{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T04:43:58Z","timestamp":1758861838424,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T00:00:00Z","timestamp":1722038400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T00:00:00Z","timestamp":1722038400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["42271430","42271430"],"award-info":[{"award-number":["42271430","42271430"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Earth Sci Inform"],"published-print":{"date-parts":[[2024,10]]},"DOI":"10.1007\/s12145-024-01416-1","type":"journal-article","created":{"date-parts":[[2024,7,27]],"date-time":"2024-07-27T07:02:41Z","timestamp":1722063761000},"page":"4757-4771","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A novel lossless commutative encryption and watermarking algorithm for vector geographic dataset"],"prefix":"10.1007","volume":"17","author":[{"given":"Tao","family":"Tan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liming","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuaikang","family":"Liu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lei","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yan","family":"Jin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianing","family":"Xie","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,7,27]]},"reference":[{"issue":"08","key":"1416_CR1","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129\u20132151. https:\/\/doi.org\/10.1142\/S0218127406015970","journal-title":"Int J Bifurcat chaos"},{"issue":"7","key":"1416_CR2","doi-asserted-by":"publisher","first-page":"818","DOI":"10.9717\/kmms.2015.18.7.818","volume":"18","author":"N Bang","year":"2015","unstructured":"Bang N, Moon K, Lim S et al (2015) Selective encryption scheme for vector map data using chaotic map. J Korea Multimed Soc 18(7):818\u2013826. https:\/\/doi.org\/10.9717\/kmms.2015.18.7.818","journal-title":"J Korea Multimed Soc"},{"issue":"1","key":"1416_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.image.2010.11.001","volume":"26","author":"M Cancellaro","year":"2011","unstructured":"Cancellaro M, Battisti F, Carli M et al (2011) A commutative digital image watermarking and encryption method in the tree structured Haar transform domain. Sig Process Image Commun 26(1):1\u201312. https:\/\/doi.org\/10.1016\/j.image.2010.11.001","journal-title":"Sig Process Image Commun"},{"key":"1416_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103503","volume":"75","author":"S Guo","year":"2023","unstructured":"Guo S, Zhu S, Zhu C et al (2023) A robust and lossless commutative encryption and watermarking algorithm for vector geographic data. J Inform Secur Appl 75:103503. https:\/\/doi.org\/10.1016\/j.jisa.2023.103503","journal-title":"J Inform Secur Appl"},{"key":"1416_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2014.11.018","volume":"297","author":"Z Hua","year":"2015","unstructured":"Hua Z, Zhou Y, Pun C et al (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80\u201394. https:\/\/doi.org\/10.1016\/j.ins.2014.11.018","journal-title":"Inf Sci"},{"issue":"1","key":"1416_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/s41651-021-00098-3","volume":"7","author":"W Huang","year":"2023","unstructured":"Huang W (2023) Correction to: what were GIScience scholars interested in during the past decades? J Geovisualization Spat Anal 7(1):6. https:\/\/doi.org\/10.1007\/s41651-021-00098-3","journal-title":"J Geovisualization Spat Anal"},{"key":"1416_CR7","doi-asserted-by":"publisher","first-page":"30575","DOI":"10.1007\/s11042-018-6142-y","volume":"77","author":"L Jiang","year":"2018","unstructured":"Jiang L (2018) The identical operands commutative encryption and watermarking based on homomorphism. Multimed Tools Appl 77:30575\u201330594. https:\/\/doi.org\/10.1007\/s11042-018-6142-y","journal-title":"Multimed Tools Appl"},{"key":"1416_CR8","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1007\/s11042-012-1181-2","volume":"70","author":"L Jiang","year":"2014","unstructured":"Jiang L, Xu Z, Xu Y (2014) Commutative encryption and watermarking based on orthogonal decomposition. Multimed Tools Appl 70:1617\u20131635. https:\/\/doi.org\/10.1007\/s11042-012-1181-2","journal-title":"Multimed Tools Appl"},{"key":"1416_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169042","volume":"260","author":"C Li","year":"2022","unstructured":"Li C, Yang X (2022) An image encryption algorithm based on discrete fractional wavelet transform and quantum chaos. Optik 260:169042. https:\/\/doi.org\/10.1016\/j.ijleo.2022.169042","journal-title":"Optik"},{"key":"1416_CR10","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s11071-016-3030-8","volume":"87","author":"C Li","year":"2017","unstructured":"Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87:127\u2013133. https:\/\/doi.org\/10.1007\/s11071-016-3030-8","journal-title":"Nonlinear Dyn"},{"issue":"11","key":"1416_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi10110718","volume":"10","author":"Y Li","year":"2021","unstructured":"Li Y, Zhang L, Wang X et al (2021) A novel invariant based commutative encryption and watermarking algorithm for vector maps. ISPRS Int J Geo-Information 10(11):718. https:\/\/doi.org\/10.3390\/ijgi10110718","journal-title":"ISPRS Int J Geo-Information"},{"issue":"1","key":"1416_CR12","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s11042-008-0258-4","volume":"43","author":"S Lian","year":"2009","unstructured":"Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimed Tools Appl 43(1):91\u2013107. https:\/\/doi.org\/10.1007\/s11042-008-0258-4","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"1416_CR13","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1109\/TCSVT.2007.896635","volume":"17","author":"S Lian","year":"2007","unstructured":"Lian S, Liu Z, Ren Z et al (2007) Commutative encryption and watermarking in video compression. IEEE Trans Circuits Syst Video Technol 17(6):774\u2013778. https:\/\/doi.org\/10.1109\/TCSVT.2007.896635","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"1416_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2021.116462","volume":"99","author":"X Liang","year":"2021","unstructured":"Liang X, Xiang S, Yang L et al (2021) Robust and reversible image watermarking in homomorphic encrypted domain. Sig Process Image Commun 99:116462. https:\/\/doi.org\/10.1016\/j.image.2021.116462","journal-title":"Sig Process Image Commun"},{"key":"1416_CR15","doi-asserted-by":"publisher","first-page":"221481","DOI":"10.1109\/ACCESS.2020.3043450","volume":"8","author":"N Ren","year":"2020","unstructured":"Ren N, Zhu C, Tong D et al (2020) Commutative encryption and watermarking algorithm based on feature invariants for secure vector map. IEEE Access 8:221481\u2013221493. https:\/\/doi.org\/10.1109\/ACCESS.2020.3043450","journal-title":"IEEE Access"},{"key":"1416_CR16","doi-asserted-by":"publisher","first-page":"2249","DOI":"10.1007\/s12145-021-00684-5","volume":"14","author":"N Ren","year":"2021","unstructured":"Ren N, Zhao M, Zhu C et al (2021) Commutative encryption and watermarking based on SVD for secure GIS vector data. Earth Sci Inf 14:2249\u20132263. https:\/\/doi.org\/10.1007\/s12145-021-00684-5","journal-title":"Earth Sci Inf"},{"issue":"1","key":"1416_CR17","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s41651-022-00131-z","volume":"7","author":"K Shirani","year":"2023","unstructured":"Shirani K, Solhi S, Pasandi M (2023) Automatic landform recognition, extraction, and classification using Kernel Pattern modeling. J Geovisualization Spat Anal 7(1):2. https:\/\/doi.org\/10.1007\/s41651-022-00131-z","journal-title":"J Geovisualization Spat Anal"},{"key":"1416_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2024.105530","volume":"184","author":"T Tan","year":"2024","unstructured":"Tan T, Zhang L, Zhang M, Wang S et al (2024) Commutative encryption and watermarking algorithm based on compound chaotic systems and zero-watermarking for vector map. Comput Geosci 184:105530. https:\/\/doi.org\/10.1016\/j.cageo.2024.105530","journal-title":"Comput Geosci"},{"issue":"5","key":"1416_CR19","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi10050311","volume":"10","author":"X Wang","year":"2021","unstructured":"Wang X, Yan H, Zhang L (2021) Vector map encryption algorithm based on double random position permutation strategy. ISPRS Int J Geo-Inform 10(5):311. https:\/\/doi.org\/10.3390\/ijgi10050311","journal-title":"ISPRS Int J Geo-Inform"},{"issue":"2","key":"1416_CR20","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1080\/14498596.2021.1982420","volume":"68","author":"X Wang","year":"2023","unstructured":"Wang X, Yan H, Zhang L et al (2023a) An encryption algorithm for vector maps based on the gaussian random and Haar transform. J Spat Sci 68(2):303\u2013318. https:\/\/doi.org\/10.1080\/14498596.2021.1982420","journal-title":"J Spat Sci"},{"issue":"1","key":"1416_CR21","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1007\/s12145-022-00886-5","volume":"16","author":"S Wang","year":"2023","unstructured":"Wang S, Zhang L, Zhang Q et al (2023b) A zero-watermarking algorithm for vector geographic data based on feature invariants. Earth Sci Inf 16(1):1073\u20131089. https:\/\/doi.org\/10.1007\/s12145-022-00886-5","journal-title":"Earth Sci Inf"},{"key":"1416_CR22","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.sigpro.2018.06.008","volume":"153","author":"J Wu","year":"2018","unstructured":"Wu J, Liao X, Yang B (2018) Image encryption using 2D H\u00e9non-Sine map and DNA approach. Sig Process 153:11\u201323. https:\/\/doi.org\/10.1016\/j.sigpro.2018.06.008","journal-title":"Sig Process"},{"key":"1416_CR23","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.jvcir.2019.04.015","volume":"62","author":"H Wu","year":"2019","unstructured":"Wu H, Cheung Y, Yang Z et al (2019) A high-capacity reversible data hiding method for homomorphic encrypted images. J Vis Commun Image Represent 62:87\u201396. https:\/\/doi.org\/10.1016\/j.jvcir.2019.04.015","journal-title":"J Vis Commun Image Represent"},{"key":"1416_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijdrr.2020.101554","volume":"47","author":"J Xu","year":"2020","unstructured":"Xu J, Zhou H, Nie G et al (2020) Plotting earthquake emergency maps based on audience theory. Int J Disaster risk Reduct 47:101554. https:\/\/doi.org\/10.1016\/j.ijdrr.2020.101554","journal-title":"Int J Disaster risk Reduct"},{"issue":"3","key":"1416_CR25","doi-asserted-by":"publisher","first-page":"2939","DOI":"10.1007\/s12145-023-01034-3","volume":"16","author":"Q Yan","year":"2023","unstructured":"Yan Q, Yan H, Zhang L et al (2023) DNA dynamic coding-based encryption algorithm for vector map considering global objects. Earth Sci Inform 16(3):2939\u20132954. https:\/\/doi.org\/10.1007\/s12145-023-01034-3","journal-title":"Earth Sci Inform"},{"key":"1416_CR26","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.neucom.2017.04.016","volume":"251","author":"G Ye","year":"2017","unstructured":"Ye G, Huang X (2017) An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251:45\u201353. https:\/\/doi.org\/10.1016\/j.neucom.2017.04.016","journal-title":"Neurocomputing"},{"key":"1416_CR27","doi-asserted-by":"publisher","first-page":"2807","DOI":"10.1007\/s11071-021-06422-2","volume":"104","author":"G Ye","year":"2021","unstructured":"Ye G, Jiao K, Huang X (2021) Quantum logistic image encryption algorithm based on SHA-3 and RSA. Nonlinear Dyn 104:2807\u20132827. https:\/\/doi.org\/10.1007\/s11071-021-06422-2","journal-title":"Nonlinear Dyn"},{"issue":"1","key":"1416_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s41651-023-00132-6","volume":"7","author":"W Yue","year":"2023","unstructured":"Yue W, Wei J, Liu Y et al (2023) Investigating intra-urban functional polycentricity from a linkage perspective: the case of Changsha, China. J Geovisualization Spat Anal 7(1):1. https:\/\/doi.org\/10.1007\/s41651-023-00132-6","journal-title":"J Geovisualization Spat Anal"},{"issue":"11","key":"1416_CR29","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1002\/sec.742","volume":"6","author":"X Zhang","year":"2013","unstructured":"Zhang X (2013) Commutative reversible data hiding and encryption. Secur Commun Netw 6(11):1396\u20131403. https:\/\/doi.org\/10.1002\/sec.742","journal-title":"Secur Commun Netw"},{"issue":"11","key":"1416_CR30","doi-asserted-by":"publisher","DOI":"10.3390\/ijgi9110692","volume":"9","author":"Q Zhou","year":"2020","unstructured":"Zhou Q, Ren N, Zhu C et al (2020) Blind digital watermarking algorithm against projection transformation for vector geographic data. ISPRS Int J Geo-Information 9(11):692. https:\/\/doi.org\/10.3390\/ijgi9110692","journal-title":"ISPRS Int J Geo-Information"},{"issue":"2","key":"1416_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/sym13020208","volume":"13","author":"Q Zhou","year":"2021","unstructured":"Zhou Q, Zhu C, Ren N et al (2021) Zero watermarking algorithm for vector geographic data based on the number of neighboring features. Symmetry 13(2):208. https:\/\/doi.org\/10.3390\/sym13020208","journal-title":"Symmetry"},{"issue":"6","key":"1416_CR32","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.11947\/j.AGCS.2022.20220172","volume":"51","author":"C Zhu","year":"2022","unstructured":"Zhu C, Ren N, Xu D (2022) Geo-information security technology: progress and prospects. Acta Geodaetica Cartogr Sin 51(6):1017\u20131028. https:\/\/doi.org\/10.11947\/j.AGCS.2022.20220172","journal-title":"Acta Geodaetica Cartogr Sin"}],"container-title":["Earth Science Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-024-01416-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12145-024-01416-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12145-024-01416-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T18:23:14Z","timestamp":1729102994000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12145-024-01416-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,27]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1416"],"URL":"https:\/\/doi.org\/10.1007\/s12145-024-01416-1","relation":{},"ISSN":["1865-0473","1865-0481"],"issn-type":[{"type":"print","value":"1865-0473"},{"type":"electronic","value":"1865-0481"}],"subject":[],"published":{"date-parts":[[2024,7,27]]},"assertion":[{"value":"4 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 July 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}