Skip to main content

GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects

  • Conference paper
  • First Online:
Information Security Applications (WISA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10144))

Included in the following conference series:

  • 1282 Accesses

Abstract

Recently years, vector map is used in many applications and on/off-line services widely. The cost of production of vector map data is very expensive but it is stolen or copied easily by pirates without permission from the original providers. Therefore, provider desires vector map data should be encrypted before storing and transmitting to ensure the access control and prevent the illegal copying of vector map. In this paper, we proposed a perceptual encryption scheme for vector map using geometric objects. The geometric objects of vector map data is extracted to compute features as bounding boxes and distance vectors. After that, we encrypted those features and use them to compute and obtain encrypted vector map data. Experimental results is verified that the entire vector map is changed after encryption process. The proposed method is very effective for a large of dataset, responsive to requirements of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Foote, K.E., Lynch, M.: Geographic Information Systems as an Integrating Technology Context, Concepts, and Definitions (2014). Last revised

    Google Scholar 

  2. Goodchild, M.F.: Twenty years of progress: GIS science in 2010. J. Spat. Inf. Sci. 1, 3–20 (2010)

    Google Scholar 

  3. Bertino, E., Damiani, M.L.: A controlled access to spatial data on web. In: Proceedings of Conference on Geographic Information Science, pp. 369–377 (2004)

    Google Scholar 

  4. Chena, S.C., Wangb, X., Rishea, N., Weiss, M.A.: A web-based spatial data access system using semantic R-trees. J. Inform. Sci. 167, 41–61 (2003)

    Article  MathSciNet  Google Scholar 

  5. Rybalov, N.B., Zhukovsky, O.I.: Access to the spatial data in the web-oriented GIS. In: Proceedings of Siberian Conference on Control and Communications, pp. 104–107 (2007)

    Google Scholar 

  6. Bertino, E., Thuraisingham, B., Gertz, M., Damiani, M.L.: Security and privacy for geospatial data: concepts and research directions. In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, pp. 6–19 (2008)

    Google Scholar 

  7. Fuguang, M., Yong, G., Menglong, Y., Fuchun, X., Ding, L.: The fine-grained security access control of spatial data. In: Proceedings of the 18th International Conference on Geoinformatics, pp. 1–4 (2010)

    Google Scholar 

  8. Wu, F., Cui, W., Chen, H.: A compound chaos-based encryption algorithm for vector geographic data under network circumstance. In: Proceedings of Cardholder Information Security Program, vol. 1, pp. 254–258 (2008)

    Google Scholar 

  9. Li, G.: Research of key technologies on encrypting vector spatial data in Oracle spatial. In: Proceedings of International Conference on Industrial Electronics and Computer Science, pp. 1–4 (2010)

    Google Scholar 

  10. Dakroury, Y., El-ghafar, I.A., Tammam, A.: Protecting GIS data using cryptography and digital watermarking. J. Comput. Sci. Netw. Secur. 10, 75–84 (2010)

    Google Scholar 

  11. Giao, P.N., Kwon, G.C., Lee, S.H., Kwon, K.R.: Selective encryption algorithm based on DCT for GIS vector map. J. Korea Multimedia Soc. 17, 769–777 (2014)

    Article  Google Scholar 

  12. Giao, P.N., Lee, S.H., Kwon, K.R.: Selective encryption algorithm for GIS vector map using geometric objects. J. Secur. Appl. 9, 61–72 (2015)

    Google Scholar 

  13. Environmental Systems Research Institute: An ESRI White Paper: ESRI Shape-file Technical Description, USA (1998)

    Google Scholar 

  14. RSA Laboratories: PKCS #5 v2.1: Password-Based Cryptography Standard (2006)

    Google Scholar 

Download references

Acknowledgements

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2014R1A1A4A01006663).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ki-Ryong Kwon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Giao, P.N., Lee, SH., Moon, KS., Kwon, KR. (2017). GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects. In: Choi, D., Guilley, S. (eds) Information Security Applications. WISA 2016. Lecture Notes in Computer Science(), vol 10144. Springer, Cham. https://doi.org/10.1007/978-3-319-56549-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56549-1_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56548-4

  • Online ISBN: 978-3-319-56549-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics