Abstract
In this paper, we use a grouping method and feature marking to ensure a good localization accuracy. Then, on the basis of vertex insertion and an embedding strategy that can resist rotation, translation and scaling (RST) attacks, we design a group correlation method. And the RST invariant authentication information are generated with the log-polar transformation (LPT) and encryption technology. We construct two datasets and the invisibility, validity and localization ability are demonstrated through experiments. It can resist the batch features deletion attack accurately and mark out the deleted group.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang, N.N., Zhao, X., Xie, C.: RST invariant reversible watermarking for 2D vector map. Int. J. Multimed. Ubiquit. Eng. 11(2), 265–276 (2016)
Wang, N.N., Men, C.G.: Reversible fragile watermarking for 2-D vector map authentication with localization. Comput. Aided Des. 44(4), 320–330 (2012)
Weng, L., Darazi, R., Preneel, B., Macq, B., Dooms, A.: Robust image content authentication using perceptual hashing and watermarking. In: Lin, W., Xu, D., Ho, A., Wu, J., He, Y., Cai, J., Kankanhalli, M., Sun, M.-T. (eds.) PCM 2012. LNCS, vol. 7674, pp. 315–326. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34778-8_29
Haojun, F.U., Zhu, C., Jian, M.: Multipurpose watermarking algorithm for digital raster map based on wavelet transformation. Acta Geod. Cartogr. Sin. 40(3), 397–400 (2011)
Li, C., Ma, B., Wang, Y., Huang, D., Zhang, Z.: A secure semi-fragile self-recoverable watermarking algorithm using group-based wavelet quantization. In: Lin, W., Xu, D., Ho, A., Wu, J., He, Y., Cai, J., Kankanhalli, M., Sun, M.-T. (eds.) PCM 2012. LNCS, vol. 7674, pp. 327–336. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34778-8_30
Fujiyoshi, M., Kiya, H.: Histogram-based near-lossless data hiding and its application to image compression. In: Ho, Y.-S., Sang, J., Ro, Y.M., Kim, J., Wu, F. (eds.) PCM 2015. LNCS, vol. 9315, pp. 225–235. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24078-7_22
Shi, H., Li, M.C., Guo, C., et al.: A region-adaptive semi-fragile dual watermarking scheme. Multimed. Tools Appl. 75(1), 465–495 (2016)
Ren, N., Wang, Q., Zhu, C.: Selective authentication algorithm based on semi-fragile watermarking for vector geographical data. In: 22nd International Conference on GeoInformatics (2014)
Neyman, S.N., Sitohang, B., Cahyono, F.: An improvement technique of fragile watermarking to assurance the data integrity on vector maps. In: IC3INA, vol. 25, pp. 179–184. Springer (2013)
Neyman, S.N., Wijaya, Y.H., Sitohang, B.: A new scheme to hide the data integrity marker on vector maps using a feature-based fragile watermarking algorithm. In: International Conference on Data and Software Engineering (ICODSE) (2014)
Wang, N.N., Zhang, H., Men, C.G.: A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates. Comput. Aided Des. 47, 108–117 (2014)
Chou, C.M., Tseng, D.C.: Affine-transformation-invariant public fragile watermarking for 3D model authentication. IEEE Comput. Graph. Appl. 29(2), 72–79 (2009)
Wang, N.N., Bian, J., Zhang, H.: RST invariant fragile watermarking for 2D vector map authentication. Int. J. Multimed. Ubiquit. Eng. 10(4), 155–172 (2015)
Wang, N.N., Zhao, X., Zhang, H.: Block-based reversible fragile watermarking for 2D vector map authentication. Int. J. Digit. Crime Forensics 7(3), 60–80 (2015)
Yue, M., Peng, Z., Peng, Y.: A fragile watermarking scheme for modification type characterization in 2D vector maps. In: Asia-Pacific Web Conference (2014)
Acknowledgments
This work was supported by project of NSFC of China (61202455, 61472096, 61501132).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Zhang, G. et al. (2018). A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication. In: Zeng, B., Huang, Q., El Saddik, A., Li, H., Jiang, S., Fan, X. (eds) Advances in Multimedia Information Processing – PCM 2017. PCM 2017. Lecture Notes in Computer Science(), vol 10736. Springer, Cham. https://doi.org/10.1007/978-3-319-77383-4_86
Download citation
DOI: https://doi.org/10.1007/978-3-319-77383-4_86
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77382-7
Online ISBN: 978-3-319-77383-4
eBook Packages: Computer ScienceComputer Science (R0)