GIS (geographic information system) vector data copyright authentication method based on FCM (firmware control memory) clustering feature
A technology of copyright authentication and vector data, applied in the field of geographic information security, can solve problems such as data interference, distortion, and algorithm robustness that cannot meet copyright protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] Further detailed description will be given below in conjunction with the accompanying drawings and embodiments.
[0037] In this example, a typical shp surface layer data is selected, and the whole process of data reading, copyright mark generation, and copyright mark authentication is further described in detail. In this embodiment, the water system linear layer data of the United States (such as figure 1 ) as experimental data, figure 2 It is the data generated after the experimental data is subjected to the rotation attack. The key value is "10010101", and the recognition threshold is 0.85.
[0038] (1) Copyright mark generation process.
[0039] Step 1: Set the number of clusters c=8 and the weight parameter m=2.
[0040] Step 2: Open the US water system line layer file F; read the horizontal and vertical coordinate information of each element node in the file into the two-dimensional array D, and the number of nodes in this embodiment is 6473.
[0041] Step 3...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com