{"id":"https://openalex.org/W2071897874","doi":"https://doi.org/10.1109/icoin.2015.7057864","title":"Selective-encrypted GIS vector map with low complexity","display_name":"Selective-encrypted GIS vector map with low complexity","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2071897874","doi":"https://doi.org/10.1109/icoin.2015.7057864","mag":"2071897874"},"language":"en","primary_location":{"id":"doi:10.1109/icoin.2015.7057864","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin.2015.7057864","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Information Networking (ICOIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102722702","display_name":"Jin\u2010Hyeok Park","orcid":"https://orcid.org/0000-0002-6839-4814"},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]},{"id":"https://openalex.org/I4210147194","display_name":"Convergence","ror":"https://ror.org/03kcznq08","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147194"]}],"countries":["KR","US"],"is_corresponding":true,"raw_author_name":"Jin-Hyeok Park","raw_affiliation_strings":["Dept. of IT Convergence and Application Engineering, Pukyong National University","Dept. of IT Convergence and Application Eng., Pukyong National University, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence and Application Engineering, Pukyong National University","institution_ids":["https://openalex.org/I8991828","https://openalex.org/I4210147194"]},{"raw_affiliation_string":"Dept. of IT Convergence and Application Eng., Pukyong National University, Korea","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067133464","display_name":"Pham Ngoc Giao","orcid":null},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]},{"id":"https://openalex.org/I4210147194","display_name":"Convergence","ror":"https://ror.org/03kcznq08","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147194"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Pham Ngoc Giao","raw_affiliation_strings":["Dept. of IT Convergence and Application Engineering, Pukyong National University","Dept. of IT Convergence and Application Eng., Pukyong National University, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence and Application Engineering, Pukyong National University","institution_ids":["https://openalex.org/I8991828","https://openalex.org/I4210147194"]},{"raw_affiliation_string":"Dept. of IT Convergence and Application Eng., Pukyong National University, Korea","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063884850","display_name":"Teak-Young Seung","orcid":null},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]},{"id":"https://openalex.org/I4210147194","display_name":"Convergence","ror":"https://ror.org/03kcznq08","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147194"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Teak-Young Seung","raw_affiliation_strings":["Dept. of IT Convergence and Application Engineering, Pukyong National University","Dept. of IT Convergence and Application Eng., Pukyong National University, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence and Application Engineering, Pukyong National University","institution_ids":["https://openalex.org/I8991828","https://openalex.org/I4210147194"]},{"raw_affiliation_string":"Dept. of IT Convergence and Application Eng., Pukyong National University, Korea","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037514322","display_name":"Ki\u2010Ryong Kwon","orcid":"https://orcid.org/0000-0002-1879-748X"},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]},{"id":"https://openalex.org/I4210147194","display_name":"Convergence","ror":"https://ror.org/03kcznq08","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I4210147194"]}],"countries":["KR","US"],"is_corresponding":false,"raw_author_name":"Ki-Ryong Kwon","raw_affiliation_strings":["Dept. of IT Convergence and Application Engineering, Pukyong National University","Dept. of IT Convergence and Application Eng., Pukyong National University, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence and Application Engineering, Pukyong National University","institution_ids":["https://openalex.org/I8991828","https://openalex.org/I4210147194"]},{"raw_affiliation_string":"Dept. of IT Convergence and Application Eng., Pukyong National University, Korea","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035014045","display_name":"Kwang-Seok Moon","orcid":null},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Kwang-Seok Moon","raw_affiliation_strings":["Dept. of Electronics Engineering, Pukyong National University, Busan, South Korea","[Department of electronics engineering, Pukyong National University, Busan, South Korea]"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronics Engineering, Pukyong National University, Busan, South Korea","institution_ids":["https://openalex.org/I8991828"]},{"raw_affiliation_string":"[Department of electronics engineering, Pukyong National University, Busan, South Korea]","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040826208","display_name":"Gi-Chang Kwon","orcid":null},"institutions":[{"id":"https://openalex.org/I213411275","display_name":"Chungbuk Provincial College","ror":"https://ror.org/03h3tha15","country_code":"KR","type":"education","lineage":["https://openalex.org/I213411275"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Gi-Chang Kwon","raw_affiliation_strings":["Dept. of IT Cooperative System, Gyeongbuk Provincial College","Dept. of IT Cooperative System, Gyeongbuk Provincial College, Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Cooperative System, Gyeongbuk Provincial College","institution_ids":["https://openalex.org/I213411275"]},{"raw_affiliation_string":"Dept. of IT Cooperative System, Gyeongbuk Provincial College, Korea","institution_ids":["https://openalex.org/I213411275"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041246106","display_name":"Suk\u2010Hwan Lee","orcid":"https://orcid.org/0000-0003-4779-2888"},"institutions":[{"id":"https://openalex.org/I4210104306","display_name":"Tongmyong University","ror":"https://ror.org/01asa8g02","country_code":"KR","type":"education","lineage":["https://openalex.org/I4210104306"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Suk-Hwan Lee","raw_affiliation_strings":["Dept. of Information Security, Tongmyong University, Busan, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Security, Tongmyong University, Busan, South Korea","institution_ids":["https://openalex.org/I4210104306"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5102722702"],"corresponding_institution_ids":["https://openalex.org/I4210147194","https://openalex.org/I8991828"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.07555987,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"98","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9782000184059143,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vector-map","display_name":"Vector map","score":0.951606035232544},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8188910484313965},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7697259187698364},{"id":"https://openalex.org/keywords/raster-graphics","display_name":"Raster graphics","score":0.5647289156913757},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5575655698776245},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4387814402580261},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4140247106552124},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38882607221603394},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.30537843704223633},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.286786824464798},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.26836711168289185}],"concepts":[{"id":"https://openalex.org/C177292542","wikidata":"https://www.wikidata.org/wiki/Q440959","display_name":"Vector map","level":2,"score":0.951606035232544},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8188910484313965},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7697259187698364},{"id":"https://openalex.org/C181844469","wikidata":"https://www.wikidata.org/wiki/Q182270","display_name":"Raster graphics","level":2,"score":0.5647289156913757},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5575655698776245},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4387814402580261},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4140247106552124},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38882607221603394},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.30537843704223633},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.286786824464798},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26836711168289185},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icoin.2015.7057864","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icoin.2015.7057864","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Conference on Information Networking (ICOIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1990979552","https://openalex.org/W2015464029","https://openalex.org/W2018054920","https://openalex.org/W2030296934","https://openalex.org/W2042832664","https://openalex.org/W2078581806","https://openalex.org/W2126113243","https://openalex.org/W2131814058","https://openalex.org/W2135415776","https://openalex.org/W2406304077","https://openalex.org/W6679652399","https://openalex.org/W6713550853"],"related_works":["https://openalex.org/W3021838264","https://openalex.org/W1965226578","https://openalex.org/W4200576431","https://openalex.org/W2119197559","https://openalex.org/W4250244710","https://openalex.org/W2577103727","https://openalex.org/W3174191107","https://openalex.org/W4243246249","https://openalex.org/W4236831295","https://openalex.org/W2378276395"],"abstract_inverted_index":{"Recently":[0],"years,":[1],"vector":[2,29,49,71,79,101,118],"map":[3,9,23,30,50,60,72,80,102,119,197,200],"has":[4,82],"many":[5,15],"advantages":[6],"than":[7],"raster":[8],"when":[10],"it":[11,187],"is":[12,51,156,201],"used":[13],"in":[14,26,140],"domains":[16],"as":[17],"research,":[18],"education,":[19],"military":[20],"or":[21,89,174],"digital":[22,59],"services.":[24],"And":[25],"most":[27],"cases":[28],"data":[31,103],"contains":[32],"confidential":[33],"information":[34],"which":[35],"must":[36],"be":[37],"kept":[38],"away":[39],"from":[40],"unauthorized":[41,90,168],"users.":[42,91,127],"Moreover,":[43],"the":[44,55,67,93,100,113,182],"producing":[45],"process":[46],"of":[47,57,70,77,136,184],"a":[48,58,74],"considerably":[52],"complex,":[53],"and":[54,108,138,148,158,167,186,198],"maintenance":[56],"requires":[61],"substantial":[62],"monetary,":[63],"human":[64],"resources.":[65],"With":[66],"rapid":[68],"development":[69],"contents,":[73],"large":[75],"volume":[76],"valuable":[78],"dataset":[81],"been":[83],"illegal":[84],"distributed":[85],"by":[86,145],"pirates,":[87],"hackers":[88],"Therefore":[92],"problem":[94],"focuses":[95],"on":[96],"how":[97],"to":[98,125,143,172],"protect":[99],"for":[104,117,121],"multimedia":[105],"applications,":[106],"storage":[107],"transmission.":[109],"This":[110],"paper":[111],"presents":[112],"selective":[114],"encryption":[115,165],"algorithm":[116,155],"protection":[120],"storage,":[122],"transmission,":[123],"distribution":[124],"authorized":[126],"In":[128],"proposed":[129,154],"algorithm,":[130],"we":[131],"just":[132],"select":[133],"some":[134],"values":[135],"polylines":[137],"polygons":[139],"DCT":[141],"domain":[142],"encrypt":[144],"random":[146],"algorithms":[147],"cryptography.":[149],"Experimental":[150],"results":[151],"verified":[152],"that":[153],"effectively":[157],"security.":[159],"Maps":[160],"are":[161],"changed":[162],"whole":[163],"after":[164],"process,":[166],"users":[169],"cannot":[170],"access":[171],"copy":[173],"use":[175],"them.":[176],"Encrypted":[177],"maps":[178],"do":[179],"not":[180,189],"alter":[181],"size":[183],"file":[185],"does":[188],"have":[190],"loss":[191],"accuracy.":[192],"The":[193],"error":[194],"between":[195],"original":[196],"decrypted":[199],"approximate":[202],"zero":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
