Study of DEM Information Security in Geographic Information Service

Article Preview

Abstract:

Geographic Information Service is open service based on the network environment. DEM should be protected because of its significance. This paper gives three methods for DEM information protecting, they are DEM encrypting, DEM information hiding and DEM Information disguising, and researches their theories and techniques. Then, this paper analyses their differences and relation. This paper could provide theory support for DEM information security research in Geographic Information Service.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2147-2151

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Liu Yuefeng. Synthetic Dissertation of Geographic Information Service [J]. Geomatics World, 2004, 2(6): 26-29.

Google Scholar

[2] Li Zhilin, Zhu Qing. Digital Elevation Model (2nd Edition) [M]. Wuhan: Wuhan University Press, (2003).

Google Scholar

[3] Yang Xiaoyuan, Su Weiguang, Zhang Minqing. Image Steganography Scheme Based on Kerckhoffs' Principle [J]. Journal of Wuhan University: Natural Science Edition, 2009, 55-70.

Google Scholar

[4] Merkle RC. One-way hash functions and DES [J]. Advances Cryptology, CRYPTO'89, Lecture Notes in Computer Science, 1989: 435.

DOI: 10.1007/0-387-34805-0_40

Google Scholar

[5] Douglas R. Stinson. Cryptography Theory and Practice (3rd Edition) [M]. Beijing: Publishing House of Electronics Industry, (2009).

Google Scholar

[6] Pierre Moulin, Joseph A. O'Sullivan. Information-Theoretic Analysis of Information Hiding [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49(3): 563-593.

DOI: 10.1109/tit.2002.808134

Google Scholar

[7] Wang Cancai. Study of the Robustness of Digital Watermark Based on Least Significant Bit [J]. Packaging Engineering, 2009, 30(3): 76-78.

Google Scholar

[8] Lv Guonian, Liu Aili. Applicability of Watermarking Techniques to DEM [J]. Journal of Remote Sensing, 2008, 12(5): 810-818.

Google Scholar

[9] Cox I J, et al. Secure spread spectrum watermaking foe multimedia [J]. Technical Report 95-10, NEC Research Institute, Princeton, NJ1995.

Google Scholar

[10] Chen Lingyu. Research on DEM Information Disguise [D]. Zhengzhou: Information Engineering University, (2009).

Google Scholar