Vector Watermarking Method for Digital Map Protection Using Arc Length Distribution

被引:13
|
作者
Lee, Suk-Hwan [1 ]
Huo, Xiao-Jiao [2 ]
Kwon, Ki-Ryong [2 ]
机构
[1] Tongmyong Univ, Pusan, South Korea
[2] Pukyong Natl Univ, Pusan, South Korea
来源
关键词
vector watermarking; GIS security; digital map protection; Arc length;
D O I
10.1587/transinf.E97.D.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing demand for geographic information and position information, the geographic information system (GIS) has come to be widely used in city planning, utilities management, natural resource environments, land surveying, etc. While most GIS maps use vector data to represent geographic information more easily and in greater detail, a GIS vector map can be easily copied, edited, and illegally distributed, like most digital data. This paper presents an invisible, blind, secure, and robust watermarking method that provides copyright protection of GIS vector digital maps by means of arc length distribution. In our method, we calculate the arc lengths of all the polylines/polygons in a map and cluster these arc lengths into a number of groups. We then embed a watermark bit by changing the arc length distribution of a suitable group. For greater security and robustness, we use a pseudo-random number sequence for processing the watermark and embed the watermark multiple times in all maps. Experimental results verify that our method has good invisibility, security, and robustness against various geometric attacks and that the original map is not needed in the watermark extraction process.
引用
收藏
页码:34 / 42
页数:9
相关论文
共 50 条
  • [31] A copyright protection method for wireless sensor networks based on digital watermarking
    Wang, Baowei
    Su, Jianwei
    Zhang, Youdong
    Wang, Biqiang
    Shen, Jian
    Ding, Qun
    Sun, Xingming
    International Journal of Hybrid Information Technology, 2015, 8 (06): : 257 - 268
  • [32] Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks
    Sun, Xingming
    Su, Jianwei
    Wang, Baowei
    Liu, Qi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 407 - 416
  • [33] An Intelligent Three-Level Digital Watermarking Method for Document Protection
    Khadim, Umair
    Iqbal, Muhammad Munwar
    Azam, Muhammad Awais
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2021, 40 (02) : 323 - 334
  • [34] A Novel Digital Watermarking Method for New Viewpoint Video Based on Depth Map
    Zhu, Ning
    Ding, Guiguang
    Wang, Jianmin
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 3 - 7
  • [35] A JND-based Saliency Map Fusion Method for Digital Video Watermarking
    Chen, Dandi
    Xia, Siyu
    Lu, Kaiyue
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 4568 - 4573
  • [36] Towards a 2D Vector Map with a Feature Nodes Based Watermarking method
    Zhang Hongsheng
    Li Yan
    GEOINFORMATICS 2008 AND JOINT CONFERENCE ON GIS AND BUILT ENVIRONMENT: ADVANCED SPATIAL DATA MODELS AND ANALYSES, PARTS 1 AND 2, 2009, 7146
  • [37] Robust digital watermarking using random casting method
    Kim, JS
    Kim, TH
    Kim, ES
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 267 - 276
  • [38] A digital image watermarking method using interval arithmetic
    Minamoto, Teruya
    Yoshihara, Mitsuaki
    Fujii, Satoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (12) : 2949 - 2951
  • [39] Improved video verification method using digital watermarking
    Echizen, Isao
    Yamada, Takaaki
    Tezuka, Satoru
    Singh, Stephan
    Yoshiura, Hiroshi
    IIH-MSP: 2006 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2006, : 445 - 448
  • [40] The digital watermarking method by using both patchwork and DCT
    Kii, H
    Onishi, J
    Ozawa, S
    IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 1, 1999, : 895 - 899