110
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

A map traceability management scheme for security control

, , & ORCID Icon
Pages 388-401 | Received 04 Mar 2019, Accepted 16 Sep 2019, Published online: 24 Sep 2019

References

  • Abbas, T. A., and M. J. Jawad. 2013. “Digital Vector Map Watermarking: Applications,techniques and attacks[J].” Oriental Journal of Computer Science and Technology 28 (6): 333–339.
  • Abubahia, A., and M. Cocea. 2016. “Advancements in GIS Map Copyright Protection schemes—A Critical review[J].” Multimedia Tools and Applications 75 (19): 12205–12232.
  • Abubahia, A., and M. Cocea. 2014. “Partition Clustering for GIS Map Data protection[C].” In Proceedings of the IEEE 26th International Conference on Tools with Artificial Intelligence (ICTAI), 830–837, Limassol, Cyprus, November 12.
  • Abubahia, A. M., and M. Cocea. 2015. “Exploiting Vector Map Properties for GIS Data Copyright protection[C].” In Proceedings of the IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), 575–582, Vietri sul Mare, Italy, November 9–11.
  • Aung, M., and Y. S. Chang. 2014. “Traceability in a Food Supply Chain: Safety and Quality perspectives[J].” Food Control 39 (1): 172–184. doi:10.1016/j.foodcont.2013.11.007.
  • Badia Melis, R., R. Mishra, and L. Ruiz García. 2015. “Food Traceability: New Trends and Recent advances—A. review[J].” Food Control 57 (1): 393–401. doi:10.1016/j.foodcont.2015.05.005.
  • Bosona, T., and G. Gebresenbet. 2013. “Food Traceability as an Integral Part of Logistics Management in Food and Agricultural Supply chain[J].” Food Control 33 (1): 32–48. doi:10.1016/j.foodcont.2013.02.004.
  • Dabbene, F., P. Gay, and C. Tortia. 2014. “Traceability Issues in Food Supply Chain Management: A. review[J].” Biosystems Engineering 120 (3): 65–80. doi:10.1016/j.biosystemseng.2013.09.006.
  • Fu, H., C. Zhu, J. Yuan, and H. Xu. 2012. “A New Watermarking Algorithm for Geo-spatial data[C].” In The International Conference on Information Technology and Software Engineering; Lecture Notes in Electrical Engineering, Vol. 210, edited by W. Lu, G. Cai, W. Liu, and W. Xing, 945–951. Berlin, Germany: Springer:. ISBN 978-3-642-34522-7.
  • Fu, Z., Y. Cheng, S. Liu, and B. Yu. 2019. “A New Two-level Information Protection Scheme Based on Visual Cryptography and QR Code with Multiple decryptions[J].” Measurement 141: 267–276. doi:10.1016/j.measurement.2019.03.080.
  • Cheng, Y.,Z. Fu, B. Yu, and G. Shen. 2018. “A New Two-level QR Code with Visual Cryptography Scheme [J].” Multimedia Tools and Applications 77 (16): 20629–20649. doi:10.1007/s11042-017-5465-4.
  • Gupta, B., D. P. Agrawal, and S. Yamaguchi, eds. 2016. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. USA: IGI global.
  • Gupta, B. B., ed. 2018. Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. USA: CRC Press.
  • ISO, IEC 18004. 2006. Information Technology – Automatic Identification and Data Capture Techniques – QR Code 2005 Bar Code Symbology Specification. Geneva, Switzerland: International Organization for Standardization.
  • Jang, B. J., S. H. Lee, E. J. Lee, S. Lim, and K. R. Kwon. 2016. “A Crypto Marking Method for Secure Vector Map [J].” Multimedia Tools and Applications 75 (23): 16011–16044.
  • Memos, V. A., K. E. Psannis, Y. Ishibashi, B.-G. Kim, and B. B. Gupta. 2018. “An Efficient Algorithm for Media-based Surveillance System (eamsus) in IoT Smart City framework[J].” Future Generation Computer Systems 83: 619–628. doi:10.1016/j.future.2017.04.039.
  • Naor, M., and A. Shamir. 1994. “Visual cryptography[C].” In Proceedings of the Advances in Cryptology—EUROCRYPT ‘94, Workshop on the Theory and Application of Cryptographic Techniques, 1–12, Perugia, Italy, May 12.
  • Sahoo, S. R., and B. B. Gupta. 2019. “Classification of Various Attacks and Their Defence Mechanism in Online Social Networks: A survey[J].” Enterprise Information Systems 13 (6): 832–864. doi:10.1080/17517575.2019.1605542.
  • Shamir, A. 1979. “How to Share a Secret[J].” Communications of the ACM 22 (22): 612–613. doi:10.1145/359168.359176.
  • Tulapurkar, H., B. K. Mohan, and V. Bharadi. 2017. “Invisible Watermarking Algorithm for GIS Data Using Curvelet transform—Comparitive Study with wavelet[C].” In Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, 3389–3392, Fort Worth, TX, USA, July 28.
  • Zope-Chaudhari, S., P. Venkatachalam, and K. M. Buddhiraju. 2017. “Copyright Protection of Vector Data Using Vector watermark[C].” In Proceedings of the 2017 IEEE International Geoscience and Remote Sensing Symposium, Fort Worth, TX, USA, 6110–6113, July 28.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.