Share this post on:

Ttacks, information format conversion attack. On the other hand, the normalized coordinates are invariant to translation and scaling, but not to rotation. As a result, the proposed algorithm has no resistance to rotation attack.rithm is extra robust in resisting 4-Hydroxybenzylamine Formula vertex addition Embelin Protocol attack and vertex deletion attac shown in Figure 11c , the proposed algorithm has the exact same robustness as the exi methods [2,13,24] in resisting information format conversion, scaling and translation att ISPRS Int. J. Geo-Inf. 2021, 10, 718 16 of 18 whereas its robustness in resisting rotation attack just isn’t as very good because the current met [2,13,24].Figure 11. Comparison benefits for attacks: (a) (a) comparison results for vertex addition, (b) comparison Figure 11. Comparison final results for vertexvertex attacks: comparison resultsfor vertex addition, (b) comparison final results final results for for vertex deletion, (c) comparison benefits for information format conversion attack, (d) comparison outcomes for scaling attack, vertex deletion, (c) comparison final results for data format conversion attack, (d) comparison outcomes for scaling attack, (e) (e) comparison benefits for translation attack, (f) comparison final results for rotation attack. comparison outcomes for translation attack, (f) comparison results for rotation attack.5. ConclusionsThe above outcomes showCEW algorithm is proposed in this paper, aiming at supplying A novel invariant-based that the proposed algorithm is resistant to vertex att the dual capability of attacks, data format conversion attack. vector maps. The scaling and translation safe transmission and copyright protection for However, the normapermutation-based encryption scheme doesn’t transform the coordinates of vector maps, which can be combined with the coordinates-based watermarking scheme to implement the commutativity in between encryption operation and watermarking operation. Based on the proposed algorithm, the operation order of encryption and watermark embedding has no influence around the final benefits, as well as the embedded watermark can be extracted before or soon after decryption. The contributions of this paper are as follows:(1). Proposed algorithm provides numerous protection for vector maps by the combination of encryption technologies and watermarking technology in comparison to existing encryption algorithm and watermarking algorithm. (two). Compared using the current CEW procedures for vector maps, proposed technique has stronger robustness in resisting vertex attacks by utilizing numerous embedding tactic for watermark. In addition, proposed strategy is resistant to geometric attacks (e.g., scaling and translation) and other conventional attacks (e.g., reordering and data format conversion). (three). Compared using the current CEW techniques for vector maps, the introduction of double random position permutation tactic fully avoids one-to-one mapping in the course of vector map scrambling and drastically enhances encryption security. Proposed algorithm features a poor encryption impact on point objects, since the permutation of point objects can only adjust the storage order, which has no impact on the information structure. Thus, the CEW algorithm for the point objects of vector maps will likely be our perform in future investigation.ISPRS Int. J. Geo-Inf. 2021, ten,17 ofAuthor Contributions: Yu Li conceived and made the experiments; Yu Li and Liming Zhang carried out the approach; Yu Li and Xiaolong Wang completed the implementation on the laptop code as well as the supporting algorithms; Yu Li performed the evaluation and wrote the paper; Liming Zhang, Xiaolon.

Share this post on:

Author: Sodium channel