Skip to main content
Log in

Secure map legends based on just noticeable distortion and watermark bit recovery

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An important component of cartography, the map legends can be a type of hybrid data with small data quantity and high precision. Therefore, its watermark method should be versatile to all map legend data types. In addition, its watermark should be robust, imperceivable, and small. In this regard, our study proposes a novel watermarking method of map legends for copyright protection. The data types of map legends are evaluated. According to the data types and just noticeable distortion tolerance, the watermark bit embedding positions of each data type are defined. A text watermark is adopted to reduce the number of watermark bits. By the watermark bit count, map legends are divided into groups to contain multiple watermarks. Meanwhile, a watermark bit recovery method is designed to fix the damaged watermark bits based on the extracted ones, which ensures greater robustness. The experimental results demonstrate the proposed method achieves the expected goal in terms of various types of attacks and image operations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 2
Algorithm 4
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Abubahia A, Cocea M (2017) Advancements in gis map copyright protection schemes - a critical review. Multimed Tools Appl 76:12205–12231

    Article  Google Scholar 

  2. Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T, Digital watermarking and steganography (2nd edn.). Morgan Kaufmann Burlington pp 1–13 (2008) Introduction. In: Cox IJ, Miller ML, Bloom JA, Fridrich J, Kalker T (eds)

  3. Dyson FJ, Falk H (1992) Period of a discrete cat mapping. American Math Month 99(7):603–614

    Article  MathSciNet  MATH  Google Scholar 

  4. Gomathisankaran M, Yuan X, Kamongi P (2013) Ensure privacy and security in the process of medical image analysis. In: 2013 IEEE international conference on granular computing (GrC), pp 120–125

  5. Haitao Z, Xuefang L, Xiaorong G (2013) Research on the methods of quality inspection for published charts based on entity rules and cartographic specifications. journal=Int Arch Photogrammetry Remote Sensing Spatial Inf Sci, XL-2/W1:65–69

    Google Scholar 

  6. Hamouda E, Yuan X, Ouda O, Hamza T, Chen L (2014) Binary biometric template generation towards security and class separability. In: Fifth international conference on computing, communications and networking technologies, pp 1–6

  7. Horng S-J, Rosiyadi D, Fan P, Wang X, Khan K (2014) An adaptive watermarking scheme for e-government document images. Multimed Tools Appl 72:10

    Article  Google Scholar 

  8. Jinxia W, Yang F, Wu C (2013) Review of digital watermarking for 2d-vector map. In: 2013 IEEE international conference on green computing and communications and IEEE internet of things and IEEE Cyber, physical and social computing, pp 2098–2101

  9. Katzenbeisser S, Petitcolas FA (2000) Information Hiding Techniques for Steganography and Digital Watermarking, 1st edn. Artech House, Inc., USA

    Google Scholar 

  10. Kim J, Won S, Zeng W, Park S (2011) Copyright protection of vector map using digital watermarking in the spatial domain. In: The 7th international conference on digital content, multimedia technology and its applications. pp 154–159

  11. Li S-S, Zhou W, Li A-B (2012) Image watermark similarity calculation of gis vector data. Procedia Eng 29:1331–1337

    Article  Google Scholar 

  12. Lv Y-l, Wang R-f, Zhao S-j, Wang X, Yang C-h (2010) Design and development of scales and slope scales meeting national specifications based on arcgis platform. In: 2010 second IITA international conference on geoscience and remote sensing, vol 1, pp 560–563

  13. Rosiyadi D, Horng S-J, Lestriandoko NH (2015) A resistant digital image watermarking scheme based on masking model. In: 2015 international carnahan conference on security technology (ICCST), pp 1–4

  14. Wang L, Fang F, Yuan X, Luo Z, Liu Y, Bo W, Zhao Y (2017) Urban function zoning using geotagged photos and openstreetmap. In: 2017 IEEE international geoscience and remote sensing symposium (IGARSS), pp 815–818

  15. Wen Q, Sun T-F, Wang S-X (2003) Concept and application of zero-watermark. Acta Electron Sin 31:214–216

    Google Scholar 

  16. Wu M, Zhu A, Zheng P, Cui L, Zhang X (2017) An improved map-symbol model to facilitate sharing of heterogeneous qualitative map symbols. Cartogr Geogr Inf Sci 44(1):62–75

    Article  Google Scholar 

  17. Yang C, Zhu C, Wang Y, Rui T, Zhu J, Kaimeng D (2020) A robust watermarking algorithm for vector geographic data based on qim and matching detection. Multimed Tools Appl 79:11

    Article  Google Scholar 

  18. Yuan X, Gomathisankaran M (2016) Secure medical image processing for mobile devices 341 using cloud services, chapter 6. SPIE PRESS, pp 155–174

  19. Zhen Z (2012) Automated plotting technology research for the point symbols in the multi-core environment. In: 2012 20th international conference on geoinformatics, pp 1–6

  20. Zhou L, Chen ZL, Wu L (2017) A zero-watermarking algorithm of map legend library based on item characteristics. Sci Surveying Mapp 42(3):137–142

    Google Scholar 

  21. Zhou G, Zeng P, Yuan X, Chen S, Choo K-KR (2017) An efficient code-based threshold ring signature scheme with a leader-participant model. Sec Commun Netwo:2017

Download references

Funding

This work was supported by the National Natural Science Foundation of China, grant number 41871305, and the National Key R & D Program of China, grant number 2017YFC0602204.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaohui Yuan.

Ethics declarations

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, L., Yuan, X., Liu, Y. et al. Secure map legends based on just noticeable distortion and watermark bit recovery. Multimed Tools Appl 82, 29037–29056 (2023). https://doi.org/10.1007/s11042-023-14452-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14452-8

Keywords

Navigation