Ttacks, data format conversion attack. On the other hand, the normalized coordinates are invariant to translation and scaling, but not to rotation. Because of this, the proposed algorithm has no resistance to rotation attack.rithm is extra robust in resisting vertex addition attack and vertex deletion attac shown in Figure 11c , the proposed algorithm has precisely the same robustness as the exi procedures [2,13,24] in resisting data format conversion, scaling and translation att ISPRS Int. J. Geo-Inf. 2021, ten, 718 16 of 18 whereas its robustness in resisting rotation attack is not as great as the existing met [2,13,24].Figure 11. Fadrozole Purity & Documentation comparison benefits for attacks: (a) (a) comparison results for vertex addition, (b) comparison Figure 11. Comparison results for vertexvertex attacks: comparison resultsfor vertex addition, (b) comparison results Cyclopamine web outcomes for for vertex deletion, (c) comparison benefits for information format conversion attack, (d) comparison outcomes for scaling attack, vertex deletion, (c) comparison outcomes for information format conversion attack, (d) comparison results for scaling attack, (e) (e) comparison outcomes for translation attack, (f) comparison final results for rotation attack. comparison outcomes for translation attack, (f) comparison results for rotation attack.five. ConclusionsThe above benefits showCEW algorithm is proposed within this paper, aiming at providing A novel invariant-based that the proposed algorithm is resistant to vertex att the dual capability of attacks, information format conversion attack. vector maps. The scaling and translation safe transmission and copyright protection for Having said that, the normapermutation-based encryption scheme does not transform the coordinates of vector maps, which can be combined with the coordinates-based watermarking scheme to implement the commutativity involving encryption operation and watermarking operation. Primarily based around the proposed algorithm, the operation order of encryption and watermark embedding has no impact around the final outcomes, as well as the embedded watermark can be extracted ahead of or following decryption. The contributions of this paper are as follows:(1). Proposed algorithm provides various protection for vector maps by the combination of encryption technology and watermarking technology compared to current encryption algorithm and watermarking algorithm. (two). Compared using the existing CEW procedures for vector maps, proposed technique has stronger robustness in resisting vertex attacks by utilizing numerous embedding approach for watermark. In addition, proposed technique is resistant to geometric attacks (e.g., scaling and translation) and other traditional attacks (e.g., reordering and information format conversion). (3). Compared with the current CEW techniques for vector maps, the introduction of double random position permutation method entirely avoids one-to-one mapping in the course of vector map scrambling and drastically enhances encryption security. Proposed algorithm has a poor encryption effect on point objects, since the permutation of point objects can only adjust the storage order, which has no impact around the data structure. For that reason, the CEW algorithm for the point objects of vector maps will probably be our function in future investigation.ISPRS Int. J. Geo-Inf. 2021, ten,17 ofAuthor Contributions: Yu Li conceived and created the experiments; Yu Li and Liming Zhang carried out the approach; Yu Li and Xiaolong Wang completed the implementation from the pc code and also the supporting algorithms; Yu Li performed the analysis and wrote the paper; Liming Zhang, Xiaolon.