skip to main content
10.1145/1655925.1656093acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

Development of digital watermarking technology to protect cadastral map information

Published:24 November 2009Publication History

ABSTRACT

This research aimed to prevent, by means of digital watermarking technology, illegal distribution and reproduction of digital cadastral map information. To this end, a digital watermarking technique was developed in consideration of the properties of cadastral maps and based on watermarking methods, after which its performance was evaluated. A watermark key and a one-way function was used to compensate for the algorithm and, therefore, watermarking security, based on the existing research results. In these ways, the present research meets the requirements for fidelity, robustness, false positive rate and the maintenance of consistent topology. The advanced techniques suggested in this paper were devised so as to be suitable for vector data such as GIS and navigation data as well as cadastral maps. Moreover, if the existing methodology is further improved, it could be expected to be used even more widely.

References

  1. Y. H. Ko, "Object-Oriented Watermarking Method based on PSADT and Two-Layer Watermarking Method", Doctoral dissertation, Korea Advanced Institute of Science and Technology, 2002.Google ScholarGoogle Scholar
  2. H. S. Kim, Digital Watermarking, Green Publishing, Korea, 2005.Google ScholarGoogle Scholar
  3. J. Zhao, E. Koch, "A Generic Digital Watermarking Model", Computer&GRaphics, vol.22, no. 4, pp.397--403, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  4. H. C. Wu, C. C. Chang, "A Novel Digital Image Watermarking Scheme based on the Vector Quantization Technique", Computers&Security, vol.24, no.6, pp.460--471, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. V. Nguyen, J. C. Patra, "A Simple ICA-based Digital Image Watermarking Scheme", Digital Signal Processing, vol.18, no.5, pp.762--776, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Jin, "Affine Invariant Watermarking Algorithm using Feature Matching", Digital Signal Processing, vol.16, no.3, pp.247--254, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. A. Mohammad, A. A, Sameer, "An Improved SVD-based Watermarking Scheme for Protecting Rightful Ownership", Signal Processing, vol.88, no.9, pp.2158--2180, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Voyatzis, I. Pitas, "Digital Image Wwatermarking using Mixing Systems", Computers&Graphics, vol.22, no.4, pp.405--416, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  9. K. S. Jonathan, H. Frank and G. Bernd, "Digital Wwatermarking of Text, Image, and Video Documents", Computers&Graphics, vol.22, no.6, pp.687--695, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  10. M. C. Hu, D. C. Lou, M. C. Chang, "Dual-wrapped Digital Watermarking Scheme for Image Copyright Protection", Computers&Security, vol.26, no.4, pp.319--330, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. H. Joo, Y. H. Suh, J. H. Shin, and Hisakazu Kikuchi, "A New Robust Watermark Embedding into Wavelet DC Components", ETRI Journal, vol.24, no.5, pp.401--404, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. Y. Kim, S. H. Park, "Vector Map Data Watermarking Method using Binary Notation", The Journal of Geographic Information System Association of Korea, vol.14, no.4, pp.385--395, 2008.Google ScholarGoogle Scholar
  13. V. Solachidis, N. Nikolaidis, and I. Pitas, "Fourier descriptors watermarking of vector graphics images", Proceedings of the International Conference on Image Processing, vol. 3, pp.9--12, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  14. I. Kitamura, S. Kanai, and T. Kishinami, "Copyright Protection of Vector map using Digital Watermarking Method based on Discrete Fourier Transform", Proceedings of the IEEE 2001 International Symposium on Geoscience and Remote Sensing Symposium, vol.3, pp.1191--1193, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  15. Y. Y. Li, and L. P. Xu, "A Blind Watermarking of Vector Graphics Images", Proceedings of the Fifth International Conference on Computational Intelligence and Multimedia Applications, pp. 424--429, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Voigt, B. Yang, and C. Busch, "Reversible Watermarking of 2D-Vector Data", Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and security, pp.160--165, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Ohbuchi, H. Ueda, and S. Endoh, "Robust Watermarking of Vector Digital Maps", Proceedings of IEEE International Conference on Multimedia and Expo, vol. 1, pp.577--580, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  18. H. I. Kang, K. I. Kim, and J. U. Choi, "A vector watermarking using the generalized square mask", Proceedings of International Conference on Information Technology: Coding and Computing, pp.234--236, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Voigt, and C. Busch, "Feature-based Watermarking of 2D Vector Data", Proceedings of the SPIE-Security and Watermarking of Multimedia Content, vol. 5020, pp.359--366, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  20. C. Y. Shao, H. L. Wang, X. M. Niu, and X. T. Wang, "A Shape-preserving Method for Watermarking 2D Vector Maps based on Statistic Detection", Proceedings of IEICE-Transactions on Information and Systems, vol. E89-D, no. 3, pp.1290--1293, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. H. H. Song, "Robust Image Watermarking Algorithm using DWT and Fuzzy Inference", Doctoral dissertation, Mokwon Unviersity, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Development of digital watermarking technology to protect cadastral map information

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
                November 2009
                1479 pages
                ISBN:9781605587103
                DOI:10.1145/1655925

                Copyright © 2009 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 24 November 2009

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader