测绘学报 ›› 2022, Vol. 51 ›› Issue (6): 1017-1028.doi: 10.11947/j.AGCS.2022.20220172
朱长青1,2,3, 任娜1,2,3, 徐鼎捷1,2,3
收稿日期:
2022-03-06
修回日期:
2022-04-07
发布日期:
2022-07-02
通讯作者:
任娜
E-mail:renna1026@163.com
作者简介:
朱长青(1962-),男,教授,博士生导师,研究方向为空间数据安全、空间数据不确定性等。E-mail:zcq88@263.net
基金资助:
ZHU Changqing1,2,3, REN Na1,2,3, XU Dingjie1,2,3
Received:
2022-03-06
Revised:
2022-04-07
Published:
2022-07-02
Supported by:
摘要: 随着地理信息应用的深入,精度高、涉密广的地理信息安全保护要求与现阶段经济发展对地理信息共享需求的矛盾日益尖锐,如何在安全的前提下促进地理信息最大程度的共享已成为目前迫切需要解决的重要问题,亟须可靠的技术保护地理信息安全。本文综述了近几年来地理信息安全技术的进展,包括将数据转变为密文的加密技术、具有版权保护和溯源追踪作用的数字水印技术、能够控制时间和权限的安全控制技术、可以降低数据精度和删除涉密属性的保密处理技术以及防止篡改和可认证的区块链技术。然后,论述了地理信息安全技术在地理信息安全防护中的应用。最后,展望了地理信息安全技术的未来发展方向和进一步需要解决的关键问题。
中图分类号:
朱长青, 任娜, 徐鼎捷. 地理信息安全技术研究进展与展望[J]. 测绘学报, 2022, 51(6): 1017-1028.
ZHU Changqing, REN Na, XU Dingjie. Geo-information security technology: progress and prospects[J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(6): 1017-1028.
[1] 朱长青. 地理数据数字水印和加密控制技术研究进展[J]. 测绘学报, 2017, 46(10):1609-1619. DOI:10.11947/j.AGCS.2017.20170301. ZHU Changqing. Research progresses in digital watermarking and encryption control for geographical data[J]. Acta Geodaetica et Cartographica Sinica, 2017, 46(10):1609-1619. DOI:10.11947/j.AGCS.2017.20170301. [2] CHUNG Y H. A spread random interleaver based efficient DES algorithm for personal cloud computing environments[J]. Journal of the Korea Institute of Information and Communication Engineering, 2013, 17(1):41-48. [3] WADI S M, ZAINAL N. High definition image encryption algorithm based on AES modification[J]. Wireless Personal Communications, 2014, 79(2):811-829. [4] 陈志伟, 杜敏, 杨亚涛, 等. 基于RSA和Paillier的同态云计算方案[J]. 计算机工程, 2013, 39(7):35-39. CHEN Zhiwei, DU Min, YANG Yatao, et al. Homomorphic cloud computing scheme based on RSA and Paillier[J]. Computer Engineering, 2013, 39(7):35-39. [5] 赵友刚, 李伟民. 椭圆曲线公钥密码[J]. 莱阳农学院学报, 2005, 22(1):75-77. ZHAO Yougang, LI Weimin. Elliptic curve public-key cryptosystem[J]. Journal of Laiyang Agricultural College, 2005, 22(1):75-77. [6] 崔翰川. 面向共享的矢量地理数据安全关键技术研究[D]. 南京:南京师范大学, 2013. CUI Hanchuan. Research on the sharing security of vector geography data[D]. Nanjing:Nanjing Normal University, 2013. [7] 张姗姗. 矢量图形数据的网络传输加密算法研究[D]. 武汉:武汉大学, 2005. ZHANG Shanshan. Research on the algorithm of encryption in network transmission of vector graphic data[D]. Wuhan:Wuhan University, 2005. [8] 张翰林, 王青山, 邹永初. 复合混沌系统的矢量数据加密研究[J]. 测绘科学, 2012, 37(5):87-89. ZHANG Hanlin, WANG Qingshan, ZOU Yongchu. Encryption of vector data based on composite chaotic System[J]. Science of Surveying and Mapping, 2012, 37(5):87-89. [9] 王海荣. 矢量地理数据的置乱加密方法及置乱性能评测[D]. 南京:南京师范大学, 2014. WANG Hairong. Scrambling encryption methods and scrambling performance evaluation for vector geographic data[D]. Nanjing:Nanjing Normal University, 2014. [10] 吴雪荣, 李安波, 吴赛松, 等. 基于席尔宾斯基垫片的GIS矢量数据置乱方法[J]. 测绘科学, 2015, 40(9):102-106, 124. WU Xuerong, LI Anbo, WU Saisong, et al. Scrambling transformation of GIS line/polygon layer vector data based on Sierpinski Gasket[J]. Science of Surveying and Mapping, 2015, 40(9):102-106, 124. [11] SANG Jun, LUO Hongling, ZHAO Jun, et al. Image encryption with chaotic map and Arnold transform in the gyrator transform domains[C]//Proceedings of 2017 Pattern Recognition and Tracking. Anaheim, CA, USA:SPIE, 2017:164-171. [12] JANG B J, LEE S H, KWON K R. Perceptual encryption with compression for secure vector map data processing[J]. Digital Signal Processing, 2014, 25:224-243. [13] PHAM G N, NGO S T, BUI A N, et al. Vector map random encryption algorithm based on multi-scale simplification and Gaussian distribution[J]. Applied Sciences, 2019, 9(22):4889. [14] NGOC G P, MOON K S, LEE S H, et al. GIS map encryption algorithm for drone security based on geographical features[C]//2016 International Conference on Computational Science and Computational Intelligence (CSCI). Las Vegas, NV:IEEE, 2016:1422-1423. [15] 李光师. 基于GML的地理信息共享系统的加密方法研究[J]. 鞍山师范学院学报, 2012, 14(4):61-64. LI Guangshi Research on encryption method of the geographic information sharing system based on GML[J]. Journal of Anshan Normal University, 2012, 14(4):61-64. [16] 刘波, 严俊, 姚茂华. 地理信息安全加密系统的实现与应用[J]. 测绘通报, 2017(2):106-108, 137. DOI:10.13474/j.cnki.11-2246.2017.0060. LIU Bo, YAN Jun, YAO Maohua. Implementation and application of geographical information security encryption system[J]. Bulletin of Surveying and Mapping, 2017(2):106-108, 137. DOI:10.13474/j.cnki.11-2246.2017.0060. [17] WANG Yingying, YANG Chengsong, REN Na, et al. An adaptive watermark detection algorithm for vector geographic data[J]. KSII Transactions on Internet and Information Systems, 2020, 14(1):323-343. [18] TONG Deyu, REN Na, ZHU Changqing. Secure and robust watermarking algorithm for remote sensing images based on compressive sensing[J]. Multimedia Tools and Applications, 2019, 78(12):16053-16076. [19] PENG Zhiyong, YUE Mingliang, WU Xia, et al. Blind watermarking scheme for polylines in vector geo-spatial data[J]. Multimedia Tools and Applications, 2015, 74(24):11721-11739. [20] LEE S H, HUO Xiaojiao, KWON K R. Vector watermarking method for digital map protection using arc length distribution[J]. IEICE Transactions on Information and Systems, 2014, E97.D(1):34-42. [21] YANG Chengsong, ZHU Changqing, WANG Yingying, et al. A robust watermarking algorithm for vector geographic data based on Qim and matching detection[J]. Multimedia Tools and Applications, 2020, 79(41):30709-30733. [22] WANG Nana, ZHAO Xiangjun. 2D vector map data hiding with directional relations preservation between points[J]. AEU-International Journal of Electronics and Communications, 2017, 71:118-124. [23] TONG Deyu, ZHU Changqing, REN Na, et al. High-capacity and robust watermarking scheme for small-scale vector data[J]. KSII Transactions on Internet and Information Systems, 2019, 13(12):6190-6213. [24] AMHAR F, GIRI E P, SILALAHI F E S, et al. Ownership protection on Digital Elevation Model (DEM) using transform-based watermarking[J]. ISPRS International Journal of Geo-Information, 2022, 11(3):200. [25] 朱长青, 任娜. 一种基于伪随机序列和DCT的遥感影像水印算法[J]. 武汉大学学报(信息科学版), 2011, 36(12):1427-1429. ZHU Changqing, REN Na. An algorithm for digital watermark based on pseudo-random sequence and DCT for remote sensing image[J]. Geomatics and Information Science of Wuhan University, 2011, 36(12):1427-1429. [26] YUAN Guanghui, HAO Qi. Digital watermarking secure scheme for remote sensing image protection[J]. China Communications, 2020, 17(4):88-98. [27] XI Xu, ZHANG Xinchang, SUN Ying, et al. Topology-preserving and geometric feature-correction watermarking of vector maps[J]. IEEE Access, 2020, 8:33428-33441. [28] 秦如贞, 张黎明, 伍庭晨, 等. 结合ASIFT和归一化的抗仿射变换遥感影像盲水印算法[J]. 地球信息科学学报, 2021, 23(10):1882-1891. QIN Ruzhen, ZHANG Liming, WU Tingchen, et al. A blind watermarking algorithm for remote sensing image based on anti-affine transformation combining ASIFT and normalization[J]. Journal of Geo-Information Science, 2021, 23(10):1882-1891. [29] REN Na, ZHAO Yazhou, ZHU Changqing, et al. Copyright protection based on zero watermarking and blockchain for vector maps[J]. ISPRS International Journal of Geo-Information, 2021, 10(5):294. [30] PENG Fei, JIANG Wenyan, QI Ying, et al. Separable robust reversible watermarking in encrypted 2D vector graphics[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8):2391-2405. [31] REN Na, ZHOU Qifei, ZHU Changqing, et al. A lossless watermarking algorithm based on line pairs for vector data[J]. IEEE Access, 2020(8):156727-156739. [32] ZHOU Qifei, REN Na, ZHU Changqing, et al. Blind digital watermarking algorithm against projection transformation for vector geographic data[J]. ISPRS International Journal of Geo-Information, 2020, 9(11):692. [33] ZHOU Qifei, REN Na, ZHU Changqing, et al. Storage feature-based watermarking algorithm with coordinate values preservation for vector line data[J]. KSII Transactions on Internet and Information Systems, 2018, 12(7):3475-3496. [34] ZHOU Qifei, ZHU Changqing, REN Na, et al. Zero watermarking algorithm for vector geographic data based on the number of neighboring features[J]. Symmetry, 2021, 13(2):208. [35] XING Siming, LI Tongyi, LIANG Jing. A zero-watermark hybrid algorithm for remote sensing images based on DCT and DFT[J]. Journal of Physics:Conference Series, 2021, 1952(2):022049. [36] CAO Liujuan, MEN Chaoguang, GAO Yue. A recursive embedding algorithm towards lossless 2D vector map watermarking[J]. Digital Signal Processing, 2013, 23(3):912-918. [37] 孙俞超, 李德. 基于节点特征的矢量地图零水印算法[J]. 地理与地理信息科学, 2017, 33(3):17-21. SUN Yuchao, LI De. Vector map zero-watermark algorithm based on node feature[J]. Geography and Geo-Information Science, 2017, 33(3):17-21. [38] XI Xu, ZHANG Xinchang, LIANG Weidong, et al. Dual zero-watermarking scheme for two-dimensional vector map based on Delaunay triangle mesh and singular value decomposition[J]. Applied Sciences, 2019, 9(4):642. [39] KATZENBEISSER S. First summary report on hybrid systems[R]. ECRYPT-European Network of Excellence in Cryptology, 2005. [40] LIU Hong, XIAO Di, ZHANG Rui, et al. Robust and hierarchical watermarking of encrypted images based on compressive sensing[J]. Signal Processing:Image Communication, 2016, 45:41-51. [41] EL-MAHALLAWY M S, HAGRAS E A, ELDIN A Z, et al. Robust blind and secure biometric watermarking based on partial multi-map chaotic encryption[C]//Proceedings of 2011 IFIP International Conference on New Technologies, Mobility and Security. Paris, France:IEEE, 2011:1-5. [42] BENRHOUMA O, MANNAI O, HERMASSI H. Digital images watermarking and partial encryption based on DWT transformation and chaotic maps[C]//Proceedings of 2015 IEEE International Multi-Conference on Systems, Signals & Devices (SSD15). Mahdia, Tunisia:IEEE, 2015:1-6. [43] CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing:Image Communication, 2011, 26(1):1-12. [44] 李玉, 张黎明, 王昊, 等. 运用同态加密的高分遥感影像交换密码水印算法[J]. 激光与光电子学进展, 2022, 59(18):1815012. LI Yu, ZHANG Liming, WANG Hao, et al. Commutative encryption and watermarking algorithm for high-resolution remote sensing images based on homomorphic encryption[J]. Laser & Optoelectronics Progress, 2022, 59(18):1815012. [45] GUO Jianting, ZHENG Peijia, HUANG Jiwu. Secure watermarking scheme against watermark attacks in the encrypted domain[J]. Journal of Visual Communication and Image Representation, 2015, 30:125-135. [46] JANG B J, LEE S H, LEE E J, et al. A crypto-marking method for secure vector map[J]. Multimedia Tools and Applications, 2017, 76(14):16011-16044. [47] SCHMITZ R, LI Shujun, GRECOS C, et al. Towards robust invariant commutative watermarking-encryption based on image histograms[J]. International Journal of Multimedia Data Engineering and Management (IJMDEM), 2014, 5(4):36-52. [48] REN Na, ZHU Changqing, TONG Deyu, et al. Commutative encryption and watermarking algorithm based on feature invariants for secure vector map[J]. IEEE Access, 2020, 8:221481-221493. [49] REN Na, ZHAO Ming, ZHU Changqing, et al. Commutative encryption and watermarking based on SVD for secure GIS vector data[J]. Earth Science Informatics, 2021, 14(4):2249-2263. [50] REN Na, TONG Deyu, CUI Hanchuan, et al. Congruence and geometric feature-based commutative encryption-watermarking method for vector maps[J]. Computers & Geosciences, 2022, 159:105009. [51] 鞠博. 访问控制策略研究进展[J]. 电声技术, 2020, 44(12):78-80. JU Bo. Access control policy research progress[J]. Audio Engineering, 2020, 44(12):78-80. [52] VINH P T, LE MINH T. To assign and control the right accessing geo-database by access control cube[C]//Proceedings of 2011 International Conference on Information and Electronics Engineering. Singapore:IPCSIT Press, 2011:253-257. [53] FATHY M, AZER M, BAHGAT M, et al. Security access control research trends[C]//Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC). Dubai, United Arab Emirates:IEEE, 2013:1-6. [54] 潘瑞杰, 王高才, 黄珩逸. 云计算下基于动态用户信任度的属性访问控制[J]. 计算机科学, 2021, 48(5):313-319. PAN Ruijie, WANG Gaocai, HUANG Hengyi. Attribute access control based on dynamic user trust in cloud computing[J]. Computer Science, 2021, 48(5):313-319. [55] 张彬. 基于Zone的RBAC模型的研究与实现[D]. 哈尔滨:哈尔滨工业大学, 2018. ZHANG Bin. Research and implementation of Zone-based RBAC model[D]. Harbin:Harbin Institute of Technology, 2018. [56] RAO K R, NAYAK A, RAY I G, et al. Role recommender-RBAC:Optimizing user-role assignments in RBAC[J]. Computer Communications, 2021, 166:140-153. [57] MALIK A K, ALI M A, MATEEN A, et al. A comparison of collaborative access control models[J]. International Journal of Advanced Computer Science and Applications, 2017, 8(3):290-296. [58] 毛健, 朱长青, 郭继发, 等. 地理空间数据访问控制威胁模型及应对策略[J]. 测绘科学, 2018, 43(2):88-94. MAO Jian, ZHU Changqing, GUO Jifa, et al. A threat model and its coping strategies for geospatial data access control[J]. Science of Surveying and Mapping, 2018, 43(2):88-94. [59] 毛健. 地理空间数据访问控制模型研究[D]. 南京:南京师范大学, 2015. MAO Jian. Research on the model of geospatial data access control[D]. Nanjing:Nanjing Normal University, 2015. [60] 高明华. 基于时空约束的访问控制与隐私保护研究[D]. 天津:天津工业大学, 2021. GAO Minghua. Research on temporal-spatial based access control and privacy protection[D]. Tianjin:Tiangong University, 2021. [61] 耿晴, 孙续锦, 陈涛. 地理信息数据加密控制版权保护系统设计[J]. 地理空间信息, 2020, 18(3):5-8, 141. GENG Qing, SUN Xujin, CHEN Tao. Design of geographical information data encrypted control copyright protection system[J]. Geospatial Information, 2020, 18(3):5-8, 141. [62] YISA V L, MESHACH B, OSHO O, et al. Application of geo-location-based access control in an enterprise environment[J]. International Journal of Computer Network and Information Security, 2018, 10(1):36-43. [63] 蔡丽娟, 陈伟鹤. 带有时空特性的角色访问控制模型[J]. 软件导刊, 2017, 16(8):15-18. CAI Lijuan, CHEN Weihe. Role access control model with spatio-temporal characteristics[J]. Software Guide, 2017, 16(8):15-18. [64] DAMIANI M L, BERTINO E, CATANIA B, et al. GEO-RBAC:a spatially aware RBAC[J]. ACM Transactions on Information and System Security, 2007, 10(1):1-34. [65] RAY I, TOAHCHOODEE M. A spatio-temporal role-based access control model[C]//Proceedings of 2007 Data and Applications Security XXI. Redondo, CA:Springer, 2007:211-226. [66] AICH S, SURAL S, MAJUMDAR A K. STARBAC:Spatiotemporal role based access control[C]//Proceedings of 2007 OTM Confederated International Conferences "On the Move to Meaningful Internet Systems". Vilamoura, Portugal:Springer, 2007:1567-1582. [67] KHAN A J, MEHFUZ S. Secure access control model for cloud computing environment with fuzzy max interval trust values[J]. International Journal of Advanced Computer Science and Applications, 2020, 11(8):536-542. [68] 王沙沙. 基于上下文的细粒度移动应用权限控制方法的研究与实现[D]. 北京:北京邮电大学, 2019. WANG Shasha. Research and implementation of a fine-grained permission control method based on context for mobile applications[D]. Beijing:Beijing University of Posts and Telecommunications, 2019. [69] 谢年. 基于双线性内插模型的地理空间数据保密技术研究[J]. 测绘与空间地理信息, 2016, 39(3):143-145, 148. XIE Nian. Research on the security of geospatial data based on the bilinear interpolation model[J]. Geomatics & Spatial Information Technology, 2016, 39(3):143-145, 148. [70] 于辉, 周卫, 马心念. 一种基于三角函数的矢栅地理数据可逆几何脱密模型[J]. 测绘通报, 2017(10):89-94. DOI:10.13474/j.cnki.11-2246.2017.0322. YU Hui, ZHOU Wei, MA Xinnian. A reversible decryption model for vector and raster integration based on trigonometric function[J]. Bulletin of Surveying and Mapping, 2017(10):89-94. DOI:10.13474/j.cnki.11-2246.2017.0322. [71] 戴海波. 地形图脱密系统的实现[D]. 长沙:中南大学, 2014. DAI Haibo. Realization of topographical map security process[D]. Changsha:Central South University, 2014. [72] 张寿选. 基于格网坐标转换法的矢量数据脱密方法研究[J]. 地理空间信息, 2022, 20(3):88-91. ZHANG Shouxuan. Research on vector data decryption method based on grid coordinate transformation[J]. Geospatial Information, 2022, 20(3):88-91. [73] 江栋华, 周卫. 一种基于Chebyshev多项式的矢量数据几何精度脱密模型[J]. 测绘科学技术学报, 2018, 35(3):321-325. JIANG Donghua, ZHOU Wei. Decryption model for vector geographic data based on Chebyshev polynomials[J]. Journal of Geomatics Science and Technology, 2018, 35(3):321-325. [74] 白晓春, 戚国辉, 郑树海, 等. 输变电工程地理信息数据脱密处理研究[J]. 矿产勘查, 2019, 10(9):2446-2460. BAI Xiaochun, QI Guohui, ZHENG Shuhai, et al. Research on Geographic information data densification related to power transmission and transformation engineering[J]. Mineral Exploration, 2019, 10(9):2446-2460. [75] 杨梦梅, 王辉. 利用基础地理信息数据编制公开版地图的关键技术探讨[J]. 测绘技术装备, 2008, 10(2):5-7. YANG Mengmei, WANG Hui. Discuss on key technique of public map compiling based on fundamental geographic information data[J]. Geomatics Technology and Equipment, 2008, 10(2):5-7. [76] 李彬彬, 周卫. 基础地理数据属性脱密系统设计与实现[J]. 测绘通报, 2015(S1):238-240. DOI:10.13474/j.cnki.11-2246.2015.0668. LI Binbin, ZHOU Wei. Design and implementation of basic geographic data attribute decryption system[J]. Bulletin of Surveying and Mapping, 2015(S1):238-240. DOI:10.13474/j.cnki.11-2246.2015.0668. [77] 李安波, 陈楹, 姚蒙蒙, 等. 涉密矢量数字地图中敏感要素几何信息量的测度方法[J]. 地球信息科学学报, 2018, 20(1):7-16. LI Anbo, CHEN Ying, YAO Mengmeng, et al. Quantitative measurement of geometrical information for sensitive features in secret-related vector digital maps[J]. Journal of Geo-Information Science, 2018, 20(1):7-16. [78] 闫娜. DOM几何精度脱密模型与算法研究[D]. 南京:南京师范大学, 2013. YAN Na. Research on decipherment model and algorithm of geometric accuracy for DOM[D]. Nanjing:Nanjing Normal University, 2013. [79] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494. YUAN Yong, WANG Feiyue. Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4):481-494. [80] WANG Baowei, SHI Jiawei, WANG Weishen, et al. A blockchain-based system for secure image protection using zero-watermark[C]//Proceedings of 2020 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS). Delhi, India:IEEE, 2020:62-70. [81] 黄子龙. 基于区块链的遥感成果认证与交易系统的研究与实现[D]. 杭州:浙江大学, 2019. HUANG Zilong. Research and implementation of remote sensing achievement authentication and trading system based on blockchain[D]. Hangzhou:Zhejiang University, 2019. [82] 朱长青, 徐鼎捷, 任娜, 等. 区块链与数字水印相结合的地理数据交易存证及版权保护模型[J]. 测绘学报, 2021, 50(12):1694-1704. DOI:10.11947/j.AGCS.2021.20200559. ZHU Changqing, XU Dingjie, REN Na, et al. Model and implementation of geographic data transaction certificate and copyright protection based on blockchain and digital watermarking[J]. Acta Geodaetica et Cartographica Sinica, 2021, 50(12):1694-1704. DOI:10.11947/j.AGCS.2021.20200559. [83] 高艺华. 基于区块链的遥感资源与服务交易平台的设计与实现[D]. 开封:河南大学, 2020. GAO Yihua. Design and implementation of remote sensing resource and service trading platform based on blockchain[D]. Kaifeng:Henan University, 2020. [84] LU Yang, WANG Xueheng, WEI Renle, et al. Design of transaction system for remote sensing cloud service based on blockchain[C]//Proceedings of 2019 2nd International Conference on Blockchain Technology and Applications. Xi'an China:ACM, 2019:81-85. [85] ZHANG Lei, GAO Yihua, CHEN Jinyu, et al. Research on remote sensing data sharing model based on blockchain technology[C]//Proceedings of 2019 2nd International Conference on Blockchain Technology and Applications. Xi'an China:ACM, 2019:59-63. [86] DING Kaimeng, JIANG Tingting, ZHANG Haozheng. An Authentication method combining blockchain and subject-sensitive hashing for the data sharing of remote sensing image[C]//Proceedings of the 11th International Conference on Computer Engineering and Networks. Singapore:Springer, 2022:774-783. [87] PINCHEIRA M, DONINI E, GIAFFREDA R, et al. A blockchain-based approach to enable remote sensing trusted data[C]//2020 IEEE Latin American GRSS & ISPRS Remote Sensing Conference (LAGIRS). Santiago, Chile:IEEE, 2020:652-657. [88] 陈昕, 王会娜, 谭蕾. "天地图·江苏"电子地图的数据保密技术处理[C]//第九届长三角科技论坛(测绘分论坛)论文集. 南京:[s.n.], 2012:321-323. CHEN Xin, WANG Huina, TAN Lei. Data confidentiality technology processing of "MapWorld-Jiangsu" electronic map[C]//Proceedings of the 9th Yangtze River Delta science and Technology Forum (Surveying and mapping sub Forum). Nanjing:[s.n.], 2012:321-323. [89] 程梦瑶. 超图将高新技术融入地理智慧[J]. 软件和集成电路, 2020(10):60-62. CHENG Mengyao. SuperMap integrates new technology into geographical wisdom[J]. Software and Integrated Circuit, 2020(10):60-62. [90] 中地数码. GIS+区块链, 地理空间数据新型应用场景未来可期![EB/OL]. (2021-12-17). https://www.mapgis.com/index.php?a=shows & catid=33 & id=1164. ZONDI CYBER. GIS+Blockchain, new application scenarios for geospatial data are promising in the future[EB/OL]. (2021-12-17). https://www.mapgis.com/index.php?a=shows & catid=33 & id=1164. |
[1] | 江碧涛. 我国空间对地观测技术的发展与展望[J]. 测绘学报, 2022, 51(7): 1153-1159. |
[2] | 姜卫平, 李昭, 魏娜, 刘经南. 大地测量坐标框架建立的进展与思考[J]. 测绘学报, 2022, 51(7): 1259-1270. |
[3] | 唐新明, 王鸿燕. 我国民用光学卫星测绘产品体系的建立与应用[J]. 测绘学报, 2022, 51(7): 1386-1397. |
[4] | 李振洪, 朱武, 余琛, 张勤, 张成龙, 刘振江, 张雪松, 陈博, 杜建涛, 宋闯, 韩炳权, 周佳薇. 雷达影像地表形变干涉测量的机遇、挑战与展望[J]. 测绘学报, 2022, 51(7): 1485-1519. |
[5] | 李志林, 蓝天, 遆鹏, 徐柱. 从马斯洛人生需求层次理论看地图学的进展[J]. 测绘学报, 2022, 51(7): 1536-1543. |
[6] | 彭认灿, 董箭, 贾帅东, 唐露露, 王芳. 数字水深模型建模技术研究进展与展望[J]. 测绘学报, 2022, 51(7): 1575-1587. |
[7] | 李德仁, 王密, 杨芳. 新一代智能测绘遥感科学试验卫星珞珈三号01星[J]. 测绘学报, 2022, 51(6): 789-796. |
[8] | 李广云, 孙森震, 王力, 冯其强. 可见光通信室内定位技术进展与应用[J]. 测绘学报, 2022, 51(6): 909-922. |
[9] | 姚宜斌, 赵庆志. GNSS对流层水汽监测研究进展与展望[J]. 测绘学报, 2022, 51(6): 935-952. |
[10] | 王权, 尤淑撑. 陆地卫星遥感监测体系及应用前景[J]. 测绘学报, 2022, 51(4): 534-543. |
[11] | 李俊生, 高敏, 张兵, 张方方, 王胜蕾, 殷子瑶, 谢娅. 智能手机影像支持的水质监测算法与应用[J]. 测绘学报, 2022, 51(4): 568-576. |
[12] | 李志林, 刘万增, 徐柱, 遆鹏, 高培超, 闫超德, 林艳, 李然, 陆辰妮. 时空数据地图表达的基本问题与研究进展[J]. 测绘学报, 2021, 50(8): 1033-1048. |
[13] | 赵庆志, 姚宜斌, 姚顽强. 顾及层析区域外测站的GNSS水汽层析建模方法[J]. 测绘学报, 2021, 50(3): 285-294. |
[14] | 边少锋, 周威, 刘立龙, 李厚朴, 刘备. 小波变换与滑动窗口相结合的GNSS-IR雪深估测模型[J]. 测绘学报, 2020, 49(9): 1179-1188. |
[15] | 姚宜斌, 杨元喜, 孙和平, 李建成. 大地测量学科发展现状与趋势[J]. 测绘学报, 2020, 49(10): 1243-1251. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||