Skip to main content
Log in

Polyline curvatures based robust vector data hashing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The growth in applications for vector data such as CAD design drawings and GIS digital maps has increased the requirements for authentication, copy detection, and retrieval of vector data. Vector data hashing is one of the main techniques for meeting these requirements. Its design must be robust, secure, and unique, which is similar to image or video hashing. This paper presents a vector data hashing method based on the polyline curvature for design drawings and digital maps. Our hashing method extracts the feature values by projecting the polyline curvatures, which are obtained from groups of vector data using GMM clustering, onto random values, before generating the final binary hash by binarization. A robustness evaluation showed that our hashing method had a very low false detection probability during geometrical modifications, rearrangements, and similar transformations of objects and layers. A security evaluation based on differential entropy showed that the level of uncertainty was very high with our hashing method. Furthermore, a uniqueness evaluation showed that the Hamming distances between hashes were very low.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Aybet J, Al-Saedy H, Farmer M (2008) Watermarking spatial data in geographic information systems. Commun Comput Inf Sci 45:18–26

    Article  Google Scholar 

  2. AutoCAD (2011) http://www.autodesk.com. Accessed 26 Dec 2011

  3. Bilmes JA (1998) A gentle tutorial on the em algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models. Tech. Rep. TR-97-021, International Computer Science Institute

  4. Chang K (2007) Introduction to geographic information system, 4th edn. McGraw-Hill, New York

    Google Scholar 

  5. Chen Y, Gupta MR (2010) EM demystified: an expectation-maximization tutorial. UWEE Technical Report, Number UWEETR-2010-0002

  6. Coskun B, Sankur B, Memon N (2006) Spatio-temporal transform based video hashing. IEEE Trans Multimedia 8(6):1190–1208

    Article  Google Scholar 

  7. De Roover C, De Vleeschouwer C, Lefebvre F, Macq B (2005) Robust video hashing based on radial projections of key frames. IEEE Trans Signal Process 53(10, Part 2):4020–4037

    Article  MathSciNet  Google Scholar 

  8. Differential Geometry of Curves (2011) http://en.wikipedia.org. Accessed 26 Dec 2011

  9. Farin G, Hoschek J, Kim M-S (2002) Handbook of computer aided geometric design. Elsevier Science

  10. Kreyszig E (1991) Differential geometry. Dover, New York

    Google Scholar 

  11. Lee SH, Kwon KR (2010) CAD drawing watermarking scheme. Digit Signal Process 20(5):1379–1399

    Article  Google Scholar 

  12. Lee S-H, Kwon K-R (2011) Vector watermarking scheme for GIS vector map management. Multimed Tools Appl. 63(3):757–790

    Article  Google Scholar 

  13. Lee S-H, Kwon K-R (2012) Robust 3D mesh model hashing based on feature object. Digit Signal Process 22:744–759

    Article  MathSciNet  Google Scholar 

  14. Lee S-H, Lee E-J, Kwon K-R (2010) Robust 3D mesh hashing based on shape features. In: IEEE international conference on multimedia and expo, pp 1040–1043

  15. Mao Y, Wu M (2007) Unicity distance of robust image hashing. IEEE Trans Inf Forensics Secur 2:462–467

    Article  Google Scholar 

  16. Monga V, Mhcak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Secur 2(3, Part 1):376–390

    Article  Google Scholar 

  17. Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forensics Secur 1:68–79

    Article  Google Scholar 

  18. National Geographic Information Institute (2011) http://www.ngi.go.kr. Accessed 26 Dec 2011

  19. Niu X-M, Shao C-Y, Wang X-T (2007) GIS watermarking: hiding data in 2D vector maps. Stud Comput Intell 58:123–155

    Article  Google Scholar 

  20. Ohbuchi R, Ueda H, Endoh S (2002) Robust watermarking of vector digital maps. In: Proc. of IEEE international conference on multimedia and expo (ICME), vol 1, pp 577–580

  21. Penga F, Guoa R-S, Lib C-T, Longc M (2010) A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput Aided Des 42(12):1207–1216

    Article  Google Scholar 

  22. Shao CY, Wang HL, Niu XM, Wang XT (2006) A shape-preserving method for watermarking 2D vector maps based on statistic detection. IEICE Trans Inf Syst E89-D(3):1290–1293

    Article  Google Scholar 

  23. Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2):215–230

    Article  Google Scholar 

  24. Tarmissia K, Hamza AB (2009) Information-theoretic hashing of 3D objects using spectral graph theory. Expert Syst Appl 36(5):9409–9414

    Article  Google Scholar 

  25. Vogit M, Busch C (2002) Watermarking 2D-vector data for geographical information systems. In: Proc. of the SPIE, security and watermarking of multimedia content, San Jose, USA, vol 4675, pp 621–628

  26. Wang C, Peng Z, Peng Y, Yu L, Wang J, Zhao Q (2010) Watermarking geographical data on spatial topological relations. Multimed Tools Appl 57(1):67–89

    Article  Google Scholar 

  27. Wu B, Wang W, Peng Z, Du D, Wang C (2010) Design and implementation of spatial data watermarking service system. Geo-spatial Inf Sci 13(1):40–48

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MEST) (KRF-2009- 0071269 and KRF-2011-0023118).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Suk-Hwan Lee or Ki-Ryong Kwon.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lee, SH., Hwang, WJ. & Kwon, KR. Polyline curvatures based robust vector data hashing. Multimed Tools Appl 73, 1913–1942 (2014). https://doi.org/10.1007/s11042-013-1661-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1661-z

Keywords

Navigation