• Journal of Geo-information Science
  • Vol. 22, Issue 3, 379 (2020)
Xingang ZHANG1、1、2、2、3、3, Haowen YAN1、1、2、2、3、3、*, and Liming ZHANG1、1、2、2、3、3
Author Affiliations
  • 1Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, China
  • 1兰州交通大学测绘与地理信息学院,兰州 730070
  • 2National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, China
  • 2地理国情监测技术应用国家地方联合工程研究中心,兰州 730070
  • 3Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, China
  • 3甘肃省地理国情监测工程实验室,兰州 730070
  • show less
    DOI: 10.12082/dqxxkx.2020.190336 Cite this Article
    Xingang ZHANG, Haowen YAN, Liming ZHANG. A Perceptual Hash Algorithm for DEM Data Authentication and Tamper Localization[J]. Journal of Geo-information Science, 2020, 22(3): 379 Copy Citation Text show less
    References

    [1] 汤国安. 我国数字高程模型与数字地形分析研究进展[J]. 地理学报, 2014,69(9):1305-1325. [ Tang GA. Progress of DEM and digital terrain analysis in China[J]. Acta Geographica Sinica, 2014,69(9):1305-1325. ] [ Tang G A. Progress of DEM and digital terrain analysis in China[J]. Acta Geographica Sinica, 2014,69(9):1305-1325. ]

    [2] 程春泉, 黄国满, 杨杰. POS与DEM辅助机载SAR多普勒参数估计[J]. 测绘学报, 2015,44(5):510-517. [ Feng CQ, Huang GM, YangJ. Doppler centroid estimation for airborne SAR supported by POS and DEM[J]. Acta Geodaetica et Cartographica Sinica, 2015,44(5):510-517. ] [ Feng C Q, Huang G M, Yang J. Doppler centroid estimation for airborne SAR supported by POS and DEM[J]. Acta Geodaetica et Cartographica Sinica, 2015,44(5):510-517. ]

    [3] 冯增文. 基于多期DEM的地质灾害与环境动态监测[D]. 北京:中国地质大学(北京), 2015. [ Feng ZW. Multi-phase DSM for the dynamic monitoring of geological hazard and environment-a case study of Miyun[D]. Beijing: China University of Geosciences (Beijing), 2015. ] [ Feng Z W. Multi-phase DSM for the dynamic monitoring of geological hazard and environment-a case study of Miyun[D]. Beijing: China University of Geosciences (Beijing), 2015. ]

    [4] 王雪, 李精忠, 余斌. 基于DEM提取流域特征影响因子的分析[J]. 测绘与空间地理信息, 2019,42(6):38-42. [ WangX, Li JZ, YuB. Analysis of influence factors for extraction of hydrological basin features from DEM[J]. Geomatics & Spatial Information Technology, 2019,42(6):38-42. ] [ Wang X, Li J Z, Yu B. Analysis of influence factors for extraction of hydrological basin features from DEM[J]. Geomatics & Spatial Information Technology, 2019,42(6):38-42. ]

    [5] 陈冬花, 邹陈, 王苏颖等. 基于DEM的伊犁河谷气温空间插值研究[J]. 光谱学与光谱分析, 2011,31(7):1925-1929. [ Chen DH, ZouC, Wang SY, et al. Study on spatial interpolation of the average temperature in the Yili river valley based on DEM[J]. Spectroscopy and Spectral Analysis, 2011,31(7):1925-1929. ] [ Chen D H, Zou C, Wang S Y, et al. Study on spatial interpolation of the average temperature in the Yili river valley based on DEM[J]. Spectroscopy and Spectral Analysis, 2011,31(7):1925-1929. ]

    [6] 黄琪. 基于DEM与LP的土地平整工程设计优化研究[D]. 南京:南京农业大学, 2011. [ HuangQ. Study on optional design for land leveling project based on DEM and LP[D]. Nanjing: Nanjing Agricultural University, 2011. ] [ Huang Q. Study on optional design for land leveling project based on DEM and LP[D]. Nanjing: Nanjing Agricultural University, 2011. ]

    [7] 葛韬. 某区域虚拟战场环境参谋系统的设计[D]. 大连:大连理工大学, 2017. [ GeT. Design of a regional virtual battlefield environment support system[D]. Dalian: Dalian University of Technology, 2017. ] [ Ge T. Design of a regional virtual battlefield environment support system[D]. Dalian: Dalian University of Technology, 2017. ]

    [8] 丁勇. 密码学与信息安全简明教程[M]. 北京: 电子工业出版社, 2015. [ DingY. Cryptography and information security concise tutorial[M]. Beijing: Publishing House of Electronics Industry, 2015. ] [ Ding Y. Cryptography and information security concise tutorial[M]. Beijing: Publishing House of Electronics Industry, 2015. ]

    [9] 辛运帏, 廖大春, 卢桂章. 单向散列函数的原理、实现和在密码学中的应用[J]. 计算机应用研究, 2002,19(2):25-27. [ Xin YW, Liao DC, Lu GZ. The principle and implement of one-way hash functions and their cryptographic application[J]. Application Research of Computers, 2002,19(2):25-27. ] [ Xin Y W, Liao D C, Lu G Z. The principle and implement of one-way hash functions and their cryptographic application[J]. Application Research of Computers, 2002,19(2):25-27. ]

    [10] 朱长青, 杨成松, 任娜. 论数字水印技术在地理空间数据安全中的应用[J]. 测绘通报, 2010(10):1-3. [ Zhu CQ, Yang CS, RenN. Application of digital watermarking to geospatial data security[J]. Bulletin of Surveying and Mapping, 2010(10):1-3. ] [ Zhu C Q, Yang C S, Ren N. Application of digital watermarking to geospatial data security[J]. Bulletin of Surveying and Mapping, 2010(10):1-3. ]

    [11] Cryptography and computer privacy[J]. Scientific American, 228, 15-23(1973).

    [12] 许惠. 基于数字水印技术的地理数据篡改责任认定方法研究——以DEM数据为例[D]. 南京:南京师范大学, 2015. [ XuH. Tampering responsibility identification method based on digital watermarking for geographical data: A case study of DEM data[D]. Nanjing: Nanjing Normal University, 2015. ] [ Xu H. Tampering responsibility identification method based on digital watermarking for geographical data: A case study of DEM data[D]. Nanjing: Nanjing Normal University, 2015. ]

    [13] 王刚, 任娜, 朱长青, 景旻. 倾斜摄影三维模型数字水印算法[J]. 地球信息科学学报, 2018,20(6):738-743. [ WangG, RenN, Zhu CQ, et al. The digital watermarking algorithm for 3D models of oblique photography[J]. Journal of Geo-information Science, 2018,20(6):738-743. ] [ Wang G, Ren N, Zhu C Q, et al. The digital watermarking algorithm for 3D models of oblique photography[J]. Journal of Geo-information Science, 2018,20(6):738-743. ]

    [14] 魏征, 闫浩文, 张黎明. 抗高程平移和裁剪的格网DEM盲水印算法[J]. 测绘科学, 2016,41(8):170-173. [ WeiZ, Yan HW, Zhang LM. A blind watermarking algorithm for grid DEM resisting elevation translation and cropping attacks[J]. Science of Surveying and Mapping, 2016,41(8):170-173. ] [ Wei Z, Yan H W, Zhang L M. A blind watermarking algorithm for grid DEM resisting elevation translation and cropping attacks[J]. Science of Surveying and Mapping, 2016,41(8):170-173. ]

    [15] 刘爱利, 丁浒, 田丹, 等. 基于坡度和坡向分析的DCT域DEM数字水印算法[J]. 武汉大学学报·信息科学版, 2016,41(7):903-910. [ Liu AL, DingH, TianD, et al. A DCT DEM digital watermarking algorithm based on the analysis of slope and aspect[J]. Geomatics and Information Science of Wuhan University, 2016,41(7):903-910. ] [ Liu A L, Ding H, Tian D, et al. A DCT DEM digital watermarking algorithm based on the analysis of slope and aspect[J]. Geomatics and Information Science of Wuhan University, 2016,41(7):903-910. ]

    [16] 朱长青, 许惠, 任娜. 顾及地形特征的DEM脆弱水印完整性认证算法[J]. 地球信息科学学报, 2016,18(3):369-375. [ Zhu CQ, XuH, RenN. A fragile watermarking algorithm for integrity authentication of DEM based on the terrain feature[J]. Journal of Geo-information Science, 2016,18(3):369-375. ] [ Zhu C Q, Xu H, Ren N. A fragile watermarking algorithm for integrity authentication of DEM based on the terrain feature[J]. Journal of Geo-information Science, 2016,18(3):369-375. ]

    [17] Robust audio hashing for content identification[C]. International Workshop on Content-Based Multimedia Indexing, University of Brescia., 4, 117-124(2001).

    [18] 牛夏牧, 焦玉华. 感知哈希综述[J]. 电子学报, 2008,36(7):1405-1411. [ Niu XM, Jiao YH. An overview of perceptual hashing[J]. Acta Electronica Sinica, 2008,36(7):1405-1411. ] [ Niu X M, Jiao Y H. An overview of perceptual hashing[J]. Acta Electronica Sinica, 2008,36(7):1405-1411. ]

    [19] Fast perceptual image hash based on cascade algorithm[C]. Applications of Digital Image Processing XL. Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, 10396(2017).

    [20] Perceptual hashing-based image Copy-Move forgery detection[J]. Security and Communication Networks, 1-11(2018).

    [21] 张春艳, 李京兵, 王双双. 基于离散小波变换和感知哈希的加密医学图像检索算法[J]. 计算机应用, 2018,38(2):539-544. [ Zhang CY, Li JB, Wang SS. Encrypted image retrieval algorithm based on discrete wavelet transform and perceptual hash[J]. Journal of Computer Applications, 2018,38(2):539-544. ] [ Zhang C Y, Li J B, Wang S S. Encrypted image retrieval algorithm based on discrete wavelet transform and perceptual hash[J]. Journal of Computer Applications, 2018,38(2):539-544. ]

    [22] et alA visual model-based perceptual image hash for content authentication[J]. IEEE Transactions on Information Forensics and Security, 10, 1336-1349(2015).

    [23] et alPerceptual hashing based forensics scheme for the integrity authentication of high resolution remote sensing image[J]. Information, 9, 1-17(2018).

    [24] 南希, 李爱农, 景金城. 中国山地起伏度计算中地形自适应滑动窗口获取与验证[J]. 地理与地理信息科学, 2017,33(4):34-39. [ NanX, Li AN, Jing JC. Calculation and verification of topography adaptive slide windows for the relief amplitude solution in mountain areas of China[J]. Geography and Geo-information Science, 2017,33(4):34-39. ] [ Nan X, Li A N, Jing J C. Calculation and verification of topography adaptive slide windows for the relief amplitude solution in mountain areas of China[J]. Geography and Geo-information Science, 2017,33(4):34-39. ]

    [25] 陈艳丽, 李少梅, 刘岱岳. 基于规则格网DEM的坡度坡向分析研究[J]. 测绘与空间地理信息, 2009,32(5):36-39. [ Chen YL, Li SM, Liu DY. Analysis of slope and aspect based on regular grid DEM[J]. Geomatics & Spatial Information Technology, 2009,32(5):36-39. ] [ Chen Y L, Li S M, Liu D Y. Analysis of slope and aspect based on regular grid DEM[J]. Geomatics & Spatial Information Technology, 2009,32(5):36-39. ]

    [26] 王银堂, 李伶杰, 胡庆芳等. 考虑局部趋势的非一致性水文频率分析方法[J]. 水科学进展, 2017,28(3):406-414. [ Wang YT, Li LJ, Hu QF, et al. Nonstationary hydrologic frequency analysis method considering local trends[J]. Advances in Water Science, 2017,28(3):406-414. ] [ Wang Y T, Li L J, Hu Q F, et al. Nonstationary hydrologic frequency analysis method considering local trends[J]. Advances in Water Science, 2017,28(3):406-414. ]

    [28] 晋蓓, 刘学军, 王彦芳. 格网DEM坡度计算模型的相似性研究[J]. 测绘科学, 2009,34(6):131-134. [ JinB, Liu XJ, Wang YF. Similarity assessment on slope models used in grid-based DEM[J]. Science of Surveying and Mapping, 2009,34(6):131-134. ] [ Jin B, Liu X J, Wang Y F. Similarity assessment on slope models used in grid-based DEM[J]. Science of Surveying and Mapping, 2009,34(6):131-134. ]

    [29] 李赵红, 侯建军. 基于Logistic混沌映射的DCT域脆弱数字水印算法[J]. 电子学报, 2006,34(12):2134-2137.

    [30] 武汉大学测绘学院测量平差学科组. 误差理论与测量平差基础[M]. 武汉: 武汉大学出版社, 2009. [ Subject Group of Surveying Adjustment, School of Surveying and Mapping, Wuhan University. The base of errors theory & surveying adjustment[M]. Wuhan: Wuhan University Press, 2009. ] [ Subject Group of Surveying Adjustment, School of Surveying and Mapping, Wuhan University. The base of errors theory & surveying adjustment[M]. Wuhan: Wuhan University Press, 2009. ]

    [31] 国家测绘局. 中华人民共和国测绘行业标准(基础地理信息数字产品1:10 000、1:50 000数字高程模型)[Z]. 2001. [ State Bureau of Surveying and Mapping. Standards for surveying and mapping industry of the People's Republic of China (basic geographic information digital products 1:10 000, 1:50 000 DEM)[Z]. 2001. ] [ State Bureau of Surveying and Mapping. Standards for surveying and mapping industry of the People's Republic of China (basic geographic information digital products 1:10 000, 1:50 000 DEM)[Z]. 2001. ]

    [32] et alExtraction of morphotectonic features from DEMs: Development and applications for study areas in hungary and NW Greece[J]. International Journal of Applied Earth Observations & Geoinformation, 7, 163-182(2005).

    Xingang ZHANG, Haowen YAN, Liming ZHANG. A Perceptual Hash Algorithm for DEM Data Authentication and Tamper Localization[J]. Journal of Geo-information Science, 2020, 22(3): 379
    Download Citation