{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T16:18:46Z","timestamp":1770826726330,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T00:00:00Z","timestamp":1630972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["41971338"],"award-info":[{"award-number":["41971338"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42071362"],"award-info":[{"award-number":["42071362"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20191373"],"award-info":[{"award-number":["BK20191373"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Earth Sci Inform"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s12145-021-00684-5","type":"journal-article","created":{"date-parts":[[2021,9,7]],"date-time":"2021-09-07T03:24:37Z","timestamp":1630985077000},"page":"2249-2263","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Commutative encryption and watermarking based on SVD for secure GIS vector data"],"prefix":"10.1007","volume":"14","author":[{"given":"Na","family":"Ren","sequence":"first","affiliation":[]},{"given":"Ming","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Changqing","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yazhou","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,7]]},"reference":[{"key":"684_CR1","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/938515","volume":"2009","author":"F Battisti","year":"2009","unstructured":"Battisti F, Cancellaro M, Boato G et al (2009) Joint watermarking and encryption of color images in the Fibonacci-Haar domain. EURASIP J Adv Signal Process 2009:938515. https:\/\/doi.org\/10.1155\/2009\/938515","journal-title":"EURASIP J Adv Signal Process"},{"key":"684_CR2","doi-asserted-by":"crossref","unstructured":"Battisti F, Cancellaro M, Carli M et al (2008) Watermarking and encryption of color images in the Fibonacci domain. Image processing: algorithms and systems 6812:68121C","DOI":"10.1117\/12.768517"},{"issue":"9","key":"684_CR3","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1049\/el:20080492","volume":"44","author":"G Boato","year":"2008","unstructured":"Boato G, Conci N, Conotter V et al (2008) Multimedia asymmetric watermarking and encryption. Electron Lett 44(9):601\u2013602. https:\/\/doi.org\/10.1049\/el:20080492","journal-title":"Electron Lett"},{"issue":"2","key":"684_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MSP.2012.2230220","volume":"30","author":"A Boho","year":"2013","unstructured":"Boho A, Van Wallendael G, Dooms A et al (2013) End-to-end security for video distribution. IEEE Signal Process Mag 30(2):97\u2013107. https:\/\/doi.org\/10.1109\/MSP.2012.2230220","journal-title":"IEEE Signal Process Mag"},{"issue":"1","key":"684_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2010.11.001","volume":"26","author":"M Cancellaro","year":"2011","unstructured":"Cancellaro M, Battisti F, Carli M et al (2011) A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Signal Process Image Communication 26(1):1\u201312. https:\/\/doi.org\/10.1016\/j.image.2010.11.001","journal-title":"Signal Process Image Commun"},{"key":"684_CR6","doi-asserted-by":"publisher","unstructured":"Cancellaro M, Carli M, Egiazarian K, Astola J (2007) Perceptual data hiding in tree structured Haar transform domain. In: Security, steganography, and watermarking of multimedia contents IX. SPIE, 65051Q. https:\/\/doi.org\/10.1117\/12.704521","DOI":"10.1117\/12.704521"},{"key":"684_CR7","doi-asserted-by":"publisher","unstructured":"Cancellaro M, Battisti F, Carli M, et al. (2008) A joint digital watermarking and encryption method. In: Security, Forensics, steganography, and watermarking of multimedia contents X. SPIE, 68191C. https:\/\/doi.org\/10.1117\/12.766650","DOI":"10.1117\/12.766650"},{"key":"684_CR8","unstructured":"Deng S, Lu L, Deng S, Che S (2007) Research on a digital watermarking algorithm suitable to vector map. In: 2007 IEEE international conference on automation and logistics, pp 1236\u20131240"},{"issue":"1","key":"684_CR9","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s11042-008-0258-4","volume":"43","author":"L Ertaul","year":"2007","unstructured":"Ertaul L, Vaidehi (2007) Implementation of homomorphic encryption schemes for secure packet forwarding in mobile ad hoc networks (MANETs). IJCSNS Int J Comput Sci Netw Secur 7(11):132\u2013141","journal-title":"IJCSNS Int J Comput Sci Netw Secur"},{"issue":"6","key":"684_CR10","doi-asserted-by":"publisher","first-page":"1630","DOI":"10.1111\/tgis.12670","volume":"24","author":"MQ Guo","year":"2020","unstructured":"Guo MQ, Han CD, Guan QF et al (2020) A universal parallel scheduling approach to polyline and polygon vector data buffer analysis on conventional GIS platforms. Trans GIS 24(6):1630\u20131654. https:\/\/doi.org\/10.1111\/tgis.12670","journal-title":"Trans GIS"},{"key":"684_CR11","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.sigpro.2018.03.010","volume":"149","author":"ZY Hua","year":"2018","unstructured":"Hua ZY, Jin F, Xu BX, Huang HJ (2018) 2D Logistic-Sine-coupling map for image encryption. Signal Process 149:148\u2013161. https:\/\/doi.org\/10.1016\/j.sigpro.2018.03.010","journal-title":"Signal Process"},{"issue":"14","key":"684_CR12","doi-asserted-by":"publisher","first-page":"16011","DOI":"10.1007\/s11042-016-3893-1","volume":"76","author":"BJ Jang","year":"2017","unstructured":"Jang BJ, Lee SH, Lee E et al (2017) A crypto-marking method for secure vector map. Multimed Tools Appl 76(14):16011\u201316044. https:\/\/doi.org\/10.1007\/s11042-016-3893-1","journal-title":"Multimed Tools Appl"},{"issue":"23","key":"684_CR13","doi-asserted-by":"publisher","first-page":"30575","DOI":"10.1007\/s11042-018-6142-y","volume":"77","author":"L Jiang","year":"2018","unstructured":"Jiang L (2018) The identical operands commutative encryption and watermarking based on homomorphism. Multimed Tools Appl 77(23):30575\u201330594. https:\/\/doi.org\/10.1007\/s11042-018-6142-y","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"684_CR14","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1007\/s11042-012-1181-2","volume":"70","author":"L Jiang","year":"2014","unstructured":"Jiang L, Xu ZQ, Xu YY (2014) Commutative encryption and watermarking based on orthogonal decomposition. Multimed Tools Appl 70(3):1617\u20131635. https:\/\/doi.org\/10.1007\/s11042-012-1181-2","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"684_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13319-017-0148-5","volume":"8","author":"M Kumari","year":"2017","unstructured":"Kumari M, Gupta S, Sardana P (2017) A survey of image encryption algorithms. 3D Research 8(4):1\u201335. https:\/\/doi.org\/10.1007\/s13319-017-0148-5","journal-title":"3D Res"},{"issue":"2","key":"684_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10707-011-0133-8","volume":"16","author":"J Lafaye","year":"2012","unstructured":"Lafaye J, B\u00e9guec J, Gross-Amblard D, Ruas A (2012) Blind and squaring-resistant watermarking of vectorial building layers. GeoInformatica 16(2):245\u2013279. https:\/\/doi.org\/10.1007\/s10707-011-0133-8","journal-title":"GeoInformatica"},{"issue":"1","key":"684_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s11042-008-0258-4","volume":"43","author":"SG Lian","year":"2009","unstructured":"Lian SG (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tools Appl 43(1):91\u2013107. https:\/\/doi.org\/10.1007\/s11042-008-0258-4","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"684_CR18","doi-asserted-by":"publisher","first-page":"0805","DOI":"10.1117\/1.2333510","volume":"45","author":"SG Lian","year":"2006","unstructured":"Lian SG, Liu ZX, Zhen R, Wang HL (2006) Commutative watermarking and encryption for media data. Optical Engineering 45(8):0805. https:\/\/doi.org\/10.1117\/1.2333510","journal-title":"Opt Eng"},{"issue":"10","key":"684_CR19","doi-asserted-by":"publisher","first-page":"3320","DOI":"10.1016\/j.camwa.2010.03.017","volume":"59","author":"HJ Liu","year":"2010","unstructured":"Liu HJ, Wang XY (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320\u20133327. https:\/\/doi.org\/10.1016\/j.camwa.2010.03.017","journal-title":"Comput Math Appl"},{"key":"684_CR20","doi-asserted-by":"crossref","unstructured":"Park SW, Shin SU (2008) Combined scheme of encryption and watermarking in H.264\/Scalable Video Coding (SVC). In: New directions in intelligent interactive multimedia. Springer, Berlin, pp 351\u2013361","DOI":"10.1007\/978-3-540-68127-4_37"},{"issue":"9","key":"684_CR21","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1109\/TIFS.2019.2899520","volume":"14","author":"F Peng","year":"2019","unstructured":"Peng F, Lin ZX, Zhang X, Long M (2019) Reversible data hiding in encrypted 2d vector graphics based on reversible mapping model for real numbers. IEEE Trans Inf Forensics Secur 14(9):2400\u20132411. https:\/\/doi.org\/10.1109\/TIFS.2019.2899520","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"684_CR22","doi-asserted-by":"publisher","first-page":"221481","DOI":"10.1109\/ACCESS.2020.3043450","volume":"8","author":"N Ren","year":"2020","unstructured":"Ren N, Zhu CQ, Tong DY et al (2020) Commutative encryption and watermarking algorithm based on feature invariants for secure vector map. IEEE Access 8:221481\u2013221493. https:\/\/doi.org\/10.1109\/ACCESS.2020.3043450","journal-title":"IEEE Access"},{"issue":"1","key":"684_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41651-020-00055-6","volume":"4","author":"S Schmidt","year":"2020","unstructured":"Schmidt S, Barron C (2020) Mapping impervious surfaces precisely\u2014a GIS-based methodology combining vector data and high-resolution airborne imagery. J Geovis Spatial Anal 4(1):1\u201310. https:\/\/doi.org\/10.1007\/s41651-020-00055-6","journal-title":"J Geovis Spatial Anal"},{"key":"684_CR24","doi-asserted-by":"publisher","unstructured":"Schmitz R, Li SJ, Grecos C, Zhang XP (2013) Towards more robust commutative watermarking-encryption of images. In: IEEE international symposium on multimedia-ISM 283\u2013286. https:\/\/doi.org\/10.1109\/ISM.2013.54","DOI":"10.1109\/ISM.2013.54"},{"key":"684_CR25","volume-title":"Linear algebra","author":"J Shou","year":"2007","unstructured":"Shou J, Wei Z (2007) Linear algebra. Xi\u2019an Jiaotong University Press, Xi\u2019an"},{"issue":"3","key":"684_CR26","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s00530-003-0093-4","volume":"9","author":"D Simitopoulos","year":"2003","unstructured":"Simitopoulos D, Zissis N, Georgiadis P, et al. (2003) Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD. Multimed Syst 9(3):217\u2013227. https:\/\/doi.org\/10.1007\/s00530-003-0093-4","journal-title":"Multimed Syst"},{"issue":"1","key":"684_CR27","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s41651-021-00078-7","volume":"5","author":"Y Tao","year":"2021","unstructured":"Tao Y, Liu C, Liu C et al (2021) Empirical wavelet transform method for GNSS coordinate series denoising. J Geovis Spatial Anal 5(1):9. https:\/\/doi.org\/10.1007\/s41651-021-00078-7","journal-title":"J Geovis Spatial Anal"},{"issue":"20","key":"684_CR28","doi-asserted-by":"publisher","first-page":"20935","DOI":"10.1007\/s11042-016-3970-5","volume":"76","author":"NN Wang","year":"2017","unstructured":"Wang NN (2017) Reversible watermarking for 2D vector maps based on normalized vertices. Multimed Tools Appl 76(20):20935\u201320953. https:\/\/doi.org\/10.1007\/s11042-016-3970-5","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"684_CR29","doi-asserted-by":"publisher","first-page":"323","DOI":"10.3837\/tiis.2020.01.018","volume":"14","author":"YY Wang","year":"2020","unstructured":"Wang YY, Yang CS, Ren N et al (2020) An adaptive watermark detection algorithm for vector geographic data. KSII Trans Internet Inf Syst 14(1):323\u2013343. https:\/\/doi.org\/10.3837\/tiis.2020.01.018","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"6","key":"684_CR30","doi-asserted-by":"publisher","first-page":"1585","DOI":"10.1007\/s11042-016-3893-1","volume":"13","author":"CY Wang","year":"2017","unstructured":"Wang CY, Zhang YP, Zhou X (2017) Review on digital image watermarking based on singular value decomposition. J Inf Process Syst13(6):1585\u20131601. https:\/\/doi.org\/10.3745\/JIPS.03.0086","journal-title":"J Inf Process Syst"},{"issue":"4","key":"684_CR31","doi-asserted-by":"publisher","first-page":"642","DOI":"10.3390\/app9040642","volume":"9","author":"X Xi","year":"2019","unstructured":"Xi X, Zhang XC, Liang WD et al (2019) Dual zero-watermarking scheme for two-dimensional vector map based on delaunay triangle mesh and singular value decomposition. Appl Sci Basel 9(4):642. https:\/\/doi.org\/10.3390\/app9040642","journal-title":"Appl Sci Basel"},{"key":"684_CR32","unstructured":"Xu ZQ, Xiong LZ, Jiang L (2015) Review of commutative encryption and watermarking. Sciencepaper Online. http:\/\/www.paper.edu.cn\/releasepaper\/content\/201512-538."},{"issue":"6","key":"684_CR33","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.compenvurbsys.2010.10.004","volume":"35","author":"HW Yan","year":"2011","unstructured":"Yan HW, Li J, Wen H (2011) A key points-based blind watermarking approach for vector geo-spatial data. Comput Environ Urban Syst 35(6):485\u2013492. https:\/\/doi.org\/10.1016\/j.compenvurbsys.2010.10.004","journal-title":"Comput Environ Urban Syst"},{"issue":"11","key":"684_CR34","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1002\/sec.742","volume":"6","author":"XP Zhang","year":"2013","unstructured":"Zhang XP (2013) Commutative reversible data hiding and encryption. Secur Commun Netw 6(11):1396\u20131403. https:\/\/doi.org\/10.1002\/sec.742","journal-title":"Secur Commun Netw"},{"issue":"41","key":"684_CR35","doi-asserted-by":"publisher","first-page":"31375","DOI":"10.1007\/s11042-020-09573-3","volume":"79","author":"LM Zhang","year":"2020","unstructured":"Zhang LM, Yan HW et al (2020) Combinational spatial and frequency domains watermarking for 2D vector maps. Multimedia tools and applications, 79(41):31375\u201331387. https:\/\/doi.org\/10.1007\/s11042-020-09573-3","journal-title":"Multimed Tools Appl"},{"issue":"7","key":"684_CR36","doi-asserted-by":"publisher","first-page":"3475","DOI":"10.3837\/tiis.2018.07.026","volume":"12","author":"QF Zhou","year":"2018","unstructured":"Zhou QF, Ren N, Zhu CQ, Tong DY (2018) Storage feature-based watermarking algorithm with coordinate values preservation for vector line data. KSII Trans Internet Inf Syst 12(7):3475\u20133496. https:\/\/doi.org\/10.3837\/tiis.2018.07.026","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"10","key":"684_CR37","doi-asserted-by":"publisher","first-page":"1609","DOI":"10.11947\/j.AGCS.2017.20170301","volume":"46","author":"CQ Zhu","year":"2017","unstructured":"Zhu CQ (2017) Research progresses in digital watermarking and encryption control for geographical data. Acta Geod et Cartogr Sin 46(10):1609\u20131619. https:\/\/doi.org\/10.11947\/j.AGCS.2017.20170301","journal-title":"Acta Geod et Cartogr Sin"},{"key":"684_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2020.107629","volume":"175","author":"LY Zhu","year":"2020","unstructured":"Zhu LY, Song HS, Zhang X et al (2020) A robust meaningful image encryption scheme based on block compressive sensing and SVD embedding. Signal Process 175:107629. https:\/\/doi.org\/10.1016\/j.sigpro.2020.107629","journal-title":"Signal Process"}],"container-title":["Earth Science Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-021-00684-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12145-021-00684-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-021-00684-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,6]],"date-time":"2021-11-06T05:25:54Z","timestamp":1636176354000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12145-021-00684-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,7]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["684"],"URL":"https:\/\/doi.org\/10.1007\/s12145-021-00684-5","relation":{},"ISSN":["1865-0473","1865-0481"],"issn-type":[{"value":"1865-0473","type":"print"},{"value":"1865-0481","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,7]]},"assertion":[{"value":"8 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}