Skip to main content
Log in

A crypto-marking method for secure vector map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A crypto-marking technique can be used to provide a solution to the secure transmission and storage of highly valuable and detailed vector maps. Such a solution would fulfill the requirements for integrity verification, content security, copyright protection, and authentication. However, existing methods cannot ensure the perceptual invisibility of the watermarking in the encryption domain and can leak the encryption key while decrypting a crypto-marked map. In response to these issues, we present a vector map crypto-marking method using both watermarking and progressive perceptual encryption that are independent of each other. The first watermarking step embeds the watermark using the mean of the Euclidian distance (MED) while preserving the object shape and being robust to geometric attacks. The second perceptual encryption step encrypts the progressive regions in a layer, the objects of a region, and the vertices in an object so that a direct random-access object can be enabled in the encryption/decryption processes. To attain the mutual independence of watermarking and encryption, we encrypted the attributes of objects by using random permutations of the position and orientation of the vertices while preserving the SEDs of all the objects. Hence, the watermark can be extracted in a crypto-marked map or progressive encrypted map without decrypting all the objects. From the experimental results, we found that our method is robust to attacks that damage the vector map during the decryption step and does not produce a leakage of the encryption key during the watermark detecting step. Furthermore, we found that the time required by our method is proportional to the number of objects in vector maps, 0.59 [s] for 7,765 objects and 3.52 [s] for 50,679 objects. Our MED-based watermarking takes less time (about 0.07–0.43 [s] than conventional watermarking methods while our progressive encryption takes less time, at about 0.09 [s] - 0.37 [s], than conventional encryption methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Abubahia AM, Cocea M (2015) Exploiting vector map properties for GIS data copyright protection. IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), pp 575–582

  2. Airport Integrated Mapping System (AIMS) (2003) CADD & GIS data accuracy specification. SJC-ACM-AIMS-2611

  3. Autrusseau F, Guedon JV, Bizais Y (2003) Mojette cryptomarking scheme for medical images. Medical Imaging 2003:Image Processing, 5032:958–965

  4. Cancellaro M, Battisti F, Carli M, Boato G, Natale FD, Neri A (2008) A joint digital watermarking and encryption method. Electronic Imaging, 68191C

  5. Cao L, Men C, Gao Y (2013) A recursive embedding algorithm towards lossless 2D vector map watermarking. Digital Signal Process 23(3):912–918

    Article  MathSciNet  Google Scholar 

  6. Cao L, Men C, Ji R (2015) High-capacity reversible watermarking scheme of 2D-vector data. SIViP 9(6):1387–1394

    Article  Google Scholar 

  7. Dakroury Y, El-ghafar IA, Tammam A (2010) Protecting GIS data using cryptography and digital watermarking. Int J Comput Sci Netw Secur 10(1):75–84

    Google Scholar 

  8. Douglas DH, Peucker TK (1973) Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Cartographica Int J Geogr Inf Geovisualization 112–122

  9. Geographic Information Technology Training Alliance (GITTA), Position Accuracy, http://www.gitta.info/MetaDataQual/en/multimedia/PositAccuracy.pdf. Accessed on 2016

  10. Huber WA (2002) GIS & steganography, part 3: vector steganography. Directions Magazine

  11. Jang BJ, Lee S-H, Moon G-S, Kwon K-R (2011) Contents based partial encryption of GIS vector map. J Institutes Electron Eng Korea CI-48(5):88–98

    Google Scholar 

  12. Jang BJ, Lee S-H, Kwon K-R (2014) Perceptual encryption with compression for secure vector map data processing. Digit Signal Process 25:224–243

    Article  Google Scholar 

  13. Kang HI, Kim KI, Choi JU (2001) A vector watermarking using the generalized square mask. Proceedings of International Conference on Information Technology: Coding and Computing, pp 234–236

  14. Lee S-H, Huo X-J, Kwon K-R (2014) Vector watermarking method for digital map protection using arc length distribution. IEICE Trans Inf Syst E97.D(1):34–42

    Article  Google Scholar 

  15. Lee S-H, Hwang W-J, Kwon K-R (2014) Polyline curvatures based robust vector data hashing. Multimedia Tools Appl 73(3):1913–1942

    Article  Google Scholar 

  16. Lee S-H, Kwon K-R (2013) Vector watermarking scheme for GIS vector map management. Multimedia Tools Appl 63(3):757–790

    Article  Google Scholar 

  17. Li G (2010) Research of key technologies on encrypting vector spatial data in oracle spatial. 2nd International Conference on Information Engineering and Computer Science, pp 1–4

  18. Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools Appl 43(1):91–107

    Article  MathSciNet  Google Scholar 

  19. Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. Circuits Syst Video Technol 17(6):774–778

    Article  Google Scholar 

  20. Lipmaa H, Rogaway P, Wagner D (2000) CTR-mode encryption. First NIST Workshop on Modes of Operation

  21. Merhav N (2006) On joint coding for watermarking and encryption. IEEE Trans Inf Theory 52(1):190–205

    Article  MathSciNet  MATH  Google Scholar 

  22. National Geographic Information Institute (NGII), http://www.ngii.go.kr/en/main/main.do?rbsIdx=1. Accessed on 2016

  23. Ngoc GP, Lee S-H, Kwon K-R (2015) Selective encryption algorithm for GIS vector map using geometric objects. Int J Secur Appl 9(2):61–72

    Google Scholar 

  24. Ohbuchi R, Ueda H, Endoh S (2002) Robust watermarking of vector digital maps. IEEE International Conference on Multimedia and Expo, 1:577–580

  25. Park KT, Kim KI, Kang HI, Han SS (2002) Digital geographical map watermarking using polyline interpolation. Advances in Multimedia Information Processing—PCM2002, 2532:58–65

  26. Peng Z, Yue M, Wu X, Peng Y (2015) Blind watermarking scheme for polylines in vector geo-spatial data. Multimedia Tools Appl 74(24):11721–11739

    Article  Google Scholar 

  27. Schmitz R, Li S, Grecos C, Zhang X (2012) A new approach to commutative watermarking-encryption. Commun Multimedia Secur 7394:117–130

    Article  Google Scholar 

  28. Schulz G, Voigt M (2004) A high capacity watermarking system for digital maps. Proceedings of the 2004 workshop on Multimedia and security, pp 180–186

  29. Shujun D, Liang L, Sen C (2007) Research on a digital watermarking algorithm suitable to vector map. IEEE International Conference on Automation and Logistics, pp 1236–1240

  30. Sonnet H, Isenberg T, Dittmann J, Strothotte T (2003) Illustration watermarks for vector graphics. Pacific Conference on Computer Graphics and Applications, pp 73–82

  31. Wang N, Men C (2013) Reversible fragile watermarking for locating tampered blocks in 2D vector maps. Multimedia Tools Appl 67(3):709–739

    Article  Google Scholar 

  32. Wang N, Zhao X, Zhang H (2015) Block-based reversible fragile watermarking for 2D vector map authentication. Int J Digit Crime Forensic 7(3):60–80

    Article  Google Scholar 

  33. Zhang D, Qian D, Han P (2007) A new attributes-priority matching watermarking algorithm satisfying topological conformance for vector map. Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, 2:469–472

Download references

Acknowledgments

This research was supported by This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2014R1A1A4A01006663) and supported by a grant from the Strategic Research Project (Development of Driving Environment Observation, Prediction and Safety Technology Based on Automotive Sensors), which is funded by the Korea Institute of Civil Engineering and Building Technology and also supported by BB21 (Brain Busan) Project partially.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ki-Ryong Kwon.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jang, BJ., Lee, SH., Lee, EJ. et al. A crypto-marking method for secure vector map. Multimed Tools Appl 76, 16011–16044 (2017). https://doi.org/10.1007/s11042-016-3893-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3893-1

Keywords

Navigation