Abstract

In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.

Highlights

  • GIS vector maps are used in applications in many fields, such as science, navigation, and online or offline digital map services

  • In order to meet the issues above, we propose an encryption algorithm for GIS vector map data in this paper

  • The proposed algorithm was applied to the polylines and polygons of the vector maps

Read more

Summary

Introduction

GIS vector maps are used in applications in many fields, such as science, navigation, and online or offline digital map services. The main intent of the proposed algorithm is to extract geometric objects (polylines and polygons) from GIS vector maps in order to encrypt them.

Vector Map Data Security
Vector
The In
Random Encryption
Decryption Process
Experimental Results and Analysis
Visualization Experiments
Security Evaluation
Computation
Experimental results showed that the proposed
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call