Skip to main content

Watermarking Spatial Trajectory Database

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3453))

Abstract

Protection of digital assets from piracy has received increasing interests where sensitive, valuable data need to be released. This paper addresses the problem of watermarking spatial trajectory database. The formal definition of the problem is given and the potential attacks are analyzed. Then a novel watermarking method is proposed, which embed the watermark information by introducing a small error to the trajectory shape rather than certain data values. Experimental results justify the usefulness of the proposed method, and give some empirical conclusions on the parameter settings.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Priyantha, N., Miu, A., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: Proc. of MOBICOM 2001, pp. 1–14 (2001)

    Google Scholar 

  2. Chen, G., Kotz, D.: Categorizing binary topological relations between regions, lines, and points in geographic databases. Technical Report TR2000-381, A Survey of Context-Aware Mobile Computing Research, Dept. of Computer Science, Dartmouth College (2000)

    Google Scholar 

  3. Vlachos, M., Kollios, G., Gunopulos, D.: Discovering Similar Multidimensional Trajectories. In: Proc. of the 18th International Conference on Data Engineering (ICDE 2002), San Jose, California (2002)

    Google Scholar 

  4. Patel, J.M., Chen, Y., Chakka, V.P.: STRIPES: An Efficient Index for Predicted Trajectories. In: Proceedings of ACM SIGMOD 2004, pp. 635–646 (2004)

    Google Scholar 

  5. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proceedings of ACM SIGMOD 2004, pp. 563–574 (2004)

    Google Scholar 

  6. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding - A Survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  7. Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal of Selected Areas in Communications 16(4), 573–586 (1998)

    Article  Google Scholar 

  8. Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of the IEEE 87(7), 1079–1107 (1999)

    Article  Google Scholar 

  9. Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking Digital Images for Copyright Protection. IEEE Proceedings on Vision, Signal and Image Processing 143(4), 250–256 (1996)

    Article  Google Scholar 

  10. Cox, I.J., Linnartz, J.P.M.G.: Some General Methods for Tampering with Watermarks. IEEE Journal of Selected Areas in Communication 16(4), 573–586 (1998)

    Article  Google Scholar 

  11. Collberg, C., Thomborson, C.: On the Limits of Software Watermarking. Technique Reports, Department of Computer Sciences, The University of Auckland (1998)

    Google Scholar 

  12. Chang, H., Atallah, M.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol. 2320, pp. 160–175. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  13. Collberg, C., Carter, E., Debray, S., Huntwork, A., Linn, C., Stepp, M.: Dynamic path-based software watermarking. In: SIGPLAN 2004 Conference on Programming Language Design and Implementation (2004)

    Google Scholar 

  14. Agrawal, R., Kiernan, J.: Watermarking Relational Databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)

    Google Scholar 

  15. Sion, R., Atallah, M., Prabhakar, S.: Rights Protection for Relational Data. In: Proceedings of ACM SIGMOD, pp. 98–109 (2003)

    Google Scholar 

  16. Ohbuchi, R., Masuda, H., Aono, M.: A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces. In: Computer Graphics International 1999 (CGI 1999), Canmore, Canada (1999)

    Google Scholar 

  17. Ohbuchi, R., Ueda, H., Endoh, S.: Robust Watermarking of Vector Digital Maps. In: Proceedings of the IEEE International Conference on Multimedia and Expo 2002 (ICME 2002), Lausanne, Switzerland (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jin, X., Zhang, Z., Wang, J., Li, D. (2005). Watermarking Spatial Trajectory Database. In: Zhou, L., Ooi, B.C., Meng, X. (eds) Database Systems for Advanced Applications. DASFAA 2005. Lecture Notes in Computer Science, vol 3453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11408079_8

Download citation

  • DOI: https://doi.org/10.1007/11408079_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25334-1

  • Online ISBN: 978-3-540-32005-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics