2014
DOI: 10.1016/j.dsp.2013.09.013
|View full text |Cite
|
Sign up to set email alerts
|

Perceptual encryption with compression for secure vector map data processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
9
1

Relationship

3
7

Authors

Journals

citations
Cited by 25 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…In encrypting domain, it has many conventional works relate to management, access, and storage, transmission data [8][9][10][11][12][13]. Selective encryption is not a new idea, has been proposed in several applications, especially, in multimedia systems.…”
Section: Related Workmentioning
confidence: 99%
“…In encrypting domain, it has many conventional works relate to management, access, and storage, transmission data [8][9][10][11][12][13]. Selective encryption is not a new idea, has been proposed in several applications, especially, in multimedia systems.…”
Section: Related Workmentioning
confidence: 99%
“…Consequently, GIS vector map data protection is necessary to prevent illegal duplication and distribution. GIS vector map security includes copyright protection [2][3][4], access control for users, and vector map data encryption in order to prevent attacks or illegal distribution during storage and transmission, and damage in the integration process of geographical information [5][6][7][8][9][10][11][12][13][14]. However, access control on the Web is unable to prevent attacks or illegal duplication and distribution, and watermarking techniques are only useful in identifying ownership and for copyright protection, while unauthorized users should not be able to see, attack, or extract GIS vector map content.…”
Section: Introductionmentioning
confidence: 99%
“…In encrypting domain, it has many conventional works relate to management, access, and storage, transmission data [8][9][10][11][12][13]. Mostly, authors explained technical challenges raised by the unique requirements of secure geospatial data management such as access control, security and privacy policies.…”
Section: Related Workmentioning
confidence: 99%