Acta Geodaetica et Cartographica Sinica ›› 2022, Vol. 51 ›› Issue (6): 1017-1028.doi: 10.11947/j.AGCS.2022.20220172
• Cartography and Geoinformation • Previous Articles Next Articles
ZHU Changqing1,2,3, REN Na1,2,3, XU Dingjie1,2,3
Received:
2022-03-06
Revised:
2022-04-07
Published:
2022-07-02
Supported by:
CLC Number:
ZHU Changqing, REN Na, XU Dingjie. Geo-information security technology: progress and prospects[J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(6): 1017-1028.
[1] 朱长青. 地理数据数字水印和加密控制技术研究进展[J]. 测绘学报, 2017, 46(10):1609-1619. DOI:10.11947/j.AGCS.2017.20170301. ZHU Changqing. Research progresses in digital watermarking and encryption control for geographical data[J]. Acta Geodaetica et Cartographica Sinica, 2017, 46(10):1609-1619. DOI:10.11947/j.AGCS.2017.20170301. [2] CHUNG Y H. A spread random interleaver based efficient DES algorithm for personal cloud computing environments[J]. Journal of the Korea Institute of Information and Communication Engineering, 2013, 17(1):41-48. [3] WADI S M, ZAINAL N. High definition image encryption algorithm based on AES modification[J]. Wireless Personal Communications, 2014, 79(2):811-829. [4] 陈志伟, 杜敏, 杨亚涛, 等. 基于RSA和Paillier的同态云计算方案[J]. 计算机工程, 2013, 39(7):35-39. CHEN Zhiwei, DU Min, YANG Yatao, et al. Homomorphic cloud computing scheme based on RSA and Paillier[J]. Computer Engineering, 2013, 39(7):35-39. [5] 赵友刚, 李伟民. 椭圆曲线公钥密码[J]. 莱阳农学院学报, 2005, 22(1):75-77. ZHAO Yougang, LI Weimin. Elliptic curve public-key cryptosystem[J]. Journal of Laiyang Agricultural College, 2005, 22(1):75-77. [6] 崔翰川. 面向共享的矢量地理数据安全关键技术研究[D]. 南京:南京师范大学, 2013. CUI Hanchuan. Research on the sharing security of vector geography data[D]. Nanjing:Nanjing Normal University, 2013. [7] 张姗姗. 矢量图形数据的网络传输加密算法研究[D]. 武汉:武汉大学, 2005. ZHANG Shanshan. Research on the algorithm of encryption in network transmission of vector graphic data[D]. Wuhan:Wuhan University, 2005. [8] 张翰林, 王青山, 邹永初. 复合混沌系统的矢量数据加密研究[J]. 测绘科学, 2012, 37(5):87-89. ZHANG Hanlin, WANG Qingshan, ZOU Yongchu. Encryption of vector data based on composite chaotic System[J]. Science of Surveying and Mapping, 2012, 37(5):87-89. [9] 王海荣. 矢量地理数据的置乱加密方法及置乱性能评测[D]. 南京:南京师范大学, 2014. WANG Hairong. Scrambling encryption methods and scrambling performance evaluation for vector geographic data[D]. Nanjing:Nanjing Normal University, 2014. [10] 吴雪荣, 李安波, 吴赛松, 等. 基于席尔宾斯基垫片的GIS矢量数据置乱方法[J]. 测绘科学, 2015, 40(9):102-106, 124. WU Xuerong, LI Anbo, WU Saisong, et al. Scrambling transformation of GIS line/polygon layer vector data based on Sierpinski Gasket[J]. Science of Surveying and Mapping, 2015, 40(9):102-106, 124. [11] SANG Jun, LUO Hongling, ZHAO Jun, et al. Image encryption with chaotic map and Arnold transform in the gyrator transform domains[C]//Proceedings of 2017 Pattern Recognition and Tracking. Anaheim, CA, USA:SPIE, 2017:164-171. [12] JANG B J, LEE S H, KWON K R. Perceptual encryption with compression for secure vector map data processing[J]. Digital Signal Processing, 2014, 25:224-243. [13] PHAM G N, NGO S T, BUI A N, et al. Vector map random encryption algorithm based on multi-scale simplification and Gaussian distribution[J]. Applied Sciences, 2019, 9(22):4889. [14] NGOC G P, MOON K S, LEE S H, et al. GIS map encryption algorithm for drone security based on geographical features[C]//2016 International Conference on Computational Science and Computational Intelligence (CSCI). Las Vegas, NV:IEEE, 2016:1422-1423. [15] 李光师. 基于GML的地理信息共享系统的加密方法研究[J]. 鞍山师范学院学报, 2012, 14(4):61-64. LI Guangshi Research on encryption method of the geographic information sharing system based on GML[J]. Journal of Anshan Normal University, 2012, 14(4):61-64. [16] 刘波, 严俊, 姚茂华. 地理信息安全加密系统的实现与应用[J]. 测绘通报, 2017(2):106-108, 137. DOI:10.13474/j.cnki.11-2246.2017.0060. LIU Bo, YAN Jun, YAO Maohua. Implementation and application of geographical information security encryption system[J]. Bulletin of Surveying and Mapping, 2017(2):106-108, 137. DOI:10.13474/j.cnki.11-2246.2017.0060. [17] WANG Yingying, YANG Chengsong, REN Na, et al. An adaptive watermark detection algorithm for vector geographic data[J]. KSII Transactions on Internet and Information Systems, 2020, 14(1):323-343. [18] TONG Deyu, REN Na, ZHU Changqing. Secure and robust watermarking algorithm for remote sensing images based on compressive sensing[J]. Multimedia Tools and Applications, 2019, 78(12):16053-16076. [19] PENG Zhiyong, YUE Mingliang, WU Xia, et al. Blind watermarking scheme for polylines in vector geo-spatial data[J]. Multimedia Tools and Applications, 2015, 74(24):11721-11739. [20] LEE S H, HUO Xiaojiao, KWON K R. Vector watermarking method for digital map protection using arc length distribution[J]. IEICE Transactions on Information and Systems, 2014, E97.D(1):34-42. [21] YANG Chengsong, ZHU Changqing, WANG Yingying, et al. A robust watermarking algorithm for vector geographic data based on Qim and matching detection[J]. Multimedia Tools and Applications, 2020, 79(41):30709-30733. [22] WANG Nana, ZHAO Xiangjun. 2D vector map data hiding with directional relations preservation between points[J]. AEU-International Journal of Electronics and Communications, 2017, 71:118-124. [23] TONG Deyu, ZHU Changqing, REN Na, et al. High-capacity and robust watermarking scheme for small-scale vector data[J]. KSII Transactions on Internet and Information Systems, 2019, 13(12):6190-6213. [24] AMHAR F, GIRI E P, SILALAHI F E S, et al. Ownership protection on Digital Elevation Model (DEM) using transform-based watermarking[J]. ISPRS International Journal of Geo-Information, 2022, 11(3):200. [25] 朱长青, 任娜. 一种基于伪随机序列和DCT的遥感影像水印算法[J]. 武汉大学学报(信息科学版), 2011, 36(12):1427-1429. ZHU Changqing, REN Na. An algorithm for digital watermark based on pseudo-random sequence and DCT for remote sensing image[J]. Geomatics and Information Science of Wuhan University, 2011, 36(12):1427-1429. [26] YUAN Guanghui, HAO Qi. Digital watermarking secure scheme for remote sensing image protection[J]. China Communications, 2020, 17(4):88-98. [27] XI Xu, ZHANG Xinchang, SUN Ying, et al. Topology-preserving and geometric feature-correction watermarking of vector maps[J]. IEEE Access, 2020, 8:33428-33441. [28] 秦如贞, 张黎明, 伍庭晨, 等. 结合ASIFT和归一化的抗仿射变换遥感影像盲水印算法[J]. 地球信息科学学报, 2021, 23(10):1882-1891. QIN Ruzhen, ZHANG Liming, WU Tingchen, et al. A blind watermarking algorithm for remote sensing image based on anti-affine transformation combining ASIFT and normalization[J]. Journal of Geo-Information Science, 2021, 23(10):1882-1891. [29] REN Na, ZHAO Yazhou, ZHU Changqing, et al. Copyright protection based on zero watermarking and blockchain for vector maps[J]. ISPRS International Journal of Geo-Information, 2021, 10(5):294. [30] PENG Fei, JIANG Wenyan, QI Ying, et al. Separable robust reversible watermarking in encrypted 2D vector graphics[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8):2391-2405. [31] REN Na, ZHOU Qifei, ZHU Changqing, et al. A lossless watermarking algorithm based on line pairs for vector data[J]. IEEE Access, 2020(8):156727-156739. [32] ZHOU Qifei, REN Na, ZHU Changqing, et al. Blind digital watermarking algorithm against projection transformation for vector geographic data[J]. ISPRS International Journal of Geo-Information, 2020, 9(11):692. [33] ZHOU Qifei, REN Na, ZHU Changqing, et al. Storage feature-based watermarking algorithm with coordinate values preservation for vector line data[J]. KSII Transactions on Internet and Information Systems, 2018, 12(7):3475-3496. [34] ZHOU Qifei, ZHU Changqing, REN Na, et al. Zero watermarking algorithm for vector geographic data based on the number of neighboring features[J]. Symmetry, 2021, 13(2):208. [35] XING Siming, LI Tongyi, LIANG Jing. A zero-watermark hybrid algorithm for remote sensing images based on DCT and DFT[J]. Journal of Physics:Conference Series, 2021, 1952(2):022049. [36] CAO Liujuan, MEN Chaoguang, GAO Yue. A recursive embedding algorithm towards lossless 2D vector map watermarking[J]. Digital Signal Processing, 2013, 23(3):912-918. [37] 孙俞超, 李德. 基于节点特征的矢量地图零水印算法[J]. 地理与地理信息科学, 2017, 33(3):17-21. SUN Yuchao, LI De. Vector map zero-watermark algorithm based on node feature[J]. Geography and Geo-Information Science, 2017, 33(3):17-21. [38] XI Xu, ZHANG Xinchang, LIANG Weidong, et al. Dual zero-watermarking scheme for two-dimensional vector map based on Delaunay triangle mesh and singular value decomposition[J]. Applied Sciences, 2019, 9(4):642. [39] KATZENBEISSER S. First summary report on hybrid systems[R]. ECRYPT-European Network of Excellence in Cryptology, 2005. [40] LIU Hong, XIAO Di, ZHANG Rui, et al. Robust and hierarchical watermarking of encrypted images based on compressive sensing[J]. Signal Processing:Image Communication, 2016, 45:41-51. [41] EL-MAHALLAWY M S, HAGRAS E A, ELDIN A Z, et al. Robust blind and secure biometric watermarking based on partial multi-map chaotic encryption[C]//Proceedings of 2011 IFIP International Conference on New Technologies, Mobility and Security. Paris, France:IEEE, 2011:1-5. [42] BENRHOUMA O, MANNAI O, HERMASSI H. Digital images watermarking and partial encryption based on DWT transformation and chaotic maps[C]//Proceedings of 2015 IEEE International Multi-Conference on Systems, Signals & Devices (SSD15). Mahdia, Tunisia:IEEE, 2015:1-6. [43] CANCELLARO M, BATTISTI F, CARLI M, et al. A commutative digital image watermarking and encryption method in the tree structured Haar transform domain[J]. Signal Processing:Image Communication, 2011, 26(1):1-12. [44] 李玉, 张黎明, 王昊, 等. 运用同态加密的高分遥感影像交换密码水印算法[J]. 激光与光电子学进展, 2022, 59(18):1815012. LI Yu, ZHANG Liming, WANG Hao, et al. Commutative encryption and watermarking algorithm for high-resolution remote sensing images based on homomorphic encryption[J]. Laser & Optoelectronics Progress, 2022, 59(18):1815012. [45] GUO Jianting, ZHENG Peijia, HUANG Jiwu. Secure watermarking scheme against watermark attacks in the encrypted domain[J]. Journal of Visual Communication and Image Representation, 2015, 30:125-135. [46] JANG B J, LEE S H, LEE E J, et al. A crypto-marking method for secure vector map[J]. Multimedia Tools and Applications, 2017, 76(14):16011-16044. [47] SCHMITZ R, LI Shujun, GRECOS C, et al. Towards robust invariant commutative watermarking-encryption based on image histograms[J]. International Journal of Multimedia Data Engineering and Management (IJMDEM), 2014, 5(4):36-52. [48] REN Na, ZHU Changqing, TONG Deyu, et al. Commutative encryption and watermarking algorithm based on feature invariants for secure vector map[J]. IEEE Access, 2020, 8:221481-221493. [49] REN Na, ZHAO Ming, ZHU Changqing, et al. Commutative encryption and watermarking based on SVD for secure GIS vector data[J]. Earth Science Informatics, 2021, 14(4):2249-2263. [50] REN Na, TONG Deyu, CUI Hanchuan, et al. Congruence and geometric feature-based commutative encryption-watermarking method for vector maps[J]. Computers & Geosciences, 2022, 159:105009. [51] 鞠博. 访问控制策略研究进展[J]. 电声技术, 2020, 44(12):78-80. JU Bo. Access control policy research progress[J]. Audio Engineering, 2020, 44(12):78-80. [52] VINH P T, LE MINH T. To assign and control the right accessing geo-database by access control cube[C]//Proceedings of 2011 International Conference on Information and Electronics Engineering. Singapore:IPCSIT Press, 2011:253-257. [53] FATHY M, AZER M, BAHGAT M, et al. Security access control research trends[C]//Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC). Dubai, United Arab Emirates:IEEE, 2013:1-6. [54] 潘瑞杰, 王高才, 黄珩逸. 云计算下基于动态用户信任度的属性访问控制[J]. 计算机科学, 2021, 48(5):313-319. PAN Ruijie, WANG Gaocai, HUANG Hengyi. Attribute access control based on dynamic user trust in cloud computing[J]. Computer Science, 2021, 48(5):313-319. [55] 张彬. 基于Zone的RBAC模型的研究与实现[D]. 哈尔滨:哈尔滨工业大学, 2018. ZHANG Bin. Research and implementation of Zone-based RBAC model[D]. Harbin:Harbin Institute of Technology, 2018. [56] RAO K R, NAYAK A, RAY I G, et al. Role recommender-RBAC:Optimizing user-role assignments in RBAC[J]. Computer Communications, 2021, 166:140-153. [57] MALIK A K, ALI M A, MATEEN A, et al. A comparison of collaborative access control models[J]. International Journal of Advanced Computer Science and Applications, 2017, 8(3):290-296. [58] 毛健, 朱长青, 郭继发, 等. 地理空间数据访问控制威胁模型及应对策略[J]. 测绘科学, 2018, 43(2):88-94. MAO Jian, ZHU Changqing, GUO Jifa, et al. A threat model and its coping strategies for geospatial data access control[J]. Science of Surveying and Mapping, 2018, 43(2):88-94. [59] 毛健. 地理空间数据访问控制模型研究[D]. 南京:南京师范大学, 2015. MAO Jian. Research on the model of geospatial data access control[D]. Nanjing:Nanjing Normal University, 2015. [60] 高明华. 基于时空约束的访问控制与隐私保护研究[D]. 天津:天津工业大学, 2021. GAO Minghua. Research on temporal-spatial based access control and privacy protection[D]. Tianjin:Tiangong University, 2021. [61] 耿晴, 孙续锦, 陈涛. 地理信息数据加密控制版权保护系统设计[J]. 地理空间信息, 2020, 18(3):5-8, 141. GENG Qing, SUN Xujin, CHEN Tao. Design of geographical information data encrypted control copyright protection system[J]. Geospatial Information, 2020, 18(3):5-8, 141. [62] YISA V L, MESHACH B, OSHO O, et al. Application of geo-location-based access control in an enterprise environment[J]. International Journal of Computer Network and Information Security, 2018, 10(1):36-43. [63] 蔡丽娟, 陈伟鹤. 带有时空特性的角色访问控制模型[J]. 软件导刊, 2017, 16(8):15-18. CAI Lijuan, CHEN Weihe. Role access control model with spatio-temporal characteristics[J]. Software Guide, 2017, 16(8):15-18. [64] DAMIANI M L, BERTINO E, CATANIA B, et al. GEO-RBAC:a spatially aware RBAC[J]. ACM Transactions on Information and System Security, 2007, 10(1):1-34. [65] RAY I, TOAHCHOODEE M. A spatio-temporal role-based access control model[C]//Proceedings of 2007 Data and Applications Security XXI. Redondo, CA:Springer, 2007:211-226. [66] AICH S, SURAL S, MAJUMDAR A K. STARBAC:Spatiotemporal role based access control[C]//Proceedings of 2007 OTM Confederated International Conferences "On the Move to Meaningful Internet Systems". Vilamoura, Portugal:Springer, 2007:1567-1582. [67] KHAN A J, MEHFUZ S. Secure access control model for cloud computing environment with fuzzy max interval trust values[J]. International Journal of Advanced Computer Science and Applications, 2020, 11(8):536-542. [68] 王沙沙. 基于上下文的细粒度移动应用权限控制方法的研究与实现[D]. 北京:北京邮电大学, 2019. WANG Shasha. Research and implementation of a fine-grained permission control method based on context for mobile applications[D]. Beijing:Beijing University of Posts and Telecommunications, 2019. [69] 谢年. 基于双线性内插模型的地理空间数据保密技术研究[J]. 测绘与空间地理信息, 2016, 39(3):143-145, 148. XIE Nian. Research on the security of geospatial data based on the bilinear interpolation model[J]. Geomatics & Spatial Information Technology, 2016, 39(3):143-145, 148. [70] 于辉, 周卫, 马心念. 一种基于三角函数的矢栅地理数据可逆几何脱密模型[J]. 测绘通报, 2017(10):89-94. DOI:10.13474/j.cnki.11-2246.2017.0322. YU Hui, ZHOU Wei, MA Xinnian. A reversible decryption model for vector and raster integration based on trigonometric function[J]. Bulletin of Surveying and Mapping, 2017(10):89-94. DOI:10.13474/j.cnki.11-2246.2017.0322. [71] 戴海波. 地形图脱密系统的实现[D]. 长沙:中南大学, 2014. DAI Haibo. Realization of topographical map security process[D]. Changsha:Central South University, 2014. [72] 张寿选. 基于格网坐标转换法的矢量数据脱密方法研究[J]. 地理空间信息, 2022, 20(3):88-91. ZHANG Shouxuan. Research on vector data decryption method based on grid coordinate transformation[J]. Geospatial Information, 2022, 20(3):88-91. [73] 江栋华, 周卫. 一种基于Chebyshev多项式的矢量数据几何精度脱密模型[J]. 测绘科学技术学报, 2018, 35(3):321-325. JIANG Donghua, ZHOU Wei. Decryption model for vector geographic data based on Chebyshev polynomials[J]. Journal of Geomatics Science and Technology, 2018, 35(3):321-325. [74] 白晓春, 戚国辉, 郑树海, 等. 输变电工程地理信息数据脱密处理研究[J]. 矿产勘查, 2019, 10(9):2446-2460. BAI Xiaochun, QI Guohui, ZHENG Shuhai, et al. Research on Geographic information data densification related to power transmission and transformation engineering[J]. Mineral Exploration, 2019, 10(9):2446-2460. [75] 杨梦梅, 王辉. 利用基础地理信息数据编制公开版地图的关键技术探讨[J]. 测绘技术装备, 2008, 10(2):5-7. YANG Mengmei, WANG Hui. Discuss on key technique of public map compiling based on fundamental geographic information data[J]. Geomatics Technology and Equipment, 2008, 10(2):5-7. [76] 李彬彬, 周卫. 基础地理数据属性脱密系统设计与实现[J]. 测绘通报, 2015(S1):238-240. DOI:10.13474/j.cnki.11-2246.2015.0668. LI Binbin, ZHOU Wei. Design and implementation of basic geographic data attribute decryption system[J]. Bulletin of Surveying and Mapping, 2015(S1):238-240. DOI:10.13474/j.cnki.11-2246.2015.0668. [77] 李安波, 陈楹, 姚蒙蒙, 等. 涉密矢量数字地图中敏感要素几何信息量的测度方法[J]. 地球信息科学学报, 2018, 20(1):7-16. LI Anbo, CHEN Ying, YAO Mengmeng, et al. Quantitative measurement of geometrical information for sensitive features in secret-related vector digital maps[J]. Journal of Geo-Information Science, 2018, 20(1):7-16. [78] 闫娜. DOM几何精度脱密模型与算法研究[D]. 南京:南京师范大学, 2013. YAN Na. Research on decipherment model and algorithm of geometric accuracy for DOM[D]. Nanjing:Nanjing Normal University, 2013. [79] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494. YUAN Yong, WANG Feiyue. Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4):481-494. [80] WANG Baowei, SHI Jiawei, WANG Weishen, et al. A blockchain-based system for secure image protection using zero-watermark[C]//Proceedings of 2020 IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS). Delhi, India:IEEE, 2020:62-70. [81] 黄子龙. 基于区块链的遥感成果认证与交易系统的研究与实现[D]. 杭州:浙江大学, 2019. HUANG Zilong. Research and implementation of remote sensing achievement authentication and trading system based on blockchain[D]. Hangzhou:Zhejiang University, 2019. [82] 朱长青, 徐鼎捷, 任娜, 等. 区块链与数字水印相结合的地理数据交易存证及版权保护模型[J]. 测绘学报, 2021, 50(12):1694-1704. DOI:10.11947/j.AGCS.2021.20200559. ZHU Changqing, XU Dingjie, REN Na, et al. Model and implementation of geographic data transaction certificate and copyright protection based on blockchain and digital watermarking[J]. Acta Geodaetica et Cartographica Sinica, 2021, 50(12):1694-1704. DOI:10.11947/j.AGCS.2021.20200559. [83] 高艺华. 基于区块链的遥感资源与服务交易平台的设计与实现[D]. 开封:河南大学, 2020. GAO Yihua. Design and implementation of remote sensing resource and service trading platform based on blockchain[D]. Kaifeng:Henan University, 2020. [84] LU Yang, WANG Xueheng, WEI Renle, et al. Design of transaction system for remote sensing cloud service based on blockchain[C]//Proceedings of 2019 2nd International Conference on Blockchain Technology and Applications. Xi'an China:ACM, 2019:81-85. [85] ZHANG Lei, GAO Yihua, CHEN Jinyu, et al. Research on remote sensing data sharing model based on blockchain technology[C]//Proceedings of 2019 2nd International Conference on Blockchain Technology and Applications. Xi'an China:ACM, 2019:59-63. [86] DING Kaimeng, JIANG Tingting, ZHANG Haozheng. An Authentication method combining blockchain and subject-sensitive hashing for the data sharing of remote sensing image[C]//Proceedings of the 11th International Conference on Computer Engineering and Networks. Singapore:Springer, 2022:774-783. [87] PINCHEIRA M, DONINI E, GIAFFREDA R, et al. A blockchain-based approach to enable remote sensing trusted data[C]//2020 IEEE Latin American GRSS & ISPRS Remote Sensing Conference (LAGIRS). Santiago, Chile:IEEE, 2020:652-657. [88] 陈昕, 王会娜, 谭蕾. "天地图·江苏"电子地图的数据保密技术处理[C]//第九届长三角科技论坛(测绘分论坛)论文集. 南京:[s.n.], 2012:321-323. CHEN Xin, WANG Huina, TAN Lei. Data confidentiality technology processing of "MapWorld-Jiangsu" electronic map[C]//Proceedings of the 9th Yangtze River Delta science and Technology Forum (Surveying and mapping sub Forum). Nanjing:[s.n.], 2012:321-323. [89] 程梦瑶. 超图将高新技术融入地理智慧[J]. 软件和集成电路, 2020(10):60-62. CHENG Mengyao. SuperMap integrates new technology into geographical wisdom[J]. Software and Integrated Circuit, 2020(10):60-62. [90] 中地数码. GIS+区块链, 地理空间数据新型应用场景未来可期![EB/OL]. (2021-12-17). https://www.mapgis.com/index.php?a=shows & catid=33 & id=1164. ZONDI CYBER. GIS+Blockchain, new application scenarios for geospatial data are promising in the future[EB/OL]. (2021-12-17). https://www.mapgis.com/index.php?a=shows & catid=33 & id=1164. |
[1] | TANG Xinming, WANG Hongyan. Establishment and application of China civil optical satellite surveying and mapping products [J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(7): 1386-1397. |
[2] | LI Zhenhong, ZHU Wu, YU Chen, ZHANG Qin, ZHNAG Chenglong, LIU Zhenjiang, ZHANG Xuesong, CHEN Bo, DU Jiantao, SONG Chuang, HAN Bingquan, ZHOU Jiawei. Interferometric synthetic aperture radar for deformation mapping: opportunities, challenges and the outlook [J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(7): 1485-1519. |
[3] | PENG Rencan, DONG Jian, JIA Shuaidong, TANG Lulu, WANG Fang. Research progress and prospect of digital depth model constructing technology [J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(7): 1575-1587. |
[4] | LI Deren, WANG Mi, YANG Fang. A new generation of intelligent mapping and remote sensing scientific test satellite Luojia-3 01 [J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(6): 789-796. |
[5] | LI Guangyun, SUN Senzhen, WANG Li, FENG Qiqiang. Research and application of indoor visible light communication positioning technology [J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(6): 909-922. |
[6] | YAO Yibin, ZHAO Qingzhi. Research progress and prospect of monitoring tropospheric water vapor by GNSS technique [J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(6): 935-952. |
[7] | WANG Quan, YOU Shucheng. Research and application outlook of land satellite remote sensing monitoring system [J]. Acta Geodaetica et Cartographica Sinica, 2022, 51(4): 534-543. |
[8] | LI Zhilin, LIU Wanzeng, XU Zhu, TI Peng, GAO Peichao, YAN Chaode, LIN Yan, LI Ran, LU Chenni. Cartographic representation of spatio-temporal data: fundamental issues and research progress [J]. Acta Geodaetica et Cartographica Sinica, 2021, 50(8): 1033-1048. |
[9] | MA Zhangfeng, JIANG Mi, DING Qixuan. Time-series co-registration for Sentinel-1 TOPS SAR Data [J]. Acta Geodaetica et Cartographica Sinica, 2021, 50(5): 634-640. |
[10] | YAO Yibin, YANG Yuanxi, SUN Heping, LI Jiancheng. Geodesy discipline: progress and perspective [J]. Acta Geodaetica et Cartographica Sinica, 2020, 49(10): 1243-1251. |
[11] | LI Deren. Towards geospatial information technology in 5G/6G era [J]. Acta Geodaetica et Cartographica Sinica, 2019, 48(12): 1475-1481. |
[12] | ZHU Qing, ZENG Haowei, DING Yulin, XIE Xiao, LIU Fei, ZHANG Liguo, LI Haifeng, HU Han, ZHANG Junxiao, CHEN Li, CHEN Lin, ZHANG Pengcheng, HE Huagui. A review of major potential landslide hazards analysis [J]. Acta Geodaetica et Cartographica Sinica, 2019, 48(12): 1551-1561. |
[13] | GUO Qingsheng, LIU Yang, LI Meng, CHENG Xiaoxi, HE Jie, WANG Huihui, WEI Zhiwei. A progressive simplification method of navigation road map based on mesh model [J]. Acta Geodaetica et Cartographica Sinica, 2019, 48(11): 1357-1368. |
[14] | WU Wenhao, ZHANG Lei, LI Tao, LONG Sichun, DUAN Meng, ZHOU Zhiwei, ZHU Chuanguang, JIANG Tingchen. Coregistration scheme and error analysis of multi-mode SAR image based on geometric coregistration [J]. Acta Geodaetica et Cartographica Sinica, 2019, 48(11): 1439-1451. |
[15] | DU Jiawei, WU Fang, LI Jinghan, XING Ruixing, GONG Xianyong. A Progressive Simplification Method for the Estuary Coastline [J]. Acta Geodaetica et Cartographica Sinica, 2018, 47(4): 547-556. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||