Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Multipurpose watermarking for vector map protection and authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The rapid flourishing of GIS applications has made the copyright protection and content authentication of vector maps two important issues in the digital world. In this paper, a multipurpose watermarking scheme is proposed for the scenarios when the two requirements are needed simultaneously. In the scheme, robust watermark and fragile watermarks are embedded into the host map simultaneously. To avoid the interference between the two kinds of watermarks, robust watermark is embedded into the feature points of the objects in the map, while fragile watermarks are embedded into the nonfeature points. Due to the independence of the feature points and non-feature points, the robust watermark and fragile watermarks can be detected independently. After watermark detection, the robust watermark can be used for copyright protection, and the fragile watermarks can be used for tamper localization and characterization. The fragility of the proposed scheme is analyzed theoretically, and both the robustness and the fragility are verified by a set comprehensive experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. As Mintzer and Braudaway [23] noted, robust watermark should be embedded first since fragile watermark should be sensitive to any data modification, including robust watermarking.

  2. Feature points are the points that are most essential to represent an object and can not be arbitrarily changed. The classical Douglas-Peucker algorithm [8] is amended to use relative threshold so that the feature points can always be properly selected, even after map scaling.

References

  1. Bazin C, Le Bars JM, Madelaine J (2007) A blind, fast and robust method for geographical data watermarking ACM symposium on information, computer and communications security (ASIACCS 07), pp 265–272

    Google Scholar 

  2. Belussi A, Catania B, Podest P (2005) Towards topological consistency and similarity of multiresolution geographical maps Proceedings of the 13th annual ACM international workshop on geographic information systems, pp 220–229

    Google Scholar 

  3. Brewer CA, Buttenfield BP (2007) Framing guidelines for multi-scale map design using databases at multiple resolutions. Cartogr Geogr Inf Sci 34(1):3–15

    Article  Google Scholar 

  4. Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11 (6):585–595

    Article  Google Scholar 

  5. Chen BG, Wornell W (2001) Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans Inf Theory 47(4):1423–1443

    Article  MathSciNet  MATH  Google Scholar 

  6. Chen N, Zhu J (2008) Multipurpose audio watermarking algorithm. J Zhejiang Univ Sci A 9(4):517–523

    Article  MathSciNet  MATH  Google Scholar 

  7. Doncel VR, Nikolaidis N, Pitas I (2007) An optimal detector structure for the Fourier descriptors domain watermarking of 2D vector graphics. IEEE Trans Vis Comput Graph 13(5):851–863

    Article  Google Scholar 

  8. Douglas DH, Peucker TK (1973) Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Canadian Cartographer 10:112–122

    Article  Google Scholar 

  9. Gokyoz T (2005) Generalization of contours using deviation angels and error bands. Cartogr J 42(2):145–150

    Article  Google Scholar 

  10. Gou HM, Wu M (2005) Data hiding in curves with application to fingerprinting maps. IEEE Trans Signal Process 53(10):3988–4005

    Article  MathSciNet  MATH  Google Scholar 

  11. Guo H, Li Y, Liu A, Jajodia S (2006) A fragile watermarking scheme for detecting malicious modifications of database relations. Inf Sci 176:1350–1378

    Article  MathSciNet  MATH  Google Scholar 

  12. Huang M, Zhou X, Cao JH et al Geo-WDBMS: an improved DBMS with the function of watermarking geographical data DASFAA 2007. LNCS, 4443:1098–1109

  13. IEEE standard for binary floating-point arithmetic ANSI/IEEE Standard 754–1985

  14. Kang H, Kim K, Choi J (2001) A vector watermarking using the generalized square mask Proceedings international symposium on information technology: coding and computing 2001, pp 234–236

    Google Scholar 

  15. Kirovski D, Malvar HS (2003) Spread spectrum watermarking of audio signals. IEEE Trans Signal Process 51(4):1020–1033

    Article  MathSciNet  MATH  Google Scholar 

  16. Lafaye J, Bguec J, Gross-Amblard D, Ruas A (2007) Invisible graffiti on your buildings: blind and squaring-proof watermarking of geographical databases 10th international symposium on spatial and temporal databases. Lecture notes in computer science, advances in spatial and temporal databases. LNCS 4605, pp 312–329

    Google Scholar 

  17. Langelaar GC, Lagendijk RL (2001) Optimal differential energy watermarking of DCT encoded images and video. IEEE Trans Image Process 10(1):148–158

    Article  MATH  Google Scholar 

  18. Li YY, Xu LP (2003) A blind watermarking of vector graphics images Proceedings of fifth international conference on computational intelligence and multimedia applications (ICCIMA 2003), pp 424–429

  19. Li J, Wang R, Yan D, Li Y (2012) A multipurpose audio aggregation watermarking based on multistage vector quantization. Multimedia Tools Appl:1–23

  20. Lin CH, Li YC, Wu MN, Yang SS, Chen KJ (2009) Multipurpose watermarking method based on blind vector quantization. Journal of Information Hiding and Multimedia Signal Process:636–639

  21. Lu CS, Liao HYM (2005) Multipurpose watermarking for image authentication and protection. IEEE Trans Image Process 10(10):1579–1592

    MATH  Google Scholar 

  22. Lu Z, Xu D, Sun S (2005) Multipurpose image watermarking algorithm based on multistage vector quantization. IEEE Trans Image Process 14(6):822–831

    Article  Google Scholar 

  23. Mintzer F, Braudaway GW (1999) If one watermark is good, are more better? International Conference on Acoustics, Speech and Signal Processing, pp 2067–2070

    Google Scholar 

  24. Mobasseri BG, Sieffert MJ, Simard RJ (2000) Content authentication and tamper detection in digital video. IEEE Int Conf Image Process 1:458–461

    Google Scholar 

  25. Niu X, Shao CY, Wang X (2006) A Survey of Digital Vector Map Watermarking. Int J Innov Comput Inf Control 2(6):1301–1316

    Google Scholar 

  26. Niu XM, Shao CY, Wang XT (2007) XT. GIS watermarking: hiding data in 2D vector maps. Stud Comp Intelligence 58:123–155

    Google Scholar 

  27. Ohbuchi R, Ueda H, Endoh S Robust watermark of vector digital maps. ICME2002

  28. Pan Z, Zhang Y, Kwong S (2015) Efficient motion and disparity estimation optimization for low complexity multiview video coding. IEEE Trans Broadcast 61 (2):166–176

    Article  Google Scholar 

  29. Petitcolas FAP, Anderson RJ, Kuhn MG (1999) Information hiding: a survey. Proc IEEE 87(7):1062–1078

    Article  Google Scholar 

  30. Solachidis V, Nikolaidis N, Pitas I (2000) Watermarking polygonal lines using Fourier descriptors Proc. IEEE international conference on acoustics, speech and signal processing (ICASSP 2000), pp 1955–1958

    Google Scholar 

  31. Varodayan D, Lin YC, Girod B (2008) Audio authentication based on distributed source coding IEEE International Conference on Acoustics, Speech and Signal Processing, pp 225–228

    Google Scholar 

  32. Wang N, Men C (2012) Reversible fragile watermarking for 2-D vector map authentication with localization. Comput Aided Des 44:320–330

    Article  Google Scholar 

  33. Wang Y, Doherty JF, Van Dyck RE (2002) A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11 (2):77–88

  34. Wang Z, Yang B, Niu X, Zhang Y (2006) A practical multipurpose watermarking scheme for visual content copyright protection and authentication IEEE international conference on intelligent information hiding and multimedia signal processing, pp 461–464

    Google Scholar 

  35. Wang CJ, Peng ZY, Peng YW, Yu L, Wang JZ, Zhao QZ (2012) Watermarking geographical data on spatial topological relations. Multimedia Tools Appl 57(1):67–89

    Article  Google Scholar 

  36. Xia Z, Wang X, Sun X, Wang B (2014) Steganalysis of least significant bit matching using multi-order differences. Security and Commun Netw 7(8):1283–1291

    Article  Google Scholar 

  37. Xia Z, Wang X, Sun X, Liu Q, Xiong N (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimedia Tools Appl 75 (4):1947–1962

    Article  Google Scholar 

  38. Xu T, Shao X, Yang Z (2009) Multi-watermarking scheme for copyright protection and content authentication of digital audio. Adv Multimedia Inf Process:1281–1286

  39. Yan H, Li J (2012) Blind watermarking technique for topographic map data. Appl Geomatics 4(4):225–229

    Article  Google Scholar 

  40. Yan H, Li J, Wen H (2011) A key points-based blind watermarking approach for vector geospatial data. Comput Environ Urban Syst 35(6):485–492

    Article  Google Scholar 

  41. Yu-Chi P, I-Chang J (2009) Blind and robust watermarking for street-network vector maps. Inf Technol J 8(7):982–989

    Article  Google Scholar 

  42. Zhang H, Gao M (2009) A semi-fragile digital watermarking algorithm for 2D vector graphics tamper localization. IEEE International Conference on Multimedia Information Networking and Security 1:549–552

    Google Scholar 

  43. Zhao Y, Zhou Z (2012) Multipurpose blind watermarking algorithm for color image based on DWT and DCT IEEE international conference on wireless communications networking and mobile computing, pp 1–4

    Google Scholar 

  44. Zheng L, You F (2009) A fragile digital watermark used to verify the integrity of vector map IEEE International Conference on E-Business and Information System Security, pp 1–4

    Google Scholar 

  45. Zhu C, Liao X, Li Z (2006) Chaos-based multipurpose image watermarking algorithm. Wuhan Univ J Nat Sci 11(6):1675–1678

    Article  MATH  Google Scholar 

Download references

Acknowledgment

This work is supported by the National Natural Science Foundations of China under grant (No.71603252). This work is also partially supported by a project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuwei Peng.

Additional information

This work is supported by the National Natural Science Foundation of China under grant (No.71603252). This work is partially supported by a project funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD) and Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology (CICAEET).

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Peng, Y., Lan, H., Yue, M. et al. Multipurpose watermarking for vector map protection and authentication. Multimed Tools Appl 77, 7239–7259 (2018). https://doi.org/10.1007/s11042-017-4631-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4631-z

Keywords

Navigation