Submitted:
18 January 2025
Posted:
20 January 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Shamir’s Secret Sharing Method
3. Methodology
3.1. Construction of Polar Coordinate System
3.2. Quantization Process to Polar Coordinates
3.3. Map Encryption Based on Secret Sharing
3.4. Decryption Process
4. Experiments
4.1. Testing Environment and Datasets
4.2. Encryption and Decryption Results
4.3. Encryption Effects
4.3.1. Correlation of Adjacent Coordinates (CAC)
4.3.2. RMSE Between the Original and Encrypted Maps
4.4. Encryption and Decryption Security
4.4.1. Probabilistic Property
4.4.2. Diffusion Property
4.4.3. Robustness of Decryption Process
4.5. Efficiency Analysis
4.5.1. Encryption Efficiency
4.5.2. Decryption Efficiency
4.6. Comparison with Existing Methods
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Ngoc-Giao, P.; Lee, S.-H.; Kwon, K.-R. Perceptual Encryption Based on Features of Interpolating Curve for Vector Map. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2017, E100A, 1156–1164. [Google Scholar] [CrossRef]
- Jang, B.-J.; Lee, S.-H.; Kwon, K.-R. Perceptual Encryption with Compression for Secure Vector Map Data Processing. Digit. Signal Prog. 2014, 25, 224–243. [Google Scholar] [CrossRef]
- Duarte, L.; Teodoro, A.C.; Goncalves, J.A.; Ribeiro, J.; Flores, D.; Lopez-Gil, A.; Dominguez-Lopez, A.; Angulo-Vinuesa, X.; Martin-Lopez, S.; Gonzalez-Herraez, M. Distributed Temperature Measurement in a Self-Burning Coal Waste Pile through a GIS Open Source Desktop Application. ISPRS Int. J. Geo-Inf. 2017, 6, 87. [Google Scholar] [CrossRef]
- Lee, S.-H.; Huo, X.-J.; Kwon, K.-R. Vector Watermarking Method for Digital Map Protection Using Arc Length Distribution. IEICE Trans. Inf. Syst. 2014, E97D, 34–42. [Google Scholar] [CrossRef]
- Peng, Y.; Lan, H.; Yue, M.; Xue, Y. Multipurpose Watermarking for Vector Map Protection and Authentication. Multimed. Tools Appl. 2018, 77, 7239–7259. [Google Scholar] [CrossRef]
- Qiu, Y.; Duan, H. A Novel Multi-Stage Watermarking Scheme of Vector Maps. Multimed. Tools Appl. 2021, 80, 877–897. [Google Scholar] [CrossRef]
- Jiang, L.; Xu, Z.; Xu, Y. Commutative Encryption and Watermarking Based on Orthogonal Decomposition. Multimed. Tools Appl. 2014, 70, 1617–1635. [Google Scholar] [CrossRef]
- Zhou, Q.; Xiong, Y.; Zhu, C.; Ren, N. Selective Encryption Algorithm for Vectoral Geographic Data under Feature Point Grouping Strategy. ISPRS Ann. Photogramm. Remote Sens. Spatial Inf. Sci. 2024, X-4–2024, 507–514. [Google Scholar] [CrossRef]
- Jang, B.-J.; Lee, S.-H.; Lim, S.; Kwon, K.-R. Progressive Vector Compression for High-Accuracy Vector Map Data. Int. J. Geogr. Inf. Sci. 2014, 28, 763–779. [Google Scholar] [CrossRef]
- Abubahia, A.; Cocea, M. Advancements in GIS Map Copyright Protection Schemes - a Critical Review. Multimed. Tools Appl. 2017, 76, 12205–12231. [Google Scholar] [CrossRef]
- Wang, Y.; Yang, C.; Ren, N.; Zhu, C.; Rui, T.; Wang, D. An Adaptive Watermark Detection Algorithm for Vector Geographic Data. KSII Trans. Internet Inf. Syst. 2020, 14, 323–343. [Google Scholar] [CrossRef]
- Tang, Z.; Zhang, Y.; Huang, J.; He, H.; Ding, Y. A Novel Infringement Detection Method for GIS Vector Data. ISPRS Int. Geo-Inf. 2020, 9, 12. [Google Scholar] [CrossRef]
- Ren, N.; Zhao, Y.; Zhu, C.; Zhou, Q.; Xu, D. Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps. ISPRS Int. J. Geo-Inf. 2021, 10, 294. [Google Scholar] [CrossRef]
- Wang, Y.; Yang, C.; Ding, K. Multiple Watermarking Algorithms for Vector Geographic Data Based on Multiple Quantization Index Modulation. Appl. Sci.-Basel. 2023, 13, 12390. [Google Scholar] [CrossRef]
- Li, Y.; Zhang, L.; Wang, X.; Zhang, X.; Zhang, Q. A Novel Invariant Based Commutative Encryption and Watermarking Algorithm for Vector Maps. ISPRS Int. J. Geo-Inf. 2021, 10, 718. [Google Scholar] [CrossRef]
- Ren, N.; Tong, D.; Cui, H.; Zhu, C.; Zhou, Q. Congruence and Geometric Feature-Based Commutative Encryption-Watermarking Method for Vector Maps. Comput. Geosci. 2022, 159. [Google Scholar] [CrossRef]
- Dakroury, Y.; El-Ghafar, I.A.; Tammam, A. Protecting GIS data using cryptography and digital watermarking. Int. J. Comput. Sci. Netw. Secur. 2010, 10(1), 75–84. [Google Scholar] [CrossRef]
- Ren, N.; Zhao, M.; Zhu, C.; Sun, X.; Zhao, Y. Commutative Encryption and Watermarking Based on SVD for Secure GIS Vector Data. Earth Sci. Inform. 2021, 14, 2249–2263. [Google Scholar] [CrossRef]
- Zhu, C.; Ren, N.; Xu, D. Geo-Information Security Technology: Progress and Prospects. Acta Geodaetica et Cartographica Sinica. 2022, 51(6), 1017–1028. [Google Scholar] [CrossRef]
- Wright, M.A. The Advanced Encryption Standard. Network Security. 2001, 2001, 11–13. [Google Scholar] [CrossRef]
- Biryukov, A.; De Cannière, C. Data Encryption Standard (DES). In Encyclopedia of Cryptography and Security; van Tilborg, H.C.A., Ed.; Springer US: Boston, MA, 2005; pp. 129–135. [Google Scholar] [CrossRef]
- Rivest, R.L.; Shamir, A.; Adleman, L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM. 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Koblitz, N. Elliptic Curve Cryptosystems. Math Comput. 1987, 48, 203–209. [Google Scholar] [CrossRef]
- Ding, C.; Tang, J.; Deng, M.; Liu, H.; Mei, X. A Local Encryption Method for Large-Scale Vector Maps Based on Spatial Hierarchical Index and 4D Hyperchaotic System. Int. J. Geogr. Inf. Sci. 2024, 38, 2272–2300. [Google Scholar] [CrossRef]
- Wang, X.; Yan, H.; Zhang, L. Vector Map Encryption Algorithm Based on Double Random Position Permutation Strategy. ISPRS Int. J. Geo-Inf. 2021, 10, 311. [Google Scholar] [CrossRef]
- Zhou, N.R.; Hua, T.X.; Gong, L.H.; Pei, D.J.; Liao, Q.H. Quantum Image Encryption Based on Generalized Arnold Transform and Double Random-Phase Encoding. Quantum Inf. Process. 2015, 14, 1193–1213. [Google Scholar] [CrossRef]
- Cao, L.; Men, C.; Ji, R. Nonlinear Scrambling-Based Reversible Watermarking for 2D-Vector Maps. Vis. Comput. 2013, 29, 231–237. [Google Scholar] [CrossRef]
- Qu, C.; Du, J.; Xi, X.; Tian, H.; Zhang, J. A Hybrid Domain-Based Watermarking for Vector Maps Utilizing a Complementary Advantage of Discrete Fourier Transform and Singular Value Decomposition. Comput. Geosci. 2024, 183, 105515. [Google Scholar] [CrossRef]
- Pham, G.N.; Ngo, S.T.; Bui, A.N.; Tran, D.; Lee, S.-H.; Kwon, K.-R. Vector Map Random Encryption Algorithm Based on Multi-Scale Simplification and Gaussian Distribution. Appl. Sci.-Basel. 2019, 9, 4889. [Google Scholar] [CrossRef]
- Van, B.N.; Lee, S.-H.; Kwon, K.-R. Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map. J. Inf. Process. Syst. 2017, 13, 68–82. [Google Scholar] [CrossRef]
- Shamir, A. How to Share a Secret. Commun. ACM. 1979, 22, 612–613. [Google Scholar] [CrossRef]
- Hua, Z.; Wang, Y.; Yi, S.; Zhou, Y.; Jia, X. Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 4968–4982. [Google Scholar] [CrossRef]












| Datasets | Layer | Feature type | Number of features | Number of vertices | Size |
|---|---|---|---|---|---|
| Dataset A | POI | point | 15298 | 15298 | 419KB |
| Dataset B | Railway | polyline | 12656 | 102165 | 2.29MB |
| Dataset C | Prefecture boundaries | polygon | 12 | 1803 | 29KB |
| Dataset D | POI | point | 246950 | 246950 | 6.75MB |
| Dataset E | Waterways | polyline | 31870 | 777420 | 13.9MB |
| Dataset F | Water bodies | polygon | 24036 | 1023278 | 17MB |
| Datasets | X-Coordinates | Y-Coordinates | |
|---|---|---|---|
| Dataset B (railway) |
original map | 0.963269 | 0.985731 |
| share 1 | 0.006523 | 0.009533 | |
| share 2 | 0.001108 | 0.002775 | |
| share 3 | 0.001677 | -0.004052 | |
| decrypted map | 0.963269 | 0.985731 | |
| Dataset C (prefecture boundaries) |
original map | 0.984837 | 0.988346 |
| share 1 | -0.005180 | 0.007334 | |
| share 2 | 0.001434 | -0.002722 | |
| share 3 | 0.004277 | -0.001738 | |
| decrypted map | 0.984837 | 0.988346 | |
| Datasets | N-Min offset Distance |
N-Max offset distance |
N-RMSE | |
|---|---|---|---|---|
| Dataset A | share 1 | 0.683244 | 0.968387 | 0.828142 |
| share 2 | 0.679105 | 0.972651 | 0.838721 | |
| share 3 | 0.681582 | 0.973746 | 0.827944 | |
| Dataset B | share 1 | 0.756818 | 0.890549 | 0.822524 |
| share 2 | 0.757976 | 0.895330 | 0.826558 | |
| share 3 | 0.758600 | 0.899626 | 0.839536 | |
| Dataset C | share 1 | 0.689633 | 0.962224 | 0.820770 |
| share 2 | 0.690028 | 0.960687 | 0.821879 | |
| share 3 | 0.690179 | 0.963291 | 0.823647 | |
| Datasets | N-Min offset distance |
N-Max offset distance |
N-RMSE | |
|---|---|---|---|---|
| Dataset A | share 1 | 0.117439 | 0.796279 | 0.633435 |
| share 2 | 0.133791 | 0.784559 | 0.641268 | |
| share 3 | 0.165460 | 0.795543 | 0.632560 | |
| Dataset B | share 1 | 0.156770 | 0.772710 | 0.623962 |
| share 2 | 0.123437 | 0.763173 | 0.636590 | |
| share 3 | 0.107197 | 0.770605 | 0.628593 | |
| Dataset C | share 1 | 0.177662 | 0.786009 | 0.658562 |
| share 2 | 0.124753 | 0.796304 | 0.644872 | |
| share 3 | 0.154923 | 0.806452 | 0.652654 | |
| Datasets | N-Min offset distance |
N-Max offset distance |
N-RMSE | |
|---|---|---|---|---|
| Dataset A | share 1 | 0.172385 | 0.842934 | 0.704336 |
| share 2 | 0.103453 | 0.855600 | 0.719485 | |
| share 3 | 0.205342 | 0.869501 | 0.704567 | |
| Dataset B | share 1 | 0.153835 | 0.840998 | 0.719462 |
| share 2 | 0.159384 | 0.875234 | 0.712842 | |
| share 3 | 0.129503 | 0.853555 | 0.723853 | |
| Dataset C | share 1 | 0.110485 | 0.893650 | 0.744845 |
| share 2 | 0.190289 | 0.856047 | 0.748534 | |
| share 3 | 0.239604 | 0.867975 | 0.740185 | |
| Methods | Proposed method | Ref [9] | Ref [24] | Ref [25] | Ref [29] | Ref [30] |
|---|---|---|---|---|---|---|
| Disaster tolerance | √ | × | × | × | × | × |
| Probabilistic property | √ | × | × | × | √ | √ |
| Diffusion property | √ | √ | √ | √ | × | × |
| The robustness to data RST transformations | √ | √ | × | √ | × | × |
| Applicable to points, polylines and polygons | √ | √ | √ | ● | ● | √ |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).