{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T09:06:18Z","timestamp":1770455178793,"version":"3.49.0"},"reference-count":21,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Enterprise Information Systems"],"published-print":{"date-parts":[[2020,3,15]]},"DOI":"10.1080\/17517575.2019.1669830","type":"journal-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T12:38:43Z","timestamp":1569328723000},"page":"388-401","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["A map traceability management scheme for security control"],"prefix":"10.1080","volume":"14","author":[{"given":"Liguo","family":"Fang","sequence":"first","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Zhengxin","family":"Fu","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"given":"Cheng","family":"Yi","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4290-9098","authenticated-orcid":false,"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[{"name":"ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen, China"},{"name":"Guangdong Key Laboratory of Intelligent Information Processing, Shenzhen University, Shenzhen, China"},{"name":"Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ), Shenzhen University, Shenzhen, China"}]}],"member":"301","published-online":{"date-parts":[[2019,9,24]]},"reference":[{"issue":"6","key":"e_1_3_2_2_1","first-page":"333","article-title":"Digital Vector Map Watermarking: Applications,techniques and attacks[J]","volume":"28","author":"Abbas T. A.","year":"2013","unstructured":"Abbas, T. A., and M. J. Jawad. 2013. \u201cDigital Vector Map Watermarking: Applications,techniques and attacks[J].\u201d Oriental Journal of Computer Science and Technology 28 (6): 333\u2013339.","journal-title":"Oriental Journal of Computer Science and Technology"},{"issue":"19","key":"e_1_3_2_3_1","first-page":"12205","article-title":"Advancements in GIS Map Copyright Protection schemes\u2014A Critical review[J]","volume":"75","author":"Abubahia A.","year":"2016","unstructured":"Abubahia, A., and M. Cocea. 2016. \u201cAdvancements in GIS Map Copyright Protection schemes\u2014A Critical review[J].\u201d Multimedia Tools and Applications 75 (19): 12205\u201312232.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_2_4_1","doi-asserted-by":"crossref","unstructured":"Abubahia A. and M. Cocea. 2014. \u201cPartition Clustering for GIS Map Data protection[C].\u201d In Proceedings of the IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI) 830\u2013837 Limassol Cyprus November 12.","DOI":"10.1109\/ICTAI.2014.128"},{"key":"e_1_3_2_5_1","doi-asserted-by":"crossref","unstructured":"Abubahia A. M. and M. Cocea. 2015. \u201cExploiting Vector Map Properties for GIS Data Copyright protection[C].\u201d In Proceedings of the IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI) 575\u2013582 Vietri sul Mare Italy November 9\u201311.","DOI":"10.1109\/ICTAI.2015.89"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2013.11.007"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2015.05.005"},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.foodcont.2013.02.004"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystemseng.2013.09.006"},{"key":"e_1_3_2_10_1","doi-asserted-by":"crossref","unstructured":"Fu H. C. Zhu J. Yuan and H. Xu. 2012. \u201cA New Watermarking Algorithm for Geo-spatial data[C].\u201d In The International Conference on Information Technology and Software Engineering; Lecture Notes in Electrical Engineering Vol. 210 edited by W. Lu G. Cai W. Liu and W. Xing 945\u2013951. Berlin Germany: Springer:. ISBN 978-3-642-34522-7.","DOI":"10.1007\/978-3-642-34528-9_100"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.03.080"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-5465-4"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"e_1_3_2_14_1","volume-title":"Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives","author":"Gupta B. B.","year":"2018","unstructured":"Gupta, B. B., ed. 2018. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. USA: CRC Press."},{"key":"e_1_3_2_15_1","volume-title":"Information Technology \u2013 Automatic Identification and Data Capture Techniques \u2013 QR Code 2005 Bar Code Symbology Specification","author":"ISO, IEC 18004","year":"2006","unstructured":"ISO, IEC 18004. 2006. Information Technology \u2013 Automatic Identification and Data Capture Techniques \u2013 QR Code 2005 Bar Code Symbology Specification. Geneva, Switzerland: International Organization for Standardization."},{"issue":"23","key":"e_1_3_2_16_1","first-page":"16011","article-title":"A Crypto Marking Method for Secure Vector Map [J]","volume":"75","author":"Jang B. J.","year":"2016","unstructured":"Jang, B. J., S. H. Lee, E. J. Lee, S. Lim, and K. R. Kwon. 2016. \u201cA Crypto Marking Method for Secure Vector Map [J].\u201d Multimedia Tools and Applications 75 (23): 16011\u201316044.","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.04.039"},{"key":"e_1_3_2_18_1","unstructured":"Naor M. and A. Shamir. 1994. \u201cVisual cryptography[C].\u201d In Proceedings of the Advances in Cryptology\u2014EUROCRYPT \u201894 Workshop on the Theory and Application of Cryptographic Techniques 1\u201312 Perugia Italy May 12."},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/17517575.2019.1605542"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_21_1","doi-asserted-by":"crossref","unstructured":"Tulapurkar H. B. K. Mohan and V. Bharadi. 2017. \u201cInvisible Watermarking Algorithm for GIS Data Using Curvelet transform\u2014Comparitive Study with wavelet[C].\u201d In Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium 3389\u20133392 Fort Worth TX USA July 28.","DOI":"10.1109\/IGARSS.2017.8127725"},{"key":"e_1_3_2_22_1","doi-asserted-by":"crossref","unstructured":"Zope-Chaudhari S. P. Venkatachalam and K. M. Buddhiraju. 2017. \u201cCopyright Protection of Vector Data Using Vector watermark[C].\u201d In Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium Fort Worth TX USA 6110\u20136113 July 28.","DOI":"10.1109\/IGARSS.2017.8128403"}],"container-title":["Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/17517575.2019.1669830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:11:41Z","timestamp":1710249101000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/17517575.2019.1669830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,24]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3,15]]}},"alternative-id":["10.1080\/17517575.2019.1669830"],"URL":"https:\/\/doi.org\/10.1080\/17517575.2019.1669830","relation":{},"ISSN":["1751-7575","1751-7583"],"issn-type":[{"value":"1751-7575","type":"print"},{"value":"1751-7583","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,24]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=teis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-03-04","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}