[go: up one dir, main page]

CN104077535A - Graphic information system (GIS) vector data local decryption and restoring method - Google Patents

Graphic information system (GIS) vector data local decryption and restoring method Download PDF

Info

Publication number
CN104077535A
CN104077535A CN201410275757.1A CN201410275757A CN104077535A CN 104077535 A CN104077535 A CN 104077535A CN 201410275757 A CN201410275757 A CN 201410275757A CN 104077535 A CN104077535 A CN 104077535A
Authority
CN
China
Prior art keywords
decryptdecryption
point
reference mark
delta
csrbfnet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410275757.1A
Other languages
Chinese (zh)
Other versions
CN104077535B (en
Inventor
周卫
储征伟
李彬彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201410275757.1A priority Critical patent/CN104077535B/en
Publication of CN104077535A publication Critical patent/CN104077535A/en
Application granted granted Critical
Publication of CN104077535B publication Critical patent/CN104077535B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Image Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了一种GIS矢量数据局部脱密与恢复方法,包括如下过程:(1)通过局部脱密控制点计算脱密参数,并迭代参数以控制脱密区域的中误差;(2)根据局部脱密参数对局部要素进行脱密;(3)根据局部脱密参数对脱密后的局部要素进行恢复。本发明的方法具有局部脱密变形渐进、脱密控制点精确变换和脱密区域紧支撑的特点,可以满足GIS矢量数据局部脱密处理以对外发布使用的需求。

The invention discloses a local decryption and recovery method of GIS vector data, which includes the following process: (1) calculate the decryption parameters through the local decryption control points, and iterate the parameters to control the medium error in the decryption area; (2) according to The local declassification parameters are used to declassify the local elements; (3) according to the local declassification parameters, the declassified local elements are restored. The method of the present invention has the characteristics of progressive partial declassification deformation, precise transformation of declassification control points and tight support of densification areas, and can meet the requirement of local declassification processing of GIS vector data for external release and use.

Description

The local DecryptDecryption of a kind of GIS vector data and restoration methods
Technical field
The invention belongs to geography information security fields, be specifically related to the local DecryptDecryption of a kind of GIS vector data and restoration methods.
Background technology
Restrictive condition and the secure contents of file to open map and geography information such as " regulation of Surveying Management Work state secret scope ", " open map content representation supplementary provisions (trying) " and " regulation (trying) of Fundamental Geographic Information System demonstration content " have been made regulation, and the confidentiality of the spatial position precision of lay special stress on Fundamental Geographic Information System and relevant factor.
Common facility and responsive facility have different positional accuracy index requests.To local sensitivity key element carry out local geometric precision DecryptDecryption need to be by its accurate DecryptDecryption to target location to meet positional accuracy requirement.In addition when responsive key element is carried out to local DecryptDecryption, should not exert an influence to the key element outside certain limit, i.e. the tight support performance of local DecryptDecryption.Existing local DecryptDecryption model adopts sectional pattern conventionally, will be on a large scale map partitioning among a small circle, re-use the model such as polynomial expression or rubber transformation of page and carry out Local treatment, be generally difficult to meet reference mark and accurately convert, convert evenly asymptotic and three demands of the tight support of deformed region.
Summary of the invention
The present invention is directed to the defect that the local DecryptDecryption model of existing GIS vector data exists, propose a kind of local DecryptDecryption method of GIS vector data based on Compactly supported radial basis function, have the advantages that distortion is progressive, reference mark accurately converts and deformed region tightly supports.
The technical solution used in the present invention is as follows:
The local DecryptDecryption of a kind of GIS vector data and restoration methods, comprise following process:
(1) key generative process
Step 11: determine DecryptDecryption scope
The minimum boundary rectangle RECTANGLE in input DecryptDecryption region, wherein, rectangle RECTANGLE lower left corner coordinate is (x min, y min), upper right corner coordinate is (x max, y max), obtain data directions X length X L and Y-direction length YL according to formula (1);
XL = X max - X min YL = Y max - Y min - - - ( 1 )
Step 12: specified data reference mark and DecryptDecryption converted quantity
Input source reference mark set fromPoints={ (Fx i, Fy i) | i=1,2 ... k} and target control point set toPoints={ (Tx i, Ty i) | i=1,2 ..., k} forms k dominating pair of vertices, meets the condition that does not all contain coincide point in reference mark, source set fromPoints and target control point set toPoints;
Step 13: the radius of influence R of determining each DecryptDecryption reference mark according to formula (2);
R ≥ 100 × max ( ( Tx i - Fx i ) 2 + ( Ty i - Fy i ) 2 ) - - - ( 2 )
Step 14: training Compactly supported radial basis function neural network model
A) selecting single order tightly to support basis function as output function Φ, is c (c for center x, c y) basis function, it is at data point p iplace is output as:
Select the distance of Euclidean distance computational data point p and center c;
dis tan ce ( p , c ) = | | p - c | | = ( p x - c x ) 2 + ( p y - c y ) 2 - - - ( 4 )
B) with reference mark, source set fromPoints coordinate (Fx i, Fy i) as input layer X, DecryptDecryption converted quantity (Tx i-Fx i, Ty i-Fy i) as output layer learning sample y, the individual hidden node of k is as the center c={ (Fx of basis function in hidden layer i, Fy i) | i=1,2 ... k}, each basis function is got identical R value, the output composition matrix H of k hidden node, and hidden layer to the neuron between output layer connects weights W, set up Compactly supported radial basis function neural network CSRBFnet, meet the interpolation condition of formula (5);
y=HW (5)
C) utilize least square method to calculate weights W by formula (6), W is 2*k matrix;
W=H -1y (6)
D) within the scope of minimum boundary rectangle RECTANGLE, evenly choose m*n sample point composition sample point S set amplePoints={ (Sx j, Sy j) | j=1,2 ..., num}, wherein m is directions X sample point quantity, n is Y-direction sample point quantity, m>=3, n>=3, num=m*n; Travel through sample point S set amplePoints, calculate the disturbance quantity of each sample point according to formula (7), generate sample point disturbance quantity S set amplePoints '={ (Sx j', Sy j') | j=1,2 ..., num};
Sx i = Σ l = 1 k w 1 l Φ l ( dis tan ce ( X i , c l ) ) Sy i = Σ l = 1 k w 2 l Φ l ( dis tan ce ( X i , c l ) ) - - - ( 7 )
E) according to error RMSE in formula (8) calculating;
RMSE = Σ ( s x i 2 + s y i 2 ) num - - - ( 8 )
If f) | offset/RMSE-1|>0.01, do not meet the requirement of input data global transformation amount offest, use the radius of influence R at the each DecryptDecryption of formula (9) iteration reference mark to carry out convergent-divergent with error of centralization RMSE, circulation step b-e, until | offset/RMSE-1|<=0.01, for having resolved;
R = R &times; offset RMSE - - - ( 9 )
D) use radius of influence R and the weight matrix W at reference mark, source set fromPoints, target control point set toPoints, each DecryptDecryption reference mark to form DecryptDecryption parameter K ey, use RSA Algorithm to carry out asymmetric encryption and deposit key file Key.txt in key K ey;
(2) local DecryptDecryption process
Step 21: read DecryptDecryption parameter K ey, after using RSA Algorithm deciphering, extract key K ey, the radius of influence R and the weight matrix W that obtain reference mark, source set fromPoints, target control point set toPoints, each DecryptDecryption reference mark, set up DecryptDecryption Compactly supported radial basis function neural network CSRBFnet;
Step 22: open and treat DecryptDecryption vector data D, extract the key element point coordinate of vector data D, obtain key element point coordinate set P={ (x j, y j) | j=1,2 ..., k}, wherein k is the some number that key element comprises;
Step 23: by the Compactly supported radial basis function neural network CSRBFnet having set up, according to each point coordinate p in formula (10) computational element point coordinate set P j(x j, y j) through changes in coordinates amount (the Δ x after DecryptDecryption conversion j, Δ y j);
&Delta; x j = CSRBFnet x ( p j ) = &Sigma; l = 1 k w 1 l &Phi; l ( dis tan ce ( p j , c l ) ) &Delta; y j = CSRBFnet y ( p j ) = &Sigma; l = 1 k w 2 l &Phi; l ( dis tan ce ( p j , c l ) ) - - - ( 10 )
Step 24: DecryptDecryption changes in coordinates amount is applied to point coordinate p according to formula (11) j, obtain point coordinate set P '={ (x j', y j') | j=1,2 ..., k};
x j &prime; = x j + &Delta; x j y j &prime; = y j + &Delta; y j - - - ( 11 )
Step 25: circulation step 23 and 24, until all key elements are disposed, preserve the data file DF after local DecryptDecryption;
(3) local recovery's process
Step 31: read key file Key.txt, after using RSA Algorithm deciphering, extract key K ey, obtain reference mark, source and the set of target control point, radius of influence R and the weight matrix W at each local DecryptDecryption reference mark, set up DecryptDecryption Compactly supported radial basis function neural network CSRBFnet;
Step 32: open the data DF after DecryptDecryption, extract the key element point coordinate of vector data DF, obtain key element point coordinate set the P '={ (Px after DecryptDecryption i', Py i') | i=1,2 ..., k}.And the DecryptDecryption converted quantity of supposing each point is Δ i={ (Δ x i, Δ y i) | i=1,2 ..., k}, initial value is 0;
Step 33: according to formula (12), by p '-Δ p' substitution neural network CSRBFnet, upgrades the DecryptDecryption converted quantity Δ of each point i(Δ x i, Δ y i);
&Delta; x i = P x i &prime; - CSRBFnet x ( p i &prime; - &Delta; i ) &Delta; y i = P y i &prime; - CSRBFnet y ( p i &prime; - &Delta; i ) - - - ( 12 )
Step 34: specification error limit value ∈, if the Δ after upgrading imeet formula (13), be considered as having recovered, otherwise repeating step 33;
P x i &prime; - CSRBFnet x ( p i &prime; - &Delta; i ) - &Delta;x i < &Element; y i &prime; - CSRBFnet y ( p i &prime; - &Delta; i ) - &Delta;y i < &Element; - - - ( 13 )
Step 35: repeating step 33 and 34, process successively each key element, the data file RF after saving/restoring.
The present invention proposes a kind of method of carrying out local DecryptDecryption and recovery for GIS vector data.This method is being safeguarded under the prerequisite that vector data topological relation is constant, DecryptDecryption reference mark accurately can be transformed to target control point, ensures the tight support performance in DecryptDecryption region simultaneously, can meet the local DecryptDecryption of GIS vector data and process externally to issue user demand.
Brief description of the drawings
Fig. 1 is key product process figure in the technology of the present invention;
Fig. 2 is the local DecryptDecryption process flow diagram of data in the technology of the present invention;
Fig. 3 is Data Recovery Process figure after local DecryptDecryption in the technology of the present invention;
Fig. 4 is the original vector data that the embodiment of the present invention is selected;
Fig. 5 is the design sketch of data stack after raw data and local DecryptDecryption in the embodiment of the present invention;
Fig. 6 is the local amplification effect figure of data stack after raw data and local DecryptDecryption in the embodiment of the present invention;
Fig. 7 is the design sketch that recovers data stack in the embodiment of the present invention after raw data and local DecryptDecryption.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further details.
The present embodiment is selected shapefile form vector data, to data read, DecryptDecryption and recovery operation, further describe the present invention.The present embodiment selects the shapefile face figure layer data (as Fig. 4) in a certain area as original vector data.
(1) key generative process
Step 11: determine DecryptDecryption scope, the minimum boundary rectangle RECTANGLE in input DecryptDecryption region, RECTANGLE lower left corner coordinate is (164417.097000,162667.721400), upper right corner coordinate is (171415.635650,167846.074000), obtain data directions X length X L=6998.53865m, Y-direction length YL=5178.3526m;
Step 12: input reference mark, 6 pairs of sources and the set of target control point;
Step 13: determine the radius of influence R at each local DecryptDecryption reference mark, select R=3000m;
Step 14: training radial basis function neural network, concrete steps are as follows:
A) select single order tightly to support basis function as output function Φ;
B) with fromPoints coordinate (Fx i, Fy i) as input layer X, DecryptDecryption converted quantity (Tx i-Fx i, Ty i-Fy i) as output layer learning sample y, 6 hidden nodes are as the center c={ (Fx of basis function in hidden layer i, Fy i) | i=1,2 ... 6}, each basis function is got identical radius of influence R, and each basis function is output as H, and hidden layer to the neuron between output layer connects weights W, sets up radial basis function neural network CSRBFnet;
C) calculate weights W=[-0.68576558 2.24318105 1.30650649-0.924589651.0799589 1.09748868 by formula (6); 3.21258749 0.86481197-0.68393027 3.34310239-1.41045726-1.1620549];
D) within the scope of minimum boundary rectangle RECTANGLE, evenly choose 50*50 sample point composition sample point S set amplePoints={ (Sx j, Sy j) | j=1,2 ..., 2500}, travels through sample point S set amplePoints, calculates the disturbance quantity of each sample point according to formula (4), generates sample point disturbance quantity set SamplePoints '={ (Sx j', Sy j') | j=1,2 ..., 2500};
E) according to error RMSE=0.849401552583 in formula (8) calculating;
F), due to | offset/RMSE-1|>0.01, need radius of influence R=4158.10214553 at the local DecryptDecryption of iteration reference mark.Then circulation step b-e, R=3706.05059411 after iteration 2 times, RMSE=0.993166516737, satisfies condition, and obtains final weight matrix W=[-1.84601557 2.76989104 0.95848037-2.20952748 1.79216251 1.80692918; 4.42896143-0.15784362-1.20732732 4.89798742-2.70956928-2.02686662];
G) use radius of influence R and the weight matrix W at reference mark, source, the set of target control point, local DecryptDecryption reference mark to form local DecryptDecryption parameter K ey;
(2) local DecryptDecryption process
Step 21: read DecryptDecryption parameter K ey, after using RSA Algorithm deciphering, extract key K ey, the radius of influence R and the weight matrix W that obtain reference mark, source set fromPoints, target control point set toPoints, each DecryptDecryption reference mark, set up DecryptDecryption Compactly supported radial basis function neural network CSRBFnet;
Step 22: open original vector data D, extract the key element point coordinate of vector data D, obtain key element point coordinate set P={ (x j, y j) | j=1,2 ..., k}, wherein k is the some number that key element comprises, and describes for example below with 1 p (167131.647,164958.147) in P;
Step 23: set up Compactly supported radial basis function neural network CSRBFnet according to key K ey, calculate each point coordinate p in P set by formula (10) j(x j, y j) variable quantity (Δ x j, Δ y j), the variable quantity of some p is (1.19198160762,2.25882888931);
Step 24: according to formula (11), DecryptDecryption changes in coordinates amount is applied to P, obtains point coordinate set P ', the DecryptDecryption recoil of some p is designated as (167132.838982,164960.405829);
Step 25: circulation step 23 and 24, until all key elements are disposed, preserve the data file DF after local DecryptDecryption;
(3) local recovery's process
Step 31: read key file Key.txt, after using RSA Algorithm deciphering, extract key K ey, obtain reference mark, source and the set of target control point, the radius of influence R at each DecryptDecryption reference mark and weight matrix W, set up local DecryptDecryption Compactly supported radial basis function neural network CSRBFnet;
Step 32: open the data DF after DecryptDecryption, extract the key element point coordinate of vector data DF, obtain key element point coordinate set the P '={ (Px after DecryptDecryption i', Py i') | i=1,2 ..., k}.And the DecryptDecryption converted quantity of supposing each point is Δ i={ (Δ x i, Δ y i) | i=1,2 ..., k}, initial value is 0, below with 1 p ' (167132.838982,164960.405829) in P ' for example describes, Δ p'=(0,0);
Step 33: according to formula 12, by p '-Δ p' substitution RBFnet, the DecryptDecryption converted quantity Δ of renewal p ' p'=(1.19416476507,2.25919063147);
Step 34: get and recover precision ∈=0.01m, the Δ after renewal ido not meet 13, the 2 Δs of formula p'=(1.1919782225,2.25883077318), meet formula 13, be considered as having recovered;
Step 35: repeating step 33 and 34, process successively each key element, the data file RF after saving/restoring.
In the embodiment of the present invention, only carry out DecryptDecryption and recovery operation as an example of shp formatted data example, the method also can be used for the extended formatting vector datas such as Geodatabase.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention.Obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if these amendments of the present invention and within modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification interior.

Claims (1)

1. the local DecryptDecryption of GIS vector data and a restoration methods, comprises following process:
(1) key generative process
Step 11: determine DecryptDecryption scope
The minimum boundary rectangle RECTANGLE in input DecryptDecryption region, wherein, rectangle RECTANGLE lower left corner coordinate is (x min, y min), upper right corner coordinate is (x nax, y max), obtain data directions X length X L and Y-direction length YL according to formula (1);
XL = X max - X min YL = Y max - Y min - - - ( 1 )
Step 12: specified data reference mark and DecryptDecryption converted quantity
Input source reference mark set fromPoints={ (Fx i, Fy i) | i=1,2 ... k} and target control point set toPoints={ (Tx i, Ty i) | i=1,2 ..., k} forms k dominating pair of vertices, meets the condition that does not all contain coincide point in reference mark, source set fromPoints and target control point set toPoints;
Step 13: the radius of influence R of determining each DecryptDecryption reference mark according to formula (2);
R &GreaterEqual; 100 &times; max ( ( Tx i - Fx i ) 2 + ( Ty i - Fy i ) 2 ) - - - ( 2 )
Step 14: training Compactly supported radial basis function neural network model
A) selecting single order tightly to support basis function as output function Φ, is c (c for center x, c y) basis function, it is at data point p iplace is output as:
Select the distance of Euclidean distance computational data point p and center c;
dis tan ce ( p , c ) = | | p - c | | = ( p x - c x ) 2 + ( p y - c y ) 2 - - - ( 4 )
B) with reference mark, source set fromPoints coordinate (Fx i, Fy i) as input layer X, DecryptDecryption converted quantity (Tx i-Fx i, Ty i-Fy i) as output layer learning sample y, the individual hidden node of k is as the center c={ (Fx of basis function in hidden layer i, Fy i) | i=1,2 ... k}, each basis function is got identical R value, the output composition matrix H of k hidden node, and hidden layer to the neuron between output layer connects weights W, set up Compactly supported radial basis function neural network CSRBFnet, meet the interpolation condition of formula (5);
y=HW (5)
C) utilize least square method to calculate weights W by formula (6), W is 2*k matrix;
W=H -1y (6)
D) within the scope of minimum boundary rectangle RECTANGLE, evenly choose m*n sample point composition sample point S set amplePoints={ (Sx j, Sy j) | j=1,2 ..., num}, wherein m is directions X sample point quantity, n is Y-direction sample point quantity, m>=3, n>=3, num=m*n; Travel through sample point S set amplePoints, calculate the disturbance quantity of each sample point according to formula (7), generate sample point disturbance quantity S set amplePoints '={ (Sx j', Sy j') | j=1,2 ..., num};
Sx i = &Sigma; l = 1 k w 1 l &Phi; l ( dis tan ce ( X i , c l ) ) Sy i = &Sigma; l = 1 k w 2 l &Phi; l ( dis tan ce ( X i , c l ) ) - - - ( 7 )
E) according to error RMSE in formula (8) calculating;
RMSE = &Sigma; ( s x i 2 + s y i 2 ) num - - - ( 8 )
If f) | offset/RMSE-1|>0.01, do not meet the requirement of input data global transformation amount offest, use the radius of influence R at the each DecryptDecryption of formula (9) iteration reference mark to carry out convergent-divergent with error of centralization RMSE, circulation step b-e, until | offset/RNSE-1|<=0.01, for having resolved;
R = R &times; offset RMSE - - - ( 9 )
D) use radius of influence R and the weight matrix W at reference mark, source set fromPoints, target control point set toPoints, each DecryptDecryption reference mark to form DecryptDecryption parameter K ey, use RSA Algorithm to carry out asymmetric encryption and deposit key file Key.txt in key K ey;
(2) local DecryptDecryption process
Step 21: read DecryptDecryption parameter K ey, after using RSA Algorithm deciphering, extract key K ey, the radius of influence R and the weight matrix W that obtain reference mark, source set fromPoints, target control point set toPoints, each DecryptDecryption reference mark, set up DecryptDecryption Compactly supported radial basis function neural network CSRBFnet;
Step 22: open and treat DecryptDecryption vector data D, extract the key element point coordinate of vector data D, obtain key element point coordinate set P={ (x i, y i) | j=1,2 ..., k}, wherein k is the some number that key element comprises;
Step 23: by the Compactly supported radial basis function neural network CSRBFnet having set up, according to each point coordinate p in formula (10) computational element point coordinate set P j(x j, y j) through changes in coordinates amount (the Δ x after DecryptDecryption conversion j, Δ y j);
&Delta; x j = CSRBFnet x ( p j ) = &Sigma; l = 1 k w 1 l &Phi; l ( dis tan ce ( p j , c l ) ) &Delta; y j = CSRBFnet y ( p j ) = &Sigma; l = 1 k w 2 l &Phi; l ( dis tan ce ( p j , c l ) ) - - - ( 10 )
Step 24: DecryptDecryption changes in coordinates amount is applied to point coordinate p according to formula (11) j, obtain point coordinate set P '={ (x j', y j') | j=1,2 ..., k};
x j &prime; = x j + &Delta; x j y j &prime; = y j + &Delta; y j - - - ( 11 )
Step 25: circulation step 23 and 24, until all key elements are disposed, preserve the data file DF after local DecryptDecryption;
(3) local recovery's process
Step 31: read key file Key.txt, after using RSA Algorithm deciphering, extract key K ey, obtain reference mark, source and the set of target control point, radius of influence R and the weight matrix W at each local DecryptDecryption reference mark, set up DecryptDecryption Compactly supported radial basis function neural network CSRBFnet;
Step 32: open the data DF after DecryptDecryption, extract the key element point coordinate of vector data DF, obtain key element point coordinate set the P '={ (x after DecryptDecryption j', y j') | j=1,2 ..., k}; And the DecryptDecryption converted quantity of supposing each point is Δ i={ (Δ x i, Δ y i) | i=1,2 ..., k}, initial value is 0;
Step 33: according to formula (12), by p '-Δ p' substitution neural network CSRBFnet, upgrades the DecryptDecryption converted quantity Δ of each point i(Δ x i, Δ y i);
&Delta; x i = P x i &prime; - CSRBFnet x ( p i &prime; - &Delta; i ) &Delta; y i = P y i &prime; - CSRBFnet y ( p i &prime; - &Delta; i ) - - - ( 12 )
Step 34: specification error limit value ∈, if the Δ after upgrading imeet formula (13), be considered as having recovered, otherwise repeating step 33;
P x i &prime; - CSRBFnet x ( p i &prime; - &Delta; i ) - &Delta;x i < &Element; y i &prime; - CSRBFnet y ( p i &prime; - &Delta; i ) - &Delta;y i < &Element; - - - ( 13 )
Step 35: repeating step 33 and 34, process successively each key element, the data file RF after saving/restoring.
CN201410275757.1A 2014-06-19 2014-06-19 Graphic information system (GIS) vector data local decryption and restoring method Expired - Fee Related CN104077535B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410275757.1A CN104077535B (en) 2014-06-19 2014-06-19 Graphic information system (GIS) vector data local decryption and restoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410275757.1A CN104077535B (en) 2014-06-19 2014-06-19 Graphic information system (GIS) vector data local decryption and restoring method

Publications (2)

Publication Number Publication Date
CN104077535A true CN104077535A (en) 2014-10-01
CN104077535B CN104077535B (en) 2017-01-25

Family

ID=51598785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410275757.1A Expired - Fee Related CN104077535B (en) 2014-06-19 2014-06-19 Graphic information system (GIS) vector data local decryption and restoring method

Country Status (1)

Country Link
CN (1) CN104077535B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203170A (en) * 2016-07-19 2016-12-07 北京同余科技有限公司 The Database Dynamic desensitization method of servicing of based role and system
CN108090369A (en) * 2017-12-29 2018-05-29 南京师范大学 One kind is based on the polynomial GIS vector data DecryptDecryptions of Chebyshev and restoration methods
CN109002724A (en) * 2018-06-07 2018-12-14 南京师范大学 A kind of part DEM DecryptDecryption and restoration methods based on Compactly supported radial basis function

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574561B2 (en) * 2001-03-30 2003-06-03 The University Of North Florida Emergency management system
CN102332079A (en) * 2011-09-16 2012-01-25 南京师范大学 GIS Vector Data Camouflage and Restoration Method Based on Error Random Interference
CN103067159A (en) * 2012-12-28 2013-04-24 南京师范大学 Geographic information system (GIS) vector data reversible decryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574561B2 (en) * 2001-03-30 2003-06-03 The University Of North Florida Emergency management system
CN102332079A (en) * 2011-09-16 2012-01-25 南京师范大学 GIS Vector Data Camouflage and Restoration Method Based on Error Random Interference
CN103067159A (en) * 2012-12-28 2013-04-24 南京师范大学 Geographic information system (GIS) vector data reversible decryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
傅宏: "公众版地图地理要素脱密处理方法", 《地理空间信息》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203170A (en) * 2016-07-19 2016-12-07 北京同余科技有限公司 The Database Dynamic desensitization method of servicing of based role and system
CN108090369A (en) * 2017-12-29 2018-05-29 南京师范大学 One kind is based on the polynomial GIS vector data DecryptDecryptions of Chebyshev and restoration methods
CN108090369B (en) * 2017-12-29 2021-06-08 南京师范大学 A Decryption and Restoration Method of GIS Vector Data Based on Chebyshev Polynomial
CN109002724A (en) * 2018-06-07 2018-12-14 南京师范大学 A kind of part DEM DecryptDecryption and restoration methods based on Compactly supported radial basis function
CN109002724B (en) * 2018-06-07 2021-03-23 南京师范大学 DEM local decryption and recovery method based on tight support radial basis function

Also Published As

Publication number Publication date
CN104077535B (en) 2017-01-25

Similar Documents

Publication Publication Date Title
Kim et al. Isogeometric contact analysis using mortar method
Dobrev et al. Curvilinear finite elements for Lagrangian hydrodynamics
Leung et al. A grid based particle method for moving interface problems
CN104077536A (en) Radial basis function based GIS (Geographic Information System) vector data reversible decryption method
Feng et al. Analytically-integrated radial integration BEM for solving three-dimensional transient heat conduction problems
JP5830004B2 (en) 3D model generation apparatus, 3D model generation method, and 3D model generation program
Jia et al. An adaptive isogeometric analysis collocation method with a recovery-based error estimator
Ahn et al. Computing the discrete Fréchet distance with imprecise input
Liu et al. A combined approach to cartographic displacement for buildings based on skeleton and improved elastic beam algorithm
CN103067159B (en) A kind of reversible DecryptDecryption method of GIS vector data
CN106778347B (en) A Reversible Decryption Method of Vector Raster Geographic Data Based on Trigonometric Functions
CN104077535A (en) Graphic information system (GIS) vector data local decryption and restoring method
Ramonell et al. Open‐source terrestrial laser scanner for the virtualization of geometrical entities in AEC classrooms
Zhang et al. Total least-squares estimation for 2D affine coordinate transformation with constraints on physical parameters
Wu Numerical simulation of flows past multiple cylinders using the hybrid local domain free discretization and immersed boundary method
Han Noniterative approach for solving the indirect problems of linear reference frame transformations
Gottlieb Spectral methods for compressible plow problems
Moon et al. Improved method for increasing maintenance efficiency of construction structure using augmented reality by marker-less method
Liu et al. A global maximum error controller-based method for linearization point selection in trajectory piecewise-linear model order reduction
Jin et al. Partial total-least-squares adjustment of condition equations with application to a rectangular building adjustment in a GIS
Wang Highly efficient selective assembly method of horizontal stabilizer based on metamodeling and particle swarm optimization
Schwentner et al. Fully Coupled, Higher‐Order, Block‐Structured Mesh Generation in Fluid–Structure Interaction
JP5777506B2 (en) Analysis apparatus and simulation method
Park et al. The planning and design of urban streams based on 3D terrain modelling
Koci et al. Techniques for Least-Squares Fitting of Curves and Surfaces to a Large Set of Points

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170125

Termination date: 20190619

CF01 Termination of patent right due to non-payment of annual fee