018.On the Fault-Tolerant Performance for a Class of Robust Image Steganography.Signal Processing, 146:99-111. https://doi.org/10.1016/j.sigpro.2018.01.011 [89] Zhang, Z.L., Xu, J.Y., 2011.An Improvement of Image Scrambling Method Based on Gravity Model.Techniques of Automation and Applications, 30(10):45-47(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-ZDHJ201110014.htm [90] Zhao, Y.X., Li, G., Li, L., 2007.Electronic Chart Encryption Method Based on Chaotic Stream Cipher.Journal of Harbin Engineering University, 28(1):60-64(in Chinese with English abstract). http://www.sciencedirect.com/science/article/pii/S0960077905012257 [91] Zheng, L.B., You, F.C., 2009.A Fragile Digital Watermark Used to Verify the Integrity of Vector Map.2009 International Conference on E-Business and Information System Security.IEEE, Wuhan, China, 1-4.https://doi.org/10.1109/ebiss.2009.5137869 [92] Zhong, S.P., Gao, Q.S., 2004a.Practical Map Encryption Algorithm Based on Chaos System under Network Circumstance.Journal of Computer Aided Design & Computer Graphics, 16(2):238-242(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJF200402016.htm [93] Zhong, S.P., Gao, Q.S., 2004b.An Efficient Lossless Compression Algorithm for a Kind of Two-Dimension Vector Maps. Acta Simulata Systematica Sinica, 16(10):2189-2194(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-XTFZ20041000I.htm [94] Zhong, S.P., Liu, Z.F., Chen, Q.J., 2009.Reversible Watermarking Algorithm for Vector Maps Using the Difference Expansion Method of a Composite Integer Transform.Journal of Computer-Aided Design & Computer Graphics, 21(12):1839-1849(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJF200912022.htm [95] Zhou, C.H., 2015.Prospects on Pan-Spatial Information System.Progress in Geography, 34(2):129-131(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-DLKJ201502001.htm [96] Zhou, L., Hu, Y.J., Zeng, H.F., 2009.Reversible Data Hiding Algorithm for Vector Digital Maps.Journal of Computer Applications, 29(4):990-993(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JSJY200904026.htm [97] Zhou, L.N., Lü, X.Y., 2019.The Review of Information Hiding Technology Based on GAN Image Generation.Journal of Information Security Research, 5(9):771-777(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTotal-XAQY201909002.htm [98] Zhu, C.Q., 2015.Research on the Policy and Law of Geographic Information Security in China.Science Press, Beijing(in Chinese). [99] Zhu, C.Q., 2017.Research Progresses in Digital Watermarking and Encryption Control for Geographical Data.Acta Geodaetica et Cartographica Sinica, 46(10):1609-1619 (in Chinese with English abstract). http://www.ingentaconnect.com/content/doaj/10011595/2017/00000046/00000010/art00041 [100] Zhu, F.X., Miao, L.M., Liu, W., 2014.Research on Vessel Trajectory Multi-Dimensional Compression Algorithm Based on Douglas-Peucker Theory.Applied Mechanics and Materials, 694:59-62. https://doi.org/10.4028/www.scientific.net/amm.694.59 [101] Zhu, Y.F., Zhang, G., 2015.Geospatial Data Encryption Based on Logistic Map.Computer Applications and Software, 32(12):310-312(in Chinese with English abstract). http://en.cnki.com.cn/Article_en/CJFDTOTAL-JYRJ201512074.htm [102] Zope-Chaudhari, S., Venkatachalam, P., Mohan, K., 2017.Copyright Protection of Vector Data Using Vector Watermark.2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS).IEEE, Fort Worth, TX, USA, 6110-6113. https://doi.org/10.1109/igarss.2017.8128403 [103] 曹阳, 肖菁, 张文才, 2016.基于零水印和可逆水印的矢量地图多重水印算法.华南师范大学学报(自然科学版), 48(3):69-74. https://www.cnki.com.cn/Article/CJFDTOTAL-HNSF201603012.htm [104] 车森, 邓术军, 2008.基于双重网格的矢量地图数字水印算法.海洋测绘, 28(1):13-17. https://www.cnki.com.cn/Article/CJFDTOTAL-HYCH200801006.htm [105] 崔翰川, 2013.面向共享的矢量地理数据安全关键技术研究(博士学位论文).南京: 南京师范大学. [106] 邓韬, 2009.基于变换域的二维工程图加密技术研究(硕士学位论文).长沙: 湖南大学. [107] 傅宏, 2010.公众版地图地理要素脱密处理方法.地理空间信息, 8(4):133-134. https://www.cnki.com.cn/Article/CJFDTOTAL-DXKJ201004045.htm [108] 何冰, 2010.基于LSB的抗旋转攻击鲁棒性数字水印算法.系统仿真技术, 6(4):304-307. https://www.cnki.com.cn/Article/CJFDTOTAL-XTFJ201004010.htm [109] 胡春杰, 2017.基于混沌理论的空域图像加密算法研究(硕士学位论文).南京: 南京信息工程大学. [110] 康健, 王黔驹, 颜世强, 2012.1:25万公众版地形图应用于1:25万地质图的技术方法研究与探讨.中国地质, 39(4):1087-1093. https://www.cnki.com.cn/Article/CJFDTOTAL-DIZI201204026.htm [111] 李安波, 王海荣, 周卫, 2015.基于二维混沌系统的矢量数字地图置乱加密.中国矿业大学学报, 44(4):747-753. https://www.cnki.com.cn/Article/CJFDTOTAL-ZGKD201504023.htm [112] 李光师, 孟祥茹, 2012.Oracle中矢量数据安全保护方法.计算机工程, 38(10):102-104. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJC201210032.htm [113] 李彦峰, 丁丽萍, 吴敬征, 等, 2019.网络隐蔽信道关键技术研究综述.软件学报, 30(8):2470-2490. https://www.cnki.com.cn/Article/CJFDTOTAL-RJXB201908014.htm [114] 梁伟东, 张新长, 奚旭, 等, 2018.基于零水印与脆弱水印的矢量地理数据多重水印算法.中山大学学报(自然科学版), 57(4):1-8. https://www.cnki.com.cn/Article/CJFDTOTAL-ZSDZ201804001.htm [115] 刘正, 2017.矢量地图数据加密技术研究(硕士学位论文).哈尔滨: 哈尔滨工程大学. [116] 娄嘉鹏, 张萌, 付鹏, 等, 2016.一种基于TCP协议的网络隐蔽传输方案设计.信息网络安全, (1):34-39. https://www.cnki.com.cn/Article/CJFDTOTAL-XXAQ201601007.htm [117] 吕海洋, 周卫, 盛业华, 等, 2017.拓扑保形的矢量地理数据几何脱密方法.中国矿业大学学报, 46(3):648-654. https://www.cnki.com.cn/Article/CJFDTOTAL-ZGKD201703026.htm [118] 彭晓艳, 龙毅, 毋河海, 2002.基于仿射变换的MapInfo矢量图形坐标纠正的方法探讨.测绘信息与工程, 27(5):6-7. https://www.cnki.com.cn/Article/CJFDTOTAL-CHXG200205002.htm [119] 屈静, 鲍远律, 2006.交通矢量地图离散非线性校正算法.计算机仿真, 23(5):77-80. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJZ200605022.htm [120] 任娜, 吴维, 朱长青, 等, 2015.一种抗要素删除的矢量地理数据精确认证算法.地理与地理信息科学, 31(4):43-46. https://www.cnki.com.cn/Article/CJFDTOTAL-DLGT201504009.htm [121] 孙鸿睿, 朱建军, 尹鹏程, 等, 2012.一种基于矢量地图特征点和分块的零水印算法.地理与地理信息科学, 28(4):111-112. https://www.cnki.com.cn/Article/CJFDTOTAL-DLGT201204026.htm [122] 孙俞超, 2017.矢量地图水印技术在地理信息管理中的应用研究(硕士学位论文).延吉: 延边大学. [123] 孙俞超, 李德, 2017.基于节点特征的矢量地图零水印算法.地理与地理信息科学, 33(3):17-21. https://www.cnki.com.cn/Article/CJFDTOTAL-DLGT201703004.htm [124] 汤永利, 张亚萍, 叶青, 等, 2017.基于DWT域对数量化索引调制的数字水印算法.计算机应用与软件, 34(8):206-212. https://www.cnki.com.cn/Article/CJFDTOTAL-JYRJ201708037.htm [125] 王海荣, 2014.矢量地理数据的置乱加密方法及置乱性能评测(硕士学位论文).南京: 南京师范大学. [126] 王宏伟, 2012.常德市地理信息平台中地图数据的处理方法.测绘与空间地理信息, 35(6):144-147. https://www.cnki.com.cn/Article/CJFDTOTAL-DBCH201206044.htm [127] 王继军, 张显全, 韦月琼, 2008.基于LSB的数字图像分存隐藏算法.计算机工程与设计, 29(23):6167-6170. https://www.cnki.com.cn/Article/CJFDTOTAL-SJSJ200823076.htm [128] 王家耀, 2009.地理信息系统的发展与发展中的地理信息系统.中国工程科学, 11(2):10-16. https://www.cnki.com.cn/Article/CJFDTOTAL-GCKX200902004.htm [129] 王奇胜, 朱长青, 许德合, 2011.利用DFT相位的矢量地理空间数据水印方法.武汉大学学报(信息科学版), 36(5):523-526. https://www.cnki.com.cn/Article/CJFDTOTAL-WHCH201105005.htm [130] 王云飞, 赵婧, 崔伟宏, 等, 2012.一种基于最小四叉树划分的矢量数据水印算法.计算机工程, 38(22):111-113. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJC201222029.htm [131] 文昌辞, 王沁, 苗晓宁, 等, 2012.数字图像加密综述.计算机科学, 39(12):6-9. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJA201212003.htm [132] 文志成, 郭建忠, 艾彬, 等, 2013.信息隐藏技术在地理空间数据安全中的应用.测绘工程, 22(3):65-68. https://www.cnki.com.cn/Article/CJFDTOTAL-CHGC201303018.htm [133] 吴学群, 张凌, 2008.基于混沌和GPS的矢量数据加密方法的研究.昆明理工大学学报(理工版), 33(4):119-122. https://www.cnki.com.cn/Article/CJFDTOTAL-KMLG200804029.htm [134] 谢亦才, 林渝淇, 李岩, 2010.Douglas-Peucker算法在无拓扑矢量数据压缩中的新改进.计算机应用与软件, 27(1):141-144. https://www.cnki.com.cn/Article/CJFDTOTAL-JYRJ201001045.htm [135] 许德合, 王奇胜, 朱长青, 2008.基于DFT幅度的矢量地理空间数据数字水印算法.测绘科学, 33(5):129-131. https://www.cnki.com.cn/Article/CJFDTOTAL-CHKD200805045.htm [136] 薛帅, 王光霞, 郭建忠, 等, 2017.一种分层压缩的高精度矢量地图加密方法.测绘科学技术学报, 34(5):535-540. https://www.cnki.com.cn/Article/CJFDTOTAL-JFJC201705019.htm [137] 杨成松, 朱长青, 王莹莹, 2011.矢量地理数据自检测水印算法及其应用研究.武汉大学学报(信息科学版), 36(12):1402-1405. https://www.cnki.com.cn/Article/CJFDTOTAL-WHCH201112004.htm [138] 杨梦梅, 王辉, 2008.利用基础地理信息数据编制公开版地图的关键技术探讨.测绘技术装备, 10(2):5-7. https://www.cnki.com.cn/Article/CJFDTOTAL-CHKJ200802001.htm [139] 姚诚, 唐彰国, 李焕洲, 等, 2016.基于FTP目录编码的隐蔽信道.计算机工程与设计, 37(11):2944-2948. https://www.cnki.com.cn/Article/CJFDTOTAL-SJSJ201611016.htm [140] 岳东杰, 梅红, 2007.地图扫描矢量化误差的最小二乘配置法处理研究.测绘科学, 32(2):51-53. https://www.cnki.com.cn/Article/CJFDTOTAL-CHKD200702017.htm [141] 曾端阳, 闫浩文, 牛莉婷, 等, 2013.矢量地图的一种非盲数字水印算法.兰州交通大学学报, 32(4):176-180. https://www.cnki.com.cn/Article/CJFDTOTAL-LZTX201304040.htm [142] 张国荣, 印鉴, 2006.应用正交变换保护数据中的隐私信息.计算机应用研究, 23(10):95-97. https://www.cnki.com.cn/Article/CJFDTOTAL-JSYJ200610032.htm [143] 张翰林, 王青山, 邹永初, 2012.复合混沌系统的矢量数据加密研究.测绘科学, 37(5):87-89. https://www.cnki.com.cn/Article/CJFDTOTAL-CHKD201205028.htm [144] 张丽娟, 李安波, 闾国年, 等, 2008.GIS矢量数据的自适应水印研究.地球信息科学, 10(6):6724-6729. https://www.cnki.com.cn/Article/CJFDTOTAL-DQXX200806008.htm [145] 张黎明, 闫浩文, 齐建勋, 等, 2015.一种网格划分的点数据DFT域盲水印算法.兰州交通大学学报, 34(4):166-172. https://www.cnki.com.cn/Article/CJFDTOTAL-LZTX201504032.htm [146] 张泽麟, 徐金玉, 2011.改进的基于万有引力模型的图像置乱方法.自动化技术与应用, 30(10):45-47. https://www.cnki.com.cn/Article/CJFDTOTAL-ZDHJ201110014.htm [147] 赵玉新, 李刚, 李磊, 2007.基于混沌流密码体制的电子海图数据加密方法.哈尔滨工程大学学报, 28(1):60-64. https://www.cnki.com.cn/Article/CJFDTOTAL-HEBG200701013.htm [148] 钟尚平, 高庆狮, 2004a.网络环境下地图的混沌加密实用算法.计算机辅助设计与图形学学报, 16(2):238-242. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJF200402016.htm [149] 钟尚平, 高庆狮, 2004b.一类矢量地图的无损压缩算法.系统仿真学报, 16(10):2189-2194. https://www.cnki.com.cn/Article/CJFDTOTAL-XTFZ20041000I.htm [150] 钟尚平, 刘志峰, 陈群杰, 2009.采用复合整数变换差值扩大法的矢量地图可逆水印算法.计算机辅助设计与图形学学报, 21(12):1839-1849. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJF200912022.htm [151] 周成虎, 2015.全空间地理信息系统展望.地理科学进展, 34(2):129-131. https://www.cnki.com.cn/Article/CJFDTOTAL-DLKJ201502001.htm [152] 周琳娜, 吕欣一, 2019.基于GAN图像生成的信息隐藏技术综述.信息安全研究, 5(9):771-777. https://www.cnki.com.cn/Article/CJFDTOTAL-XAQY201909002.htm [153] 周璐, 胡永健, 曾华飞, 2009.用于矢量数字地图的可逆数据隐藏算法.计算机应用, 29(4):990-993. https://www.cnki.com.cn/Article/CJFDTOTAL-JSJY200904026.htm [154] 朱长青, 2015.中国地理信息安全的政策和法律研究.北京:科学出版社. [155] 朱长青, 2017.地理数据数字水印和加密控制技术研究进展.测绘学报, 46(10):1609-1619. https://www.cnki.com.cn/Article/CJFDTOTAL-CHXB201710043.htm [156] 朱颖芳, 张贵, 2015.基于Logistic映射的地理空间数据加密.计算机应用与软件, 32(12):310-312. https://www.cnki.com.cn/Article/CJFDTOTAL-JYRJ201512074.htm