[1] 王家耀. 地理信息系统的发展与发展中的地理信息系统[J]. 中国工程科学, 2009, 11(2):10-16. WANG Jiayao. Development of geographic information system and developing geographic information system[J]. Engineering Sciences, 2009, 11(2):10-16. [2] 周成虎. 全空间地理信息系统展望[J]. 地理科学进展, 2015, 34(2):129-131. ZHOU Chenghu. Prospects on pan-spatial information system[J]. Progress in Geography, 2015, 34(2):129-131. [3] YAN Haowen, ZHANG Liming, YANG Weifang. A normalization-based watermarking scheme for 2D vector map data[J]. Earth Science Informatics, 2017, 10(4):471-481. [4] WANG Xiaolong, YAN Haowen, ZHANG Liming, et al. An encryption algorithm for vector maps based on the Gaussian random and Haar transform[J]. Journal of Spatial Science, 2023, 68(2):303-318. [5] 闵连权. 一种鲁棒的矢量地图数据的数字水印[J]. 测绘学报, 2008, 37(2):262-267. MIN Lianquan. A robust digital watermarking in cartographic data in vector format[J]. Acta Geodaetica et Cartographica Sinica, 2008, 37(2):262-267. [6] BERTINO E, THURAISINGHAM B, GERTZ M, et al. Securityand privacy for geospatial data:concepts and research directions[C]//Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS. Irvine:ACM Press,2008:6-19. [7] 闵连权, 李强, 杨玉彬, 等. 矢量地图数据的水印技术综述[J]. 测绘科学技术学报, 2009, 26(2):96-102. MIN Lianquan, LI Qiang, YANG Yubin, et al. A survey of watermarking techniques for vector map data[J]. Journal of Geomatics Science and Technology, 2009, 26(2):96-102. [8] 朱长青. 地理数据数字水印和加密控制技术研究进展[J]. 测绘学报, 2017, 46(10):1609-1619. DOI:10.11947/j.AGCS.2017.20170301. ZHU Changqing. Research progresses in digital watermarking and encryption control for geographical data[J]. Acta Geodaetica et Cartographica Sinica, 2017, 46(10):1609-1619. DOI:10.11947/j.AGCS.2017.20170301. [9] 吕文清, 张黎明, 马磊, 等. BIBD的矢量空间数据数字指纹算法[J]. 测绘科学, 2017, 42(12):134-139. LV Wenqing, ZHANG Liming, MA Lei, et al. A digital fingerprinting algorithm for vector spatialdata using BIBD[J]. Science of Surveying and Mapping, 2017, 42(12):134-139. [10] 陈金萍, 张黎明, 蒋美容, 等. 运用GD-PBIBD编码的矢量空间数据数字指纹算法[J]. 测绘通报, 2020(8):81-86, 100. CHEN Jinping, ZHANG Liming, JIANG Meirong, et al. Digital fingerprint algorithm for vector spatial data using GD-PBIBD coding[J]. Bulletin of Surveying and Mapping, 2020(8):81-86, 100. [11] 方晓乐, 吴永静, 陈鑫祥, 等. 一种适用于移动端瓦片地图的加密方法[J]. 测绘通报, 2017(2):116-119. FANG Xiaole, WU Yongjing, CHEN Xinxiang, et al. A novel map encryption solution for mobile map application on tiles[J]. Bulletin of Surveying and Mapping, 2017(2):116-119. [12] RYBALOV N B, ZHUKOVSKY O I. Access to the spatial data in the web-oriented GIS[C]//Proceedings of 2007 Siberian Conference on Control and Communications. Tomsk:IEEE, 2007:104-107. [13] WU Feiquan, CUI Weihong, CHEN Houwu. A compound chaos-based encryption algorithm for vector geographic data under network circumstance[C]//Proceedings of 2008 Congress on Image and Signal Processing. Sanya:IEEE, 2008:254-258. [14] 李安波, 王海荣, 周卫. 基于二维混沌系统的矢量数字地图置乱加密[J]. 中国矿业大学学报, 2015, 44(4):747-753. LI Anbo, WANG Hairong, ZHOU Wei. Scrambling encryption of vector digital map based on 2D chaos system[J]. Journal of China University of Mining & Technology, 2015, 44(4):747-753. [15] COPPERSMITH D. The data encryption standard (DES) and its strength against attacks[J]. IBM Journal of Research and Development, 1994, 38(3):243-250. [16] PAAR C, PELZL J. The advanced encryption standard (AES)[M]//Understanding Cryptography. Berlin:Springer, 2010:87-121. [17] 全国网络安全标准化技术委员会. 信息安全技术SM4分组密码算法:GB/T 32907-2016[S]. 北京:中国标准出版社, 2017. National Information Security Standardization Technical Committee. Information security technology-SM4 block cipher algorithm:GB/T 32907-2016[S]. Beijing:China Standard Publishing House, 2017. [18] RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126. [19] KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of computation, 1987, 48:203-209. [20] 全国网络安全标准化技术委员会. 信息安全技术SM2密码算法使用规范:GB/T 35276-2017[S]. 北京:中国标准出版社, 2018. National Information Security Standardization Technical Committee. Information security technology-SM2 cryptographic algorithm usage specification:GB/T 35276-2017[S]. Beijing:China Standard Publishing House, 2018. [21] 钟尚平, 高庆狮. 网络环境下地图的混沌加密实用算法[J]. 计算机辅助设计与图形学学报, 2004, 16(2):238-242. ZHONG Shangping, GAO Qingshi. Practical map encryption algorithm based on chaos system under network circumstance[J]. Journal of Computer Aided Design & Computer Graphics, 2004, 16(2):238-242. [22] 闵连权. 矢量地图数据的加密算法[J]. 海洋测绘, 2005, 25(2):55-57. MIN Lianquan. Encryption algorithm of vector map data[J]. Hydrographic Surveying and Charting, 2005, 25(2):55-57. [23] 张翰林, 王青山, 邹永初. 复合混沌系统的矢量数据加密研究[J]. 测绘科学, 2012, 37(5):87-89. ZHANG Hanlin, WANG Qingshan, ZOU Yongchu. Encryption of vector data based on composite chaotic system[J]. Science of Surveying and Mapping, 2012, 37(5):87-89. [24] WANG Xiaolong, YAN Haowen, ZHANG Liming. Vector map encryption algorithm based on double random position permutation strategy[J]. ISPRS International Journal of Geo-Information, 2021, 10(5):311. [25] BANG N V, LEE S H, MOON K S, et al. Encryption algorithm using polyline simplification for gis vector map[J]. Journal of Korea Multimedia Society, 2016, 19(8):1453-1459. [26] PHAM N G, KWON K R, LEE S H, et al. Selective encryption algorithm for vector map using geometric objects in frequency domain[J]. Journal of Korea Multimedia Society, 2017, 20(8):1312-1320. [27] 朱长青, 任娜, 徐鼎捷. 地理信息安全技术研究进展与展望[J]. 测绘学报, 2022, 51(6):1017-1028. DOI:10.11947/j.AGCS.2022.20220172. ZHU Changqing, REN Na, XU Dingjie. Geo-information security technology:progress and prospects[J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(6):1017-1028. DOI:10.11947/j.AGCS.2022.20220172. [28] 全国网络安全标准化技术委员会. 信息安全技术SM3密码杂凑算法:GB/T 32905-2016[S]. 北京:中国标准出版社, 2017. National Information Security Standardization Technical Committee. Information security techniques-SM3 crytographic hashalgorithm:GB/T 32905-2016[S]. Beijing:China Standard Publishing House, 2017. [29] BECKMANN N, KRIEGEL H P, SCHNEIDER R, et al. The R*-tree:an efficient and robust access method for points and rectangles[C]//Proceedings of 1990 ACM SIGMOD international conference on Management of data. Atlantic City:ACM Press, 1990:322-331. [30] PÉREZ G, CERDEIRA H A. Extracting messages masked by chaos[J]. Physical Review Letters, 1995, 74(11):1970-1973. [31] CHEN C H, SHEU L J, CHEN H K, et al. A new hyper-chaotic system and its synchronization[J]. Nonlinear Analysis:Real World Applications, 2009, 10(4):2088-2096. [32] LAAREM G. A new 4D hyper chaotic system generated from the 3D Rösslor chaotic system, dynamical analysis, chaos stabilization via an optimized linear feedback control, it's fractional order model and chaos synchronization using optimized fractional order sliding mode control[J]. Chaos Solitons and Fractals, 2021, 152:111437. [33] PECORA L. Hyperchaos harnessed[J]. Physics World, 1996, 9(5):17. [34] 杜之波, 吴震, 王敏, 等. 针对基于SM3的HMAC的能量分析攻击方法[J]. 通信学报, 2016, 37(5):38-43. DU Zhibo, WU Zhen, WANG Min, et al. Power analysis attack of HMAC based on SM3[J]. Journal on Communications, 2016, 37(5):38-43. [35] 国家密码管理局. 基于口令的密钥派生规范:GM/T 0091-2020[S].北京:[s.n.],2021. State Cipher Administration. Password-based cryptography standard:GM/T 0091-2020[S]. Beijng:[s.n.],2021. [36] LI Y, ZHANG L, WANG H, et al. Multiple security protection algorithm for GF-2 images based on commutative encryption and watermarking[C]//Proceedings of 2021 Spatial Data and Intelligence.Hangzhou:Springer International Publishing, 2021, 141-147. [37] International Organization for Standardization. Information technology-security techniques-encryption algorithms-part 3:block ciphers-amendment 1:SM4:ISO/IEC 18033-3:2010/AMD 1:2021[EB/OL].[2022-09-29].https://www.iso.org/standard/81564.html. [38] VAN B N, LEE S H, KWON K R. Selective encryption algorithm using hybrid transform for GIS vector map[J]. Journal of Information Processing Systems, 2017, 13(1):68-82. [39] PHA M, NG O, BU I, et al. Vector map random encryption algorithm based on multi-scale simplification and Gaussian distribution[J]. Applied Sciences, 2019, 9(22):4889. |