Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/90834
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Land Surveying and Geo-Informatics-
dc.creatorCheng, X-
dc.creatorLi, Z-
dc.date.accessioned2021-09-03T02:34:25Z-
dc.date.available2021-09-03T02:34:25Z-
dc.identifier.issn2076-3417-
dc.identifier.urihttp://hdl.handle.net/10397/90834-
dc.language.isoenen_US
dc.publisherMolecular Diversity Preservation International (MDPI)en_US
dc.rights© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).en_US
dc.rightsThe following publication Cheng, X.; Li, Z. Configurational Entropy for Optimizing the Encryption of Digital Elevation Model Based on Chaos System and Linear Prediction. Appl. Sci. 2021, 11, 2402 is available at https://doi.org/10.3390/app11052402en_US
dc.subjectChaos systemen_US
dc.subjectConfigurational entropyen_US
dc.subjectConfigurational informationen_US
dc.subjectDigital elevation modelen_US
dc.subjectInformation securityen_US
dc.titleConfigurational entropy for optimizing the encryption of digital elevation model based on chaos system and linear predictionen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume11-
dc.identifier.issue5-
dc.identifier.doi10.3390/app11052402-
dcterms.abstractA digital elevation model (DEM) digitally records information about terrain variations and has found many applications in different fields of geosciences. To protect such digital information, encryption is one technique. Numerous encryption algorithms have been developed and can be used for DEM. A good encryption algorithm should change both the compositional and configurational information of a DEM in the encryption process. However, current methods do not fully take into full consideration pixel structures when measuring the complexity of an encrypted DEM (e.g., using Shannon entropy and correlation). Therefore, this study first proposes that configurational entropy capturing both compositional and configurational information can be used to optimize encryption from the perspective of the Second Law of Thermodynamics. Subsequently, an encryption algorithm based on the integration of the chaos system and linear prediction is designed, where the one with the maximum absolute configurational entropy difference compared to the original DEM is selected. Two experimental DEMs are encrypted for 10 times. The experimental results and security analysis show that the proposed algorithm is effective and that configurational entropy can help optimize the encryption and can provide guidelines for evaluating the encrypted DEM.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationApplied sciences, 2021, v. 11, no. 5, 2402-
dcterms.isPartOfApplied sciences-
dcterms.issued2021-
dc.identifier.scopus2-s2.0-85102946762-
dc.identifier.artn2402-
dc.description.validate202109 bcvc-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.pubStatusPublisheden_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
applsci-11-02402-v2.pdf11.42 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

20
Last Week
0
Last month
Citations as of May 19, 2024

Downloads

5
Citations as of May 19, 2024

SCOPUSTM   
Citations

4
Citations as of May 16, 2024

WEB OF SCIENCETM
Citations

4
Citations as of May 16, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.