Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/90834
DC Field | Value | Language |
---|---|---|
dc.contributor | Department of Land Surveying and Geo-Informatics | - |
dc.creator | Cheng, X | - |
dc.creator | Li, Z | - |
dc.date.accessioned | 2021-09-03T02:34:25Z | - |
dc.date.available | 2021-09-03T02:34:25Z | - |
dc.identifier.issn | 2076-3417 | - |
dc.identifier.uri | http://hdl.handle.net/10397/90834 | - |
dc.language.iso | en | en_US |
dc.publisher | Molecular Diversity Preservation International (MDPI) | en_US |
dc.rights | © 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). | en_US |
dc.rights | The following publication Cheng, X.; Li, Z. Configurational Entropy for Optimizing the Encryption of Digital Elevation Model Based on Chaos System and Linear Prediction. Appl. Sci. 2021, 11, 2402 is available at https://doi.org/10.3390/app11052402 | en_US |
dc.subject | Chaos system | en_US |
dc.subject | Configurational entropy | en_US |
dc.subject | Configurational information | en_US |
dc.subject | Digital elevation model | en_US |
dc.subject | Information security | en_US |
dc.title | Configurational entropy for optimizing the encryption of digital elevation model based on chaos system and linear prediction | en_US |
dc.type | Journal/Magazine Article | en_US |
dc.identifier.volume | 11 | - |
dc.identifier.issue | 5 | - |
dc.identifier.doi | 10.3390/app11052402 | - |
dcterms.abstract | A digital elevation model (DEM) digitally records information about terrain variations and has found many applications in different fields of geosciences. To protect such digital information, encryption is one technique. Numerous encryption algorithms have been developed and can be used for DEM. A good encryption algorithm should change both the compositional and configurational information of a DEM in the encryption process. However, current methods do not fully take into full consideration pixel structures when measuring the complexity of an encrypted DEM (e.g., using Shannon entropy and correlation). Therefore, this study first proposes that configurational entropy capturing both compositional and configurational information can be used to optimize encryption from the perspective of the Second Law of Thermodynamics. Subsequently, an encryption algorithm based on the integration of the chaos system and linear prediction is designed, where the one with the maximum absolute configurational entropy difference compared to the original DEM is selected. Two experimental DEMs are encrypted for 10 times. The experimental results and security analysis show that the proposed algorithm is effective and that configurational entropy can help optimize the encryption and can provide guidelines for evaluating the encrypted DEM. | - |
dcterms.accessRights | open access | en_US |
dcterms.bibliographicCitation | Applied sciences, 2021, v. 11, no. 5, 2402 | - |
dcterms.isPartOf | Applied sciences | - |
dcterms.issued | 2021 | - |
dc.identifier.scopus | 2-s2.0-85102946762 | - |
dc.identifier.artn | 2402 | - |
dc.description.validate | 202109 bcvc | - |
dc.description.oa | Version of Record | en_US |
dc.identifier.FolderNumber | OA_Scopus/WOS | en_US |
dc.description.pubStatus | Published | en_US |
Appears in Collections: | Journal/Magazine Article |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
applsci-11-02402-v2.pdf | 11.42 MB | Adobe PDF | View/Open |
Page views
20
Last Week
0
0
Last month
Citations as of May 19, 2024
Downloads
5
Citations as of May 19, 2024
SCOPUSTM
Citations
4
Citations as of May 16, 2024
WEB OF SCIENCETM
Citations
4
Citations as of May 16, 2024
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.