Skip to main content

Three-Level GIS Data Security: Conjointly Cryptography and Digital Watermarking

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

  • 1553 Accesses

Abstract

Geographic Information System (GIS) plays a vital role in many applications especially in military operations as they need to be spatial in nature. Successful application of military operations demands for accuracy of information and quick decisions taking steps. GIS has now become the most powerful medium for sharing of military information to officers and commanders. In the era of digital communication, officers use GIS to deliver their strategic plans to intended officers [5]. GIS has proven to be an excellent tool for enforcement and deployment of security mechanisms in military applications and to deliver confidential information at distant locations. In our proposed system, we will introduce a new mechanism to protect GIS data carrying confidential and sensitive data for military and army purpose by combining two of the cryptography algorithms: Advanced Encryption Standard (AES) and RSA with digital watermarking techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abbas TA, Jawad MJ (2013) Proposed an intelligent watermarking in GIS environment. J Earth Sci Res (JESR) 1(1):1–5

    Google Scholar 

  2. Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007) Digital watermarking and steganography (2nd edn). USA: Morgan Kaufmann

    Google Scholar 

  3. Dakroury Y, EI-ghafar IA, Tammam A (2010) Protecting GIS data using cryptography and digital watermarking. Int J Comput Sci Netw Secur (IJCSNS) 10(1):75–84

    Google Scholar 

  4. Wayner P (2008) Disappearing cryptography: information hiding: steganography & watermarking (3rd edn). USA: Morgan Kaufmann

    Google Scholar 

  5. White Paper (2014) GIS platform for national security. http://www.esri.com/library/whitepapers/pdfs/gis-platform-for-national-security.pdf

  6. Wolthusen S (1998) On the limitations of digital watermarks: a cautionary note. Available at http://www.wolthusen.com/publications/SCI1998.pdf

  7. Satyanarayana P, Yogendran S, Military applications of GIS. http://geospatialworld.net/Paper/Technology/ArticleView.aspx?aid=908

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Monika Bansal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bansal, M., Upadhyaya, A. (2018). Three-Level GIS Data Security: Conjointly Cryptography and Digital Watermarking. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics