Abstract
Spatial data has been widely used in many areas. Meanwhile, the increasingly simplified data access and manipulation methods in spatial data related applications make it important to verify data truthfulness. In this paper, we propose a reversible fragile watermarking scheme for the content authentication of spatial data. The proposed scheme embeds (detects) four kinds of watermarks, i.e., group, object, vertex-local and vertex-global watermarks, into (from) each object (vertex) by altering the digits of the coordinates after the LSD (Least Significant Digit). According to the detection results of those four kinds of watermarks, the scheme can not only locate tampers, but also recognize modification types on both object and vertex levels. In addition, the proposed scheme is reversible, that is the original data can be restored from the watermarked data. The feature of reversibility makes the scheme suitable for applications which require high-precision data.
Keywords
Y. Peng—This work is supported by the National Natural Science Foundation of China under grant (No.61100019).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Lin, C.E., Kao, C.M., Lai, Y.C., Shan, W.L., Wu, C.Y.: Application of integrated GIS and multimedia modeling on NPS pollution evaluation. Environ. Monit. Assess. 158(11), 319–331 (2009)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding: a survey. Proc. IEEE 87(7), 1062–1078 (1999)
Peng, F., Guo, R.S., Li, C.T., Long, M.: A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. CAD 12, 1207–1216 (2012)
Cao, L., Men, C., Gao, Y.: A recursive embedding algorithm towards lossless 2D vector map watermarking. DSP 23, 912–918 (2013)
Guo, J.M., Liu, Y.F.: Continuous-tone watermark hiding in halftone images. In: Proceedings of the 16th International Asia-Pacific Web Conference on Web Technologies and Applications, pp. 411–414 (2010)
Guting, R.H.: An introduction to spatial database systems. VLDBJ 3(4), 357–399 (1994)
Wu, C.-C., Chang, C.-C., Yang, S.-R.: An efficient fragile watermarking for web pages tamper-proof. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM -2007. LNCS, vol. 4537, pp. 654–663. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72909-9_72
Kee, E., Johnson, M.K., Farid, H.: Digital image authentication from JPEG headers. IEEE Trans. Inf. Forensics Secur. 6(3), 1066–1075 (2011)
Sarreshtedari, S., Akhaee, M.A.: A source-channel coding approach to digital image protection and self-recovery. IEEE Trans. Image Process. 24(7), 2266–2277 (2015)
Li, W., Zhu, B., Wang, Z.: On the music content authentication. In: Proceedings of ACM International Conference on Multimedia, pp. 1101–1104 (2012)
Upadhyay, S., Singh, S.K.: Video authentication: issues and challenges. Int. J. Comput. Sci. 9(1–3), 409–418 (2012)
Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176, 1350–1378 (2006)
Niu, X.M., Shao, C.Y., Wang, X.T.: A survey of digital vector map watermarking. Int. J. Innov. Comput. Inf. Control 2(6), 1301–1316 (2006)
Niu, X.M., Shao, C.Y., Wang, X.T.: GIS watermarking: hiding data in 2D vector maps. In: Pan, J.S., Huang, H.C., Jain, L.C., Fang, W.C. (eds.) Intelligent Multimedia Data Hiding. SCI, vol. 58, pp. 123–155. Springer, Heidelberg (2007). doi:10.1007/978-3-540-71169-8_6
Rao, U.P., Patel, D.R., Vikani, P.M.: Relational database watermarking for ownership protection. Procedia Technol. 6, 988–995 (2012)
Zheng, L., You, F.: A fragile digital watermark used to verify the integrity of vector map. In: Proceedings of IEEE International Conference on E-Business and Information System Security, pp. 1–4 (2009)
Wang, N., Men, C.: Reversible fragile watermarking for locating tampered blocks in 2D vector maps. In: Multimedia Tools and Applications, pp. 1–31 (2013)
Zhang, H., Gao, M.: A Semi-fragile digital watermarking algorithm for 2D vector graphics tamper localization. In: Proceedings of IEEE International Conference on Multimedia Information Networking and Security, vol. 1, pp. 549–552 (2009)
Zheng, L., Li, Y., Feng, L., Liu, H.: Research and implementation of fragile watermark for vector graphics. In: Proceedings of IEEE International Conference on Computer Engineering and Technology, vol. 1, pp. V1-522–V1-525 (2010)
Wang, N., Men, C.: Reversible fragile watermarking for 2-D vector map authentication with localization. Comput. Aided Des. 44(4), 320–330 (2012)
Schneier, B.: Applied Cryptography. Wiley, Chichester (1996)
Cohen, S.D., Guibas, L.J.: Partial matching of planar polylines under similarity transformations. In: Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, pp. 777–786 (1997)
IEEE Standard for Binary Floating-point Arithmetic. ANSI/IEEE Standard 754–1985
Yue, M., Peng, Z., Peng, Y.: A fragile watermarking scheme for modification type characterization in 2D vector maps. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds.) APWeb 2014. LNCS, vol. 8709, pp. 129–140. Springer, Cham (2014). doi:10.1007/978-3-319-11116-2_12
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Lan, H., Peng, Y. (2017). Reversible Fragile Watermarking for Fine-Grained Tamper Localization in Spatial Data. In: Huang, Z., Xiao, X., Cao, X. (eds) Databases Theory and Applications. ADC 2017. Lecture Notes in Computer Science(), vol 10538. Springer, Cham. https://doi.org/10.1007/978-3-319-68155-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-68155-9_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68154-2
Online ISBN: 978-3-319-68155-9
eBook Packages: Computer ScienceComputer Science (R0)