This document discusses making fuel type classification maps (FCM) compliant with the INSPIRE Land Cover data specification. It identifies Land Cover as the most applicable INSPIRE theme and analyzes its CoreRaster application schema. The FCM data will be modeled following this schema, with fuel types encoded in an external file and metadata created using an FCM-specific profile. This will allow FCMs to be shared and used as intended - as input for fire simulation processes.
Critical Infrastructure Monitoring Using UAV Imageryaditess
The use of two rapidly evolving approaches, the Unmanned Aerial Vehicles (UAVs) and Dense Image Matching (DIM) techniques is an attractive solution to extract high quality photogrammetric products like 3D point clouds and orthoimages.
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
ABSTRACT
Image usage over the internet becomes more and more important each day. Over 3 billion images are shared each day over the internet which raise a concern about how to protect images copyrights? Or how to utilize image sharing experience? This paper proposes a new robust image watermarking algorithm based on compressed sensing (CS) and quantization index modulation (QIM) watermark embedding. The algorithm capitalizes on the CS to compress and encrypt images jointly with Entropy Coding, Arnold Cat Map, Pseudo-random numbers and Advanced Encryption Standard (AES). Our proposed algorithm works under the JPEG standard umbrella. Watermark embedding is done in 3 different locations inside the image using QIM. Those locations differ with each 8-by-8 image block. Choosing which combination of coefficients to be used in QIM watermark embedding depends on selecting a combination from combinations table, which is generated at the same time with projection matrices using a 10-digits Pseudorandom number secret key SK1. After quantization phase, the algorithm shuffles image blocks using Arnold’s Cat Map with a 10-digits Pseudo-random number secret key SK2, followed by a unique method for splitting every 8x8 block into two unequal parts. Part number one will act as the host for two QIM watermarks then goes through encoding phase using Run-Length Encoding (RLE) followed by Huffman Encoding, while part number two goes through sparse watermark embedding followed by a third QIM watermark embedding and compression phase using CS, then Huffman encoder is used to encode this part. The algorithm aims to combine image watermarking, compression and encryption capabilities in one algorithm while balancing how those capabilities works with each other to achieve significant improvement in terms of image watermarking, compression and encryption. 15 different images usually used in image processing benchmarking were used for testing the algorithm capabilities and experiments show that our proposed algorithm achieves robust watermarking jointly with encryption and compression under the JPEG standard framework.
Critical Infrastructure Monitoring Using UAV Imageryaditess
The use of two rapidly evolving approaches, the Unmanned Aerial Vehicles (UAVs) and Dense Image Matching (DIM) techniques is an attractive solution to extract high quality photogrammetric products like 3D point clouds and orthoimages.
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
ABSTRACT
Image usage over the internet becomes more and more important each day. Over 3 billion images are shared each day over the internet which raise a concern about how to protect images copyrights? Or how to utilize image sharing experience? This paper proposes a new robust image watermarking algorithm based on compressed sensing (CS) and quantization index modulation (QIM) watermark embedding. The algorithm capitalizes on the CS to compress and encrypt images jointly with Entropy Coding, Arnold Cat Map, Pseudo-random numbers and Advanced Encryption Standard (AES). Our proposed algorithm works under the JPEG standard umbrella. Watermark embedding is done in 3 different locations inside the image using QIM. Those locations differ with each 8-by-8 image block. Choosing which combination of coefficients to be used in QIM watermark embedding depends on selecting a combination from combinations table, which is generated at the same time with projection matrices using a 10-digits Pseudorandom number secret key SK1. After quantization phase, the algorithm shuffles image blocks using Arnold’s Cat Map with a 10-digits Pseudo-random number secret key SK2, followed by a unique method for splitting every 8x8 block into two unequal parts. Part number one will act as the host for two QIM watermarks then goes through encoding phase using Run-Length Encoding (RLE) followed by Huffman Encoding, while part number two goes through sparse watermark embedding followed by a third QIM watermark embedding and compression phase using CS, then Huffman encoder is used to encode this part. The algorithm aims to combine image watermarking, compression and encryption capabilities in one algorithm while balancing how those capabilities works with each other to achieve significant improvement in terms of image watermarking, compression and encryption. 15 different images usually used in image processing benchmarking were used for testing the algorithm capabilities and experiments show that our proposed algorithm achieves robust watermarking jointly with encryption and compression under the JPEG standard framework.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Development and Hardware Implementation of an Efficient Algorithm for Cloud D...sipij
Detecting clouds in satellite imagery is becoming more important with increasing data availability which
are generated by earth observing satellites. Hence, intellectual processing of the enormous amount of data
received by hundreds of earth receiving stations, with specific satellite image oriented approaches,
presents itself as a pressing need. One of the most important steps in previous stages of satellite image
processing is cloud detection. While there are many approaches that compact with different semantic
meaning, there are rarely approaches that compact specifically with cloud and cloud cover detection. In
this paper, the technique presented is the scene based adaptive cloud, cloud cover detection and find the
position with assumption of sun reflection, background varying and scattering are constant. The capability
of the developed system was tested using dedicated satellite images and assessed in terms of cloud
percentage coverage. The system used for this process comprises of Intel(R) Xenon(R) CPU E31245 @
3.30GHz processor along with MATLAB 13 software and DSPC6713 processor along with Code Compose
Studio 3.1.
Big Data, Big Computing, AI, and Environmental ScienceIan Foster
I presented to the Environmental Data Science group at UChicago, with the goal of getting them excited about the opportunities inherent in big data, big computing, and AI--and to think about how to collaborate with Argonne in those areas. We had a great and long conversation about Takuya Kurihana's work on unsupervised learning for cloud classification. I also mentioned our work making NASA and CMIP data accessible on AI supercomputers.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
Balancing Compression and Encryption of Satellite Imagery IJECEIAES
With the rapid developments in the remote sensing technologies and services, there is a necessity for combined compression and encryption of satellite imagery. The onboard satellite compression is used to minimize storage and communication bandwidth requirements of high data rate satellite applications. While encryption is employed to secure these resources and prevent illegal use of image sensitive information. In this paper, we propose an approach to address these challenges which raised in the highly dynamic satellite based networked environment. This approach combined compression algorithms (Huffman and SPIHT) and encryptions algorithms (RC4, blowfish and AES) into three complementary modes: (1) secure lossless compression, (2) secure lossy compression and (3) secure hybrid compression. The extensive experiments on the 126 satellite images dataset showed that our approach outperforms traditional and state of art approaches by saving approximately (53%) of computational resources. In addition, the interesting feature of this approach is these three options that mimic reality by imposing every time a different approach to deal with the problem of limited computing and communication resources.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
A review-on-digital-image-watermarking-techniquesEditor IJMTER
Due to the rapid expansion in internet technology copyright protection and data
authenticity are two major problems in handling digital multimedia. Watermarking is a very
important field for copyrights of various electronic documents and media. A variety of
techniques have been proposed for copyright protection of digital images which include
spatial domain and transform domain watermarking. This paper aims to provide some basic
concepts of digital image watermarking techniques and comparisons between them.
A collaborative physical layer security schemeIJECEIAES
High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Development and Hardware Implementation of an Efficient Algorithm for Cloud D...sipij
Detecting clouds in satellite imagery is becoming more important with increasing data availability which
are generated by earth observing satellites. Hence, intellectual processing of the enormous amount of data
received by hundreds of earth receiving stations, with specific satellite image oriented approaches,
presents itself as a pressing need. One of the most important steps in previous stages of satellite image
processing is cloud detection. While there are many approaches that compact with different semantic
meaning, there are rarely approaches that compact specifically with cloud and cloud cover detection. In
this paper, the technique presented is the scene based adaptive cloud, cloud cover detection and find the
position with assumption of sun reflection, background varying and scattering are constant. The capability
of the developed system was tested using dedicated satellite images and assessed in terms of cloud
percentage coverage. The system used for this process comprises of Intel(R) Xenon(R) CPU E31245 @
3.30GHz processor along with MATLAB 13 software and DSPC6713 processor along with Code Compose
Studio 3.1.
Big Data, Big Computing, AI, and Environmental ScienceIan Foster
I presented to the Environmental Data Science group at UChicago, with the goal of getting them excited about the opportunities inherent in big data, big computing, and AI--and to think about how to collaborate with Argonne in those areas. We had a great and long conversation about Takuya Kurihana's work on unsupervised learning for cloud classification. I also mentioned our work making NASA and CMIP data accessible on AI supercomputers.
Abstract: The increasing amount of applications using digital multimedia technologies has accentuated the need to provide copyright protection to multimedia data. This paper reviews one of the data hiding techniques - digital image watermarking. Through this paper we will explore some basic concepts of digital image watermarking techniques.Two different methods of digital image watermarking namely spatial domain watermarking and transform domain watermarking are briefly discussed in this paper. Furthermore, two different algorithms for a digital image watermarking have also been discussed. Also the comparision between the different algorithms,tests performed for the robustness and the applications of the digital image watermarking have also been discussed.
Balancing Compression and Encryption of Satellite Imagery IJECEIAES
With the rapid developments in the remote sensing technologies and services, there is a necessity for combined compression and encryption of satellite imagery. The onboard satellite compression is used to minimize storage and communication bandwidth requirements of high data rate satellite applications. While encryption is employed to secure these resources and prevent illegal use of image sensitive information. In this paper, we propose an approach to address these challenges which raised in the highly dynamic satellite based networked environment. This approach combined compression algorithms (Huffman and SPIHT) and encryptions algorithms (RC4, blowfish and AES) into three complementary modes: (1) secure lossless compression, (2) secure lossy compression and (3) secure hybrid compression. The extensive experiments on the 126 satellite images dataset showed that our approach outperforms traditional and state of art approaches by saving approximately (53%) of computational resources. In addition, the interesting feature of this approach is these three options that mimic reality by imposing every time a different approach to deal with the problem of limited computing and communication resources.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Steganography is a technique of concealing the secret information in a digital carrier media, so that only
the authorized recipient can detect the presence of secret information. In this paper, we propose a spatial
domain steganography method for embedding secret information on conditional basis using 1-Bit of Most
Significant Bit (MSB). The cover image is decomposed into blocks of 8*8 matrix size. The first block of
cover image is embedded with 8 bits of upper bound and lower bound values required for retrieving
payload at the destination. The mean of median values and difference between consecutive pixels of each
8*8 block of cover image is determined to embed payload in 3 bits of Least Significant Bit (LSB) and 1 bit
of MSB based on prefixed conditions. It is observed that the capacity and security is improved compared to
the existing methods with reasonable PSNR.
A review-on-digital-image-watermarking-techniquesEditor IJMTER
Due to the rapid expansion in internet technology copyright protection and data
authenticity are two major problems in handling digital multimedia. Watermarking is a very
important field for copyrights of various electronic documents and media. A variety of
techniques have been proposed for copyright protection of digital images which include
spatial domain and transform domain watermarking. This paper aims to provide some basic
concepts of digital image watermarking techniques and comparisons between them.
A collaborative physical layer security schemeIJECEIAES
High level of security is essential in wireless 5G communications. The last few years there has been an increase in research interest in the potential of the radio channel’s physical properties to provide communications security. These research efforts investigate fading, interference, and path diversity to develop security techniques for implementation in 5G New Radio (NR). In this paper, we propose a collaborative scheme to existing physical layer security schemes, taking advantage of the characteristics of the OFDM technique. An OFDM symbol includes the pilot subcarriers, typically essential for the pilot channel estimation process performed at the legitimate receiver. In this work we propose the positions of the subcarriers to change on every OFDM symbol following a probability distribution known only to the legitimate transmitter and legitimate receiver. An eavesdropper, does not have access to the information of the pilot subcarriers positions so, it performs blind channel estimation. The theoretical analysis is based on the information theoretic problem formulation and is confirmed by simulations. The performance metrics used are the secrecy capacity and the outage probability. The proposed scheme is very simple and robust, strengthening security in multimedia applications.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
1. Fuel Types modelling
for INSPIRE
Forest Fires 2012 Conference
Session ArcFUEL:
Advancing Forest Fuel Mapping Techniques in Europe
Giacomo Martirano
Epsilon Italia srl | Mendicino CS, IT
T: +390984631949 | g.martirano@epsilon-italia.it
3rd International Conference on Modelling, Monitoring and Management of Forest Fires 1
22 – 24 May, 2012, New Forest, UK
2. Introduction
Description of the steps to be applied to any Fuel
Type Classification Map in order to make it
INSPIRE compliant.
Application to the Fuel Classification Map (FCM)
datasets generated within the ArcFUEL project.
2
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
3. INSPIRE for FCM
A preliminary fit-for-purpose analysis has been
conducted in order to identify the most
applicable INSPIRE data theme within the
ArcFUEL context.
Among the 34 INSPIRE data themes, the
following three have been identified as candidate
and the relevant Data Specification (DS)
analyzed: (ι) Natural Risk Zones, (ιι) Land Cover
and (ιιι) Land Use.
The Land Cover (LC) data theme has been
selected as the most applicable and the relevant
DS has been deeply analyzed.
3
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
4. INSPIRE Land Cover
Data Specification
• Directive (2007/2/EC) defines Land Cover (LC) as the
Physical and biological cover of the earth's surface including
artificial surfaces, agricultural areas, forests, (semi-)natural
areas, wetlands, water bodies.
• The LC data specification does not prescribe or recommend
any particular land cover nomenclature for use in INSPIRE.
• There is a multitude of different ways to describe land
cover.
• There is only one "real world" but many different
descriptions of this world depending on the aims,
methodology and terminology of the observer.
• The approach taken by LC DS is instead to allow many
different land cover nomenclatures to coexist in the context
of INSPIRE.
4
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
5. INSPIRE Land Cover (LC)
Data Specification (DS)
• The data specification for land cover is separated into (i) two core
models and (ii) an extended model. The two core models are
conceptually similar, but for technical reasons separated into one
core model for vector data and one core model for raster data.
• The LC DS defines the following application schemas:
LandCover CoreVector application schema;
LandCover CoreRaster application schema;
LandCover Extended application schema.
• LC data shall be modelled trough one of the two core applications
schemas:
LandCover CoreVector defines a vector representation (i.e. points
or surfaces) to support Land Cover data.
LandCover CoreRaster defines a raster representation to support
Land Cover data.
5
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
6. INSPIRE Land Cover
Data Specification
Land cover conceptual core model
6
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
7. INSPIRE Land Cover
Data Specification
The selection of the application schema to be applied within the
ArcFUEL context was made taking into consideration the end-user
requirements of the final ArcFUEL output (i.e. the FCM - Fuel
Classification Map).
This requirements consists in using the final ArcFUEL output as
input for Fire Simulators processes, for this reason the CoreRaster
application schema has been selected.
The
LandCoverCoreRaster
application schema
defines how Land
Cover data can be
supported by a raster
representation.
7
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
8. LandCoverCoreRaster
application schema
LandCoverGridCoverage
defines how a grid
coverage can support
Land Cover information.
LandCoverNomenclature
defines the references
to understand and
interpret the
classification values.
8
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
9. LandCoverCoreRaster
application schema
Name of the Land
Cover coverage.
External object identifier
of the spatial object.
The extent of the dataset, in
space, time or space-time.
Information about the nomenclature
used in the coverage.
All the elements of the selected
application schema will be
structured into a database, for
LandCoverGridCoverage further creation of the INSPIRE
compliant gml using a proper
transformation tool.
9
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
10. LandCoverCoreRaster
application schema
For the encoding of the FCM values
the use of the external file option
has been investigated, as also
recommended by the
Recommendation 4 of Section
9.2.1.2 of the DS_v2.9.2.
In order to physically implement
this option have been followed the
indications contained in point 4 of
the Annex C of “D2.7: Guidelines
for the encoding of spatial data,
Version 3.2”.
The attribute rangeSet will be
LandCoverGridCoverage encoded as xlink to the external file.
10
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
11. LandCoverCoreRaster
application schema
The attribute used for documenting
the FCM nomenclature has a complex
dataType, LandCoverNomenclature
A LandCoverNomenclature defines
what information shall be provided to
right undertand and interpret the
classifcation codes contained in the
dataset.
LandCoverGridCoverage
11
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
12. LandCoverCoreRaster
application schema
External object identifier
of the spatial object.
This attribute defines
which organization (or
entity) defines or is
responsible for the
nomenclature.
LandCoverNomenclature This attribute references the
code list attached to the
nomenclature.
This attribute allows to provide an It will be used to document
URL pointing to the documentation the 44-classes Fuel Types
(specification or other document) classification, through its
describing the classification system encoding as an URI.
used and the nomenclature used.
12
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
13. FCM data modelling
Group Group
FT No Fuel type name
No name
1 Peat bogs
1 GROUND FUELS
2 Wooded peatbogs
3 Pastures
S 4 Sparse grasslands
U F 5 Mediterranean grasslands and steppes
R U 6 Temperate, Alpine and Northern grasslands
7 Mediterranean moors and heathlands
2 F E 8 Temperate, Alpine and Northern moors and heathlands
A L 9 Mediterranean open shrublands (sclerophylous)
C S 10 Mediterranean shrublands (sclerophylous)
E 11 Deciduous broadleaved shrublands (thermophilous)
12 Alpine open shrublands (conifers)
T 13 Shrublands in Mediterranean conifer forests
F F
R
O
14 Shrublands in Mediterranean sclerophylous forests
Link 3A
U
E
L
A
N
S
I
O
N
A
L
R
E
S
15 Shrublands in Mediterranean montane conifer forests
16 Shrublands in thermophilous broadleaved forests
17 Shrublands in beech and mesophytic broadleaved forests
S T
T
S
18 Northern open shrublands in broadleaved forests
I 19 Shrublands in Alpine and Northern conifer forests
P
O
C 20 Mediterranean long needled conifer forest (mediterranean pines)
T O
F 21 Mediterranean scale‐needled open woodlands (juniperus, cupressus)
E N
O 22 Mediterranean montane long needled conifer forest (black and scots pines)
N I
R
C F 23 Mediterranean montane short needled conifer forest (firs, cedar)
T E
A E
S 25 Alpine long needled conifer forest (pines)
I R
N T 26 Alpine short needled conifer forest (fir, alp. spruce)
A O
S
O U 27 Northern long needled conifer forest (scots pine)
L
P S 28 Northern short needled conifer forest (spruce)
L
Y
k Y
Lin
F 29 Mediterranean evergreen broadleaved forest
3B B
L
O 30 Thermophilous broadleaved forest
I R
E
R
N A 31 Mesophytic broadleaved forest
O E
V 32 Beech forest
V A
E
S
O
D
D
T 33 Montane beech forest
S
L 34 White birch boreal forest
V
I M F 35 Mixed mediterranean evergreen broadleaved with conifers forest
I O
N T 36 Mixed thermophylous broadleaved with conifers forest
X R
S 37 Mixed mesophytic broadleaved with conifers forest
G E E
D S 38 Mixed beech with conifers forest
39 Riparian vegetation
40 Coastal and inland halophytic vegetation and dunes
4 OTHER FUELS
41 Aquatic Marshes
42 Agroforestry areas
5 PLANTATIONS 24 Central conifer forests (conifer plantations of central Europe)
13
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it
14. FCM Metadata profile
A FCM metadata profile will be
created and will comprise two groups
of metadata elements, as required in
the section 8 of the LC DS.
The common metadata elements, as
required by Regulation 1205/2008/EC
(implementing Directive 2007/2/EC of
the European Parliament and of the
Council as regards metadata) for spatial
datasets and spatial dataset series.
The theme-specific metadata
elements.
An FCM xml metadata profile will be
created for use within any metadata
editor to create the metadata for each
FCM dataset.
14
Giacomo Martirano; EPSILON Italia; T:+39 0984 631949; g.martirano@epsilon-italia.it