Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3584714.3589126acmotherconferencesArticle/Chapter ViewAbstractPublication PagescswConference Proceedingsconference-collections
research-article

A New Declassification Method for Vector Geographic Data

Published: 07 September 2023 Publication History

Abstract

With the acceleration of urbanization, society has entered an era of data explosion. It is difficult to balance confidentiality and sharing in the application of vector geographic data. Based on this, this paper proposes a method for declassifying vector geographic data which balances confidentiality and sharing. Firstly, a declassification model is constructed to ensure the sharing of vector geographic data, in other words, the declassification of classified data. Secondly, digital fingerprint technology is used to enable copyright protection of declassified data. Finally, verify whether the proposed method can give consideration to both confidentiality and sharing after declassifying vector geographic data. The experiments show: The proposed method can declassify the geometric precision of vector geographic data, and the declassified data can maintain a good graphical form and spatial relationship with good usability. And a reference for the balance between confidentiality and sharing is provided, which safeguards the safe use of vector geographic data in the urbanization process.

References

[1]
Jiayao Wang (2010). Development Trends of Cartography and Geographic Information Engineering[J]. Acta Geodaetica et Cartographica Sinica, 39 (02): 115-119+128.
[2]
Chang-qing Zhu, Na REN, Zi-chen ZHOU, (2020). Research Status and Prospect of Security Technology for Geographic Big Data[J]. Modern Surveying and Mapping, 43(06): 9-13.
[3]
Xiaolong Wang, Haowen Yan, Liming Zhang, (2021). An encryption algorithm for vector maps based on the Gaussian random and Haar transform, Journal of Spatial Science.
[4]
Xiaolong Wang, Haowen Yan, Liming Zhang (2021). Vector Map Encryption Algorithm Based on Double Random Position Permutation Strategy. ISPRS Int. J. Geo-Inf 2021, 10, 311.
[5]
Wei Xiong(2010). Analysis on the Pros and Cons of the Secrecy of Surveying and Mapping Achievament. Geomatcs&Spatial information technology . 33(5): 218-220.
[6]
Anbo Li, Ying Chen, Mengmeng Yao, (2018). Quantitative Measurement of Geometrical Information for Sensitive Features in Secret-related Vector Digital Maps [J]. Journal of Geo-information Science, 20(01): 7-16. (in chinese).
[7]
Department of Natural Resources(2021). Executive Office of the Department of Natural Resources on the promotion of geographic information processing technology and service notifications. [2021]22, 2021-02-09. (in chinese).
[8]
Wei Zhou, Changqing Zhu, Weidong Wu (2015). Review of the Security Features of Geographic Information[J]. Bulletin of Surveying and Mapping, 2015(10): 122-125. (in chinese).
[9]
National Imagery and Mapping Agency(2003). Open street map contents of certain provisions[Z]. State Test words[2003]1, 2003-05-09. (in chinese).
[10]
National Imagery and Mapping Agency(2009). Open street map contents of the supplementary provisions ( for Trial Implementation ) [Z]. State Test words[2009]2, 2009-01-23. (in chinese).
[11]
Xinnian Ma(2017). Research on Evaluation of Anti-attack Description Model of Vector Geographic Data[D]. College of Geographical Science.(in chinese).
[12]
Shi-gui Nie, Mei Liu, Hui-na Wang(2012). A Decryption Processing Method on Spatial Data in Jiangsu Provincial Public Service Platform Based on ArcGIS[J]. Modern Surveying and Mapping, 35(06): 42-44. (in chinese).
[13]
Donghua Jiang, Wei Zhou(2018). Decryption Model for Vector Geographic Data Based on Chebyshev Polynomials[J]. Journal of Geomatics Science and Technology, 35(03): 321-325. (in chinese).
[14]
Hui Yu, Wei Zhou, Xinnian Ma(2017). A Reversible Decryption Model for Vector and Raster Integration Based on Trigonometric Function[J]. Bulletin of Surveying and Mapping, 2017(10): 89-94.((in chinese).
[15]
Wei Zhou, Nan Yan(2016). A method of GIS vector data off reversible Key[P]. CN103067159B, 2016-03-02. (in chinese).
[16]
Liming Zhang, Haowen Yan, Jiancun Qi, (2015). A Blind Watermarking Algorithm for Copyright Protection of Vector Geospatial Data Under Controllable Errors Based on DFT[J]. Geomatics and Information Science of Wuhan University, 40(07): 990-994. (in chinese).
[17]
Shuwang Lu, Yan Wang, Zhen-Hua Liu(2004). A Survey of Digital Fingerprinting[J]. Journal of the Graduate School of the Chinese Academy of Sciences, 2004(03): 289-298. (in chinese).
[18]
Yi-xian Yang, Xin-xin Niu(2002). Review of multi-media information camouflage[J]. journal of china institute of communications, 2002(05): 32-38. (in chinese).
[19]
Anbo Li, Xuerong Wu, Xianli Xie, (2016). A precision alterable declassification technique for vector geo-data[J]. Journal of China University of Mining &Technology, 45(05): 1050-1057. (in chinese).
[20]
Jinping Chen, Liming Zhang, Meirong Jiang(2020). A collusion-based vector spatial data fingerprinting scheme[J]. Science of Surveying and Mappjng, 45 (01) : 149-156. (in chinese).
[21]
Chen, Brian and Gregory W. Wornell(2001). “Quantizati on index modulation: A class of provably good methods for digital watermarking and information embedding.” IEEE Trans. Inf. Theory 47: 1423-1443.

Index Terms

  1. A New Declassification Method for Vector Geographic Data
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSW '22: Proceedings of the 2022 International Conference on Cyber Security
      December 2022
      77 pages
      ISBN:9798400700132
      DOI:10.1145/3584714
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 September 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Data Sharing Security
      2. Key words: Geographic Information Security, Vector Geographic Data
      3. declassification

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      CSW 2022

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 12
        Total Downloads
      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 27 Nov 2024

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media