{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:34:23Z","timestamp":1772120063813,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T00:00:00Z","timestamp":1688428800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T00:00:00Z","timestamp":1688428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42271430"],"award-info":[{"award-number":["42271430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42271430"],"award-info":[{"award-number":["42271430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42271430"],"award-info":[{"award-number":["42271430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42271430"],"award-info":[{"award-number":["42271430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42271430"],"award-info":[{"award-number":["42271430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["42271430"],"award-info":[{"award-number":["42271430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Earth Sci Inform"],"published-print":{"date-parts":[[2023,9]]},"DOI":"10.1007\/s12145-023-01034-3","type":"journal-article","created":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T18:01:45Z","timestamp":1688493705000},"page":"2939-2954","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DNA dynamic coding-based encryption algorithm for vector map considering global objects"],"prefix":"10.1007","volume":"16","author":[{"given":"Qingbo","family":"Yan","sequence":"first","affiliation":[]},{"given":"Haowen","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Liming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Pengbo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaojing","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,4]]},"reference":[{"issue":"7","key":"1034_CR1","doi-asserted-by":"publisher","first-page":"818","DOI":"10.9717\/kmms.2015.18.7.818","volume":"18","author":"NV Bang","year":"2015","unstructured":"Bang NV, Moon KS, Lim S (2015) Selective encryption scheme for vector map data using chaotic map. J Korea Multimedia Soc 18(7):818\u2013826","journal-title":"J Korea Multimedia Soc"},{"issue":"Complete","key":"1034_CR2","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.optlaseng.2016.08.009","volume":"88","author":"XL Chai","year":"2017","unstructured":"Chai XL, Chen YR, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88(Complete):197\u2013213","journal-title":"Opt Lasers Eng"},{"issue":"3","key":"1034_CR3","doi-asserted-by":"publisher","first-page":"2671","DOI":"10.1007\/s11071-022-07328-3","volume":"108","author":"XL Chai","year":"2022","unstructured":"Chai XL, Fu JY, Gan ZH (2022) An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn 108(3):2671\u20132704","journal-title":"Nonlinear Dyn"},{"issue":"9","key":"1034_CR4","doi-asserted-by":"publisher","first-page":"108041","DOI":"10.1016\/j.sigpro.2021.108041","volume":"183","author":"XL Chai","year":"2021","unstructured":"Chai XL, Zhi XC, Gan ZH (2021) Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Sig Process 183(9):108041","journal-title":"Sig Process"},{"key":"1034_CR5","first-page":"149","volume":"01","author":"JP Chen","year":"2020","unstructured":"Chen JP, Zhang LM, Jiang MR (2020a) A collusion-based vector spatial data fingerprinting scheme. Sci Surveying Mapp 01:149\u2013156","journal-title":"Sci Surveying Mapp"},{"issue":"08","key":"1034_CR6","first-page":"81","volume":"521","author":"JP Chen","year":"2020","unstructured":"Chen JP, Zhang LM, Jiang MR (2020b) Digital fingerprint algorithm for vector spatial data using GD-PBIBD coding. Bull Surv Mapp 521(08):81\u201386100","journal-title":"Bull Surv Mapp"},{"issue":"3","key":"1034_CR7","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1147\/rd.383.0243","volume":"38","author":"D Coppersmith","year":"1994","unstructured":"Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. Ibm J Res Dev 38(3):243\u2013250","journal-title":"Ibm J Res Dev"},{"issue":"4","key":"1034_CR8","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1007\/s11036-018-0997-z","volume":"23","author":"Q Da","year":"2018","unstructured":"Da Q, Sun J, Zhang L (2018) A novel hybrid information security scheme for 2D vector map. Mob Netw Appl 23(4):734\u2013742","journal-title":"Mob Netw Appl"},{"key":"1034_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4","volume-title":"The design of Rijndael: AES - the advanced encryption standard","author":"J Daemen","year":"2002","unstructured":"Daemen J, Rijmen V (2002) The design of Rijndael: AES - the advanced encryption standard. Springer-verlag, Berlin, Heidelberg, Germany"},{"key":"1034_CR10","doi-asserted-by":"publisher","unstructured":"Fridrich J (1997) Image encryption based on chaotic maps. 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, Orlando, FL, USA, pp. 1105\u20131110.\u00a0https:\/\/doi.org\/10.1109\/ICSMC.1997.638097","DOI":"10.1109\/ICSMC.1997.638097"},{"key":"1034_CR11","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1016\/j.ins.2018.12.048","volume":"480","author":"Z Hua","year":"2019","unstructured":"Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403\u2013419","journal-title":"Inf Sci"},{"issue":"3","key":"1034_CR12","doi-asserted-by":"publisher","first-page":"173804","DOI":"10.1007\/s11704-022-1419-8","volume":"17","author":"XL Huang","year":"2023","unstructured":"Huang XL, Dong YX, Ye GD (2023) Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform. Front Comput Sci 17(3):173804","journal-title":"Front Comput Sci"},{"key":"1034_CR13","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.dsp.2013.09.013","volume":"25","author":"BJ Jang","year":"2014","unstructured":"Jang BJ, Lee SH, Kwon KR (2014) Perceptual encryption with compression for secure vector map data processing. Digit Signal Proc 25:224\u2013243","journal-title":"Digit Signal Proc"},{"issue":"2","key":"1034_CR14","first-page":"1","volume":"4","author":"M Li","year":"2020","unstructured":"Li M, Stefanakis E (2020) Geospatial operations of discrete global grid systems \u2014 a comparison with traditional GIS. J Geovisualization Spat Anal 4(2):1\u201321","journal-title":"J Geovisualization Spat Anal"},{"issue":"04","key":"1034_CR15","first-page":"747","volume":"44","author":"AB Li","year":"2015","unstructured":"Li AB, Wang HR, Zhou W (2015) Scrambling encryption of vector digital map based on 2D chaos system. J China Univ Min Technol 44(04):747\u2013753","journal-title":"J China Univ Min Technol"},{"issue":"11","key":"1034_CR16","doi-asserted-by":"publisher","first-page":"718","DOI":"10.3390\/ijgi10110718","volume":"10","author":"Y Li","year":"2021","unstructured":"Li Y, Zhang LM, Wang XL (2021) A novel invariant based commutative encryption and watermarking algorithm for vector maps. ISPRS Int J Geo-Information 10(11):718","journal-title":"ISPRS Int J Geo-Information"},{"issue":"16\u201317","key":"1034_CR17","doi-asserted-by":"publisher","first-page":"3895","DOI":"10.1016\/j.optcom.2011.04.001","volume":"284","author":"H Liu","year":"2011","unstructured":"Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16\u201317):3895\u20133903","journal-title":"Opt Commun"},{"key":"1034_CR18","doi-asserted-by":"publisher","unstructured":"Lu Y, Gong MX, Gan ZH (2023) Exploiting one-dimensional improved Chebyshev chaotic system and partitioned diffusion based on the divide-and-conquer principle for 3D medical model encryption. Chaos, Solitons Fractals 171:113449.\u00a0https:\/\/doi.org\/10.1016\/j.chaos.2023.113449","DOI":"10.1016\/j.chaos.2023.113449"},{"key":"1034_CR19","first-page":"13","volume":"01","author":"J Mao","year":"2017","unstructured":"Mao J, Zhu CQ, Zhang XG (2017) A fine-grained access control model for vector geospatial data. Geogr Geo-Information Sci 01:13\u201318","journal-title":"Geogr Geo-Information Sci"},{"key":"1034_CR20","unstructured":"Min LQ (2005) An encryption algorithm of Vector Map Data.\u00a0Hydrographic Surveying & Charting 25(2):55\u201357"},{"issue":"9","key":"1034_CR21","doi-asserted-by":"publisher","first-page":"2400","DOI":"10.1109\/TIFS.2019.2899520","volume":"14","author":"F Peng","year":"2019","unstructured":"Peng F, Lin ZX, Zhang X (2019) Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers. IEEE Trans Inf Forensics Secur 14(9):2400\u20132411","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"22","key":"1034_CR22","doi-asserted-by":"publisher","first-page":"4889","DOI":"10.3390\/app9224889","volume":"9","author":"G Pham","year":"2019","unstructured":"Pham G, Ngo S, Bui A (2019) Vector map random encryption algorithm based on multi-scale simplification and gaussian distribution. Appl Sci 9(22):4889","journal-title":"Appl Sci"},{"issue":"2","key":"1034_CR23","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120\u2013126","journal-title":"Commun ACM"},{"key":"1034_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s41651-019-0044-z","volume":"4","author":"S Schmidt","year":"2020","unstructured":"Schmidt S, Barron C (2020) Mapping impervious surfaces precisely\u2014a GIS-Based methodology combining vector data and high-resolution airborne imagery. J Geovisualization Spat Anal 4:1\u201310","journal-title":"J Geovisualization Spat Anal"},{"issue":"10","key":"1034_CR25","first-page":"1627","volume":"46","author":"Q Sun","year":"2017","unstructured":"Sun Q (2017) Research on the progress of multi-sources geospatial vector data fusion. Acta Geodaetica Cartogr Sin 46(10):1627\u20131636","journal-title":"Acta Geodaetica Cartogr Sin"},{"issue":"11","key":"1034_CR26","first-page":"1518","volume":"47","author":"DY Tong","year":"2018","unstructured":"Tong DY, Zhu CQ, Ren N (2018) Watermarking algorithm applying to small amount of vector geographical data. Acta Geodaetica Cartogr Sin 47(11):1518\u20131525","journal-title":"Acta Geodaetica Cartogr Sin"},{"issue":"12","key":"1034_CR27","first-page":"6190","volume":"13","author":"DY Tong","year":"2019","unstructured":"Tong DY, Zhu CQ, Ren N (2019) High-capacity and robust watermarking scheme for small-scale vector data. KSII Trans Internet Inf Syst 13(12):6190\u20136213","journal-title":"KSII Trans Internet Inf Syst"},{"key":"1034_CR28","unstructured":"Wang YC (2017) Research on vector map aware encryption technology. Dissertation, Harbin Engineering University"},{"issue":"2","key":"1034_CR29","first-page":"10","volume":"11","author":"JY Wang","year":"2009","unstructured":"Wang JY (2009) Development of geographic information system and developing geographic information system. Strategic Study of CAE 11(2):10\u201316","journal-title":"Strategic Study of CAE"},{"key":"1034_CR30","first-page":"1","volume":"1","author":"XL Wang","year":"2021","unstructured":"Wang XL, Yan HW, Zhang LM (2021a) An encryption algorithm for vector maps based on the gaussian random and Haar transform. J Spat Sci 1:1\u201316","journal-title":"J Spat Sci"},{"issue":"5","key":"1034_CR31","doi-asserted-by":"publisher","first-page":"311","DOI":"10.3390\/ijgi10050311","volume":"10","author":"XL Wang","year":"2021","unstructured":"Wang XL, Yan HW, Zhang LM (2021b) Vector map encryption algorithm based on double random position permutation strategy. Int J Geo-Information 10(5):311","journal-title":"Int J Geo-Information"},{"key":"1034_CR32","doi-asserted-by":"publisher","unstructured":"Wu F, Cui W, Chen H (2008) A compound chaos-based encryption algorithm for vector geographic data under network circumstance. 2008 Congress on Image & Signal Processing, Sanya, China, pp. 254\u2013258. https:\/\/doi.org\/10.1109\/CISP.2008.86","DOI":"10.1109\/CISP.2008.86"},{"issue":"6","key":"1034_CR33","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.compenvurbsys.2010.10.004","volume":"35","author":"H Yan","year":"2011","unstructured":"Yan H, Li J, Hong W (2011) A key points-based blind watermarking approach for vector geo-spatial data. Computers Environ Urban Syst 35(6):485\u2013492","journal-title":"Computers Environ Urban Syst"},{"issue":"4","key":"1034_CR34","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s12145-017-0310-x","volume":"10","author":"HW Yan","year":"2017","unstructured":"Yan HW, Zhang LM, Yang WF (2017) A normalization-based watermarking scheme for 2D vector map data. Earth Sci Inf 10(4):471\u2013481","journal-title":"Earth Sci Inf"},{"issue":"04","key":"1034_CR35","first-page":"490","volume":"21","author":"H Yang","year":"2020","unstructured":"Yang H, Che S, Qu LC (2020) A multilevel digital fingerprint algorithm for vector map data. J Inform Eng Univ 21(04):490\u2013494","journal-title":"J Inform Eng Univ"},{"key":"1034_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2021.111631","volume":"155","author":"M Yildirim","year":"2022","unstructured":"Yildirim M (2022) Optical color image encryption scheme with a novel DNA encoding algorithm based on a chaotic circuit. Chaos Solit Fractals 155:111631","journal-title":"Chaos Solit Fractals"},{"issue":"7","key":"1034_CR37","first-page":"990","volume":"40","author":"LM Zhang","year":"2015","unstructured":"Zhang LM, Yan HW, Qi JX (2015) A blind watermarking algorithm for copyright protection of vector geospatial data under controllable errors based on DFT. Geo Inf Sci Wuhan Univ 40(7):990\u2013994","journal-title":"Geo Inf Sci Wuhan Univ"},{"issue":"2","key":"1034_CR38","first-page":"129","volume":"34","author":"CH Zhou","year":"2015","unstructured":"Zhou CH (2015) Prospects on pan-spatial information system. Prog Geogr 34(2):129\u2013131","journal-title":"Prog Geogr"},{"key":"1034_CR39","doi-asserted-by":"publisher","unstructured":"Zhou NR, Tong LJ, Zou WP (2023) Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation.\u00a0Signal Process\u00a0211 (2023):109107. https:\/\/doi.org\/10.1016\/j.sigpro.2023.109107","DOI":"10.1016\/j.sigpro.2023.109107"},{"issue":"10","key":"1034_CR40","first-page":"1609","volume":"46","author":"CQ Zhu","year":"2017","unstructured":"Zhu CQ (2017) Research progresses in digital watermarking and encryption control for geographical data. Acta Geod Cartogr Sin 46(10):1609\u20131619","journal-title":"Acta Geod Cartogr Sin"},{"issue":"6","key":"1034_CR41","first-page":"1017","volume":"51","author":"CQ Zhu","year":"2022","unstructured":"Zhu CQ, Ren N, Xu DJ (2022) Geo-information security technology: progress and prospects. Acta Geod Cartogr Sin 51(6):1017\u20131028","journal-title":"Acta Geod Cartogr Sin"}],"container-title":["Earth Science Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-023-01034-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12145-023-01034-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-023-01034-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T11:16:32Z","timestamp":1692875792000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12145-023-01034-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,4]]},"references-count":41,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["1034"],"URL":"https:\/\/doi.org\/10.1007\/s12145-023-01034-3","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-2788510\/v1","asserted-by":"object"}]},"ISSN":["1865-0473","1865-0481"],"issn-type":[{"value":"1865-0473","type":"print"},{"value":"1865-0481","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,4]]},"assertion":[{"value":"7 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"There is no conflict of interests among the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}