2015
DOI: 10.9717/kmms.2015.18.7.818
|View full text |Cite
|
Sign up to set email alerts
|

Selective Encryption Scheme for Vector Map Data using Chaotic Map

Abstract: With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…The importance of security in the field of vector map encryption is already well known. Some selective encryption algorithms (Bang et al 2015, Pham et al 2016) that consider security have also been presented. These algorithms can encrypt parts of objects with the chaos mechanism (Bang et al 2015(Bang et al , 2016 or AES algorithm Rijmen 1999, Pham et al 2019), which enable partial extraction of the map without decrypting the entire map.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The importance of security in the field of vector map encryption is already well known. Some selective encryption algorithms (Bang et al 2015, Pham et al 2016) that consider security have also been presented. These algorithms can encrypt parts of objects with the chaos mechanism (Bang et al 2015(Bang et al , 2016 or AES algorithm Rijmen 1999, Pham et al 2019), which enable partial extraction of the map without decrypting the entire map.…”
Section: Introductionmentioning
confidence: 99%
“…Some selective encryption algorithms (Bang et al 2015, Pham et al 2016) that consider security have also been presented. These algorithms can encrypt parts of objects with the chaos mechanism (Bang et al 2015(Bang et al , 2016 or AES algorithm Rijmen 1999, Pham et al 2019), which enable partial extraction of the map without decrypting the entire map. However, certain selective encryption algorithms (Bang et al 2015(Bang et al , 2016 did not propose security evaluations.…”
Section: Introductionmentioning
confidence: 99%
“…The data scrambling technique generally refers to adding perturbation data to map coordinates, thereby reducing map accuracy and perturbing data display. Van et al (2017) and Bang et al (2015) respectively proposed scrambling schemes for the coordinate points of geographic elements in the vector map. Both of them are based on the idea of selective encryption.…”
Section: Related Workmentioning
confidence: 99%
“…Bang et al [14] proposed a selective encryption method for vector map data based on a chaotic map in the frequency of discrete wavelet transform (DWT); however, this method only selects some objects and encrypts DC (Direct Current) values in the DWT domain by a common secret key. This method is very simple and weak because it does not encrypt all contents of vector maps and uses a common key.…”
Section: Vector Map Data Securitymentioning
confidence: 99%
“…Consequently, GIS vector map data protection is necessary to prevent illegal duplication and distribution. GIS vector map security includes copyright protection [2][3][4], access control for users, and vector map data encryption in order to prevent attacks or illegal distribution during storage and transmission, and damage in the integration process of geographical information [5][6][7][8][9][10][11][12][13][14]. However, access control on the Web is unable to prevent attacks or illegal duplication and distribution, and watermarking techniques are only useful in identifying ownership and for copyright protection, while unauthorized users should not be able to see, attack, or extract GIS vector map content.…”
Section: Introductionmentioning
confidence: 99%