2014
DOI: 10.9717/kmms.2014.17.7.769
|View full text |Cite
|
Sign up to set email alerts
|

Selective Encryption Algorithm Based on DCT for GIS Vector Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 1 publication
0
3
0
1
Order By: Relevance
“…The encryption approach proposed by Li [32] secures conventional database-based spatial data within an Oracle spatial database. Approaches for protecting spatial files during storage and transfer include those focusing on vector-based files [25,[33][34][35][36][37] and those focusing on general spatial files [31]. For instance, Dakroury et al [31] propose a combination of encryption and digital watermarking techniques, while Ghaleb et al [38] propose an encryption module for the QGIS software to prevent users from making unauthorised copies of the original data.…”
Section: Security and Usability Concerns For Spatial Files Within Ent...mentioning
confidence: 99%
“…The encryption approach proposed by Li [32] secures conventional database-based spatial data within an Oracle spatial database. Approaches for protecting spatial files during storage and transfer include those focusing on vector-based files [25,[33][34][35][36][37] and those focusing on general spatial files [31]. For instance, Dakroury et al [31] propose a combination of encryption and digital watermarking techniques, while Ghaleb et al [38] propose an encryption module for the QGIS software to prevent users from making unauthorised copies of the original data.…”
Section: Security and Usability Concerns For Spatial Files Within Ent...mentioning
confidence: 99%
“…Therefore, to measure the computation time we need to use specific mathematical model. In this section we just show the dependence of computation time and we compared result with Giao's algorithm [20,21] under same the total number of objects, as shown in Fig. 12.…”
Section: Computation Timementioning
confidence: 99%
“…We compare the properties of the proposed method with the existing encryption method [20,21]authors use DCT transform for GIS vector map encryption. In these papers, authors select all vertices in a layer and encrypt them by random algorithm in DCT domain, they did not consider important part in each layer.…”
Section: Algorithm Comparisonmentioning
confidence: 99%
“…Цель второй задачи -обнаружить поддельные картографические данные или поддельный фрагмент карты. Для решения этих задач в основном используются криптографические средства (цифровые подписи) [9,11], а также цифровые водяные знаки (ЦВЗ) [2,3].…”
Section: Introductionunclassified