Abstract
A crypto-marking technique can be used to provide a solution to the secure transmission and storage of highly valuable and detailed vector maps. Such a solution would fulfill the requirements for integrity verification, content security, copyright protection, and authentication. However, existing methods cannot ensure the perceptual invisibility of the watermarking in the encryption domain and can leak the encryption key while decrypting a crypto-marked map. In response to these issues, we present a vector map crypto-marking method using both watermarking and progressive perceptual encryption that are independent of each other. The first watermarking step embeds the watermark using the mean of the Euclidian distance (MED) while preserving the object shape and being robust to geometric attacks. The second perceptual encryption step encrypts the progressive regions in a layer, the objects of a region, and the vertices in an object so that a direct random-access object can be enabled in the encryption/decryption processes. To attain the mutual independence of watermarking and encryption, we encrypted the attributes of objects by using random permutations of the position and orientation of the vertices while preserving the SEDs of all the objects. Hence, the watermark can be extracted in a crypto-marked map or progressive encrypted map without decrypting all the objects. From the experimental results, we found that our method is robust to attacks that damage the vector map during the decryption step and does not produce a leakage of the encryption key during the watermark detecting step. Furthermore, we found that the time required by our method is proportional to the number of objects in vector maps, 0.59 [s] for 7,765 objects and 3.52 [s] for 50,679 objects. Our MED-based watermarking takes less time (about 0.07–0.43 [s] than conventional watermarking methods while our progressive encryption takes less time, at about 0.09 [s] - 0.37 [s], than conventional encryption methods.
Similar content being viewed by others
References
Abubahia AM, Cocea M (2015) Exploiting vector map properties for GIS data copyright protection. IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI), pp 575–582
Airport Integrated Mapping System (AIMS) (2003) CADD & GIS data accuracy specification. SJC-ACM-AIMS-2611
Autrusseau F, Guedon JV, Bizais Y (2003) Mojette cryptomarking scheme for medical images. Medical Imaging 2003:Image Processing, 5032:958–965
Cancellaro M, Battisti F, Carli M, Boato G, Natale FD, Neri A (2008) A joint digital watermarking and encryption method. Electronic Imaging, 68191C
Cao L, Men C, Gao Y (2013) A recursive embedding algorithm towards lossless 2D vector map watermarking. Digital Signal Process 23(3):912–918
Cao L, Men C, Ji R (2015) High-capacity reversible watermarking scheme of 2D-vector data. SIViP 9(6):1387–1394
Dakroury Y, El-ghafar IA, Tammam A (2010) Protecting GIS data using cryptography and digital watermarking. Int J Comput Sci Netw Secur 10(1):75–84
Douglas DH, Peucker TK (1973) Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Cartographica Int J Geogr Inf Geovisualization 112–122
Geographic Information Technology Training Alliance (GITTA), Position Accuracy, http://www.gitta.info/MetaDataQual/en/multimedia/PositAccuracy.pdf. Accessed on 2016
Huber WA (2002) GIS & steganography, part 3: vector steganography. Directions Magazine
Jang BJ, Lee S-H, Moon G-S, Kwon K-R (2011) Contents based partial encryption of GIS vector map. J Institutes Electron Eng Korea CI-48(5):88–98
Jang BJ, Lee S-H, Kwon K-R (2014) Perceptual encryption with compression for secure vector map data processing. Digit Signal Process 25:224–243
Kang HI, Kim KI, Choi JU (2001) A vector watermarking using the generalized square mask. Proceedings of International Conference on Information Technology: Coding and Computing, pp 234–236
Lee S-H, Huo X-J, Kwon K-R (2014) Vector watermarking method for digital map protection using arc length distribution. IEICE Trans Inf Syst E97.D(1):34–42
Lee S-H, Hwang W-J, Kwon K-R (2014) Polyline curvatures based robust vector data hashing. Multimedia Tools Appl 73(3):1913–1942
Lee S-H, Kwon K-R (2013) Vector watermarking scheme for GIS vector map management. Multimedia Tools Appl 63(3):757–790
Li G (2010) Research of key technologies on encrypting vector spatial data in oracle spatial. 2nd International Conference on Information Engineering and Computer Science, pp 1–4
Lian S (2009) Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools Appl 43(1):91–107
Lian S, Liu Z, Ren Z, Wang H (2007) Commutative encryption and watermarking in video compression. Circuits Syst Video Technol 17(6):774–778
Lipmaa H, Rogaway P, Wagner D (2000) CTR-mode encryption. First NIST Workshop on Modes of Operation
Merhav N (2006) On joint coding for watermarking and encryption. IEEE Trans Inf Theory 52(1):190–205
National Geographic Information Institute (NGII), http://www.ngii.go.kr/en/main/main.do?rbsIdx=1. Accessed on 2016
Ngoc GP, Lee S-H, Kwon K-R (2015) Selective encryption algorithm for GIS vector map using geometric objects. Int J Secur Appl 9(2):61–72
Ohbuchi R, Ueda H, Endoh S (2002) Robust watermarking of vector digital maps. IEEE International Conference on Multimedia and Expo, 1:577–580
Park KT, Kim KI, Kang HI, Han SS (2002) Digital geographical map watermarking using polyline interpolation. Advances in Multimedia Information Processing—PCM2002, 2532:58–65
Peng Z, Yue M, Wu X, Peng Y (2015) Blind watermarking scheme for polylines in vector geo-spatial data. Multimedia Tools Appl 74(24):11721–11739
Schmitz R, Li S, Grecos C, Zhang X (2012) A new approach to commutative watermarking-encryption. Commun Multimedia Secur 7394:117–130
Schulz G, Voigt M (2004) A high capacity watermarking system for digital maps. Proceedings of the 2004 workshop on Multimedia and security, pp 180–186
Shujun D, Liang L, Sen C (2007) Research on a digital watermarking algorithm suitable to vector map. IEEE International Conference on Automation and Logistics, pp 1236–1240
Sonnet H, Isenberg T, Dittmann J, Strothotte T (2003) Illustration watermarks for vector graphics. Pacific Conference on Computer Graphics and Applications, pp 73–82
Wang N, Men C (2013) Reversible fragile watermarking for locating tampered blocks in 2D vector maps. Multimedia Tools Appl 67(3):709–739
Wang N, Zhao X, Zhang H (2015) Block-based reversible fragile watermarking for 2D vector map authentication. Int J Digit Crime Forensic 7(3):60–80
Zhang D, Qian D, Han P (2007) A new attributes-priority matching watermarking algorithm satisfying topological conformance for vector map. Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, 2:469–472
Acknowledgments
This research was supported by This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2014R1A1A4A01006663) and supported by a grant from the Strategic Research Project (Development of Driving Environment Observation, Prediction and Safety Technology Based on Automotive Sensors), which is funded by the Korea Institute of Civil Engineering and Building Technology and also supported by BB21 (Brain Busan) Project partially.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jang, BJ., Lee, SH., Lee, EJ. et al. A crypto-marking method for secure vector map. Multimed Tools Appl 76, 16011–16044 (2017). https://doi.org/10.1007/s11042-016-3893-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3893-1