skip to main content
research-article

2D Vector Map Fragile Watermarking with Region Location

Published: 12 September 2018 Publication History

Abstract

Locating the original region of tampered features is a challenging task for existing 2D vector map fragile watermarking methods. This article presents a 2D vector map fragile watermarking framework that locates not only the current but also the original region of tampered feature groups. In particular, we propose dividing the features of the host vector map into groups, and embedding a watermark consisting of location-bits and check-bits into each group at the sender side. At the receiver side, by comparing the extracted and calculated check-bits, one can identify tampered groups and locate their current regions. Then the location-bits extracted from the mapping groups are used to indicate the original regions of the tampered groups. To demonstrate and analyze the applicability of this framework, we instantiate it by proposing a simulated annealing (SA)-based group division method, a group mapping method, a minimum encasing rectangle (MER) based location-bits generation method and a check-bits generation method, and use an existing reversible data hiding method for watermark embedding. The experimental results show that the proposed framework can locate all the regions influenced by tampering, and the SA-based group division method can get a better region location ability.

References

[1]
Ahmed Abubahia and Mihaela Cocea. 2017. Advancements in GIS map copyright protection schemes—A critical review. Multimedia Tools and Applications 76, 10 (2017), 12205--12231.
[2]
Yuwei Peng, Hai Lan, Mingliang Yue, and Yu Xue. 2018. Multipurpose watermarking for vector map protection and authentication. Multimedia Tools and Applications 77, 6 (2018), 7239--7259.
[3]
Julien Lafaye, Jean Béguec, David Gross-Amblard, and Anne Ruas. 2013. Blind and squaring-resistant watermarking of vectorial building layers. Geoinformatica 16, 2, 245--279.
[4]
Suk-Hwan Lee and Kwon Ki-Ryong. 2013. Vector watermarking scheme for GIS vector map management. Multimedia Tools and Applications 63, 3 (2013), 757--790.
[5]
Victor Rodriguez Doncel, Nikos Nikolaidis, and Ioannis Pitas. 2007. An optimal detector structure for the Fourier descriptors domain watermarking of 2D vector graphics. IEEE Transactions on Visualization and Computer Graphics 13, 5 (2007), 851--863.
[6]
Xia Mu Niu, Cheng Yong Shao, and Xiao Tong Wang. 2006. A survey of digital vector map watermarking. International Journal of Innovative Computing, Information and Control 2, 6 (2006), 1301--1316.
[7]
Chengyong Shao, Xiaotong Wang, and Xiaogang Xu. 2005. Security issues of vector maps and a reversible authentication scheme. Doctoral Forum of China. China Railway Publishing House, 326--331.
[8]
Nana Wang and Chaoguang Men. 2012. Reversible fragile watermarking for 2-D vector map authentication with localization. Computer-Aided Design 44, 4 (2012), 320--330.
[9]
Shelvie Nidya Neyman, Yudhy Haryanto Wijaya, and Benhard Sitohang. 2014. A new scheme to hide the data integrity marker on vector maps using feature-based fragile watermarking algorithm. In Proceedings of 2014 International Conference on Data and Software Engineering. IEEE, 1--6.
[10]
Na Ren, Qi-Sheng Wang, and Chang-Qing Zhu. 2014. Selective authentication algorithm based on semi-fragile watermarking for vector geographical data. In Proceedings of the 2014 22nd International Conference on Geoinformatics (GeoInformatics’14). IEEE, 1--6.
[11]
Mingliang Yue, Zhiyong Peng, and Yuwei Peng. 2014. A fragile watermarking scheme for modification type characterization in 2D vector maps. In Proceedings of the 16th Asia-Pacific Web Conference on Web Technologies and Applications. Springer Verlag, 129--140.
[12]
Nana Wang. 2016. Reversible fragile watermarking for locating tampered polylines/polygons in 2D vector maps. International Journal of Digital Crime and Forensics 8, 1 (2016), 1--25.
[13]
Lianbin Zheng and Fucheng You. 2009. A fragile digital watermark used to verify the integrity of vector map. In International Conference on E-business and Information System Security. EBISS
[14]
Nana Wang and Chaoguang Men. 2013. Reversible fragile watermarking for locating tampered blocks in 2D vector maps. Multimedia Tools and Applications 67, 3 (2013), 709--739.
[15]
Nana Wang, Xiangjun Zhao, and Han Zhang. 2015. Block-based reversible fragile watermarking for 2D vector map authentication. International Journal of Digital Crime and Forensics 7, 3 (2015), 60--80.
[16]
Melanie Swan. 2015. Blockchain: Blueprint for a New Economy. O'Reilly Media, Inc.
[17]
Naskar Ruchira and Rajat Subhra Chakraborty. 2013. A generalized tamper localization approach for reversible watermarking algorithms. ACM Transactions on Multimedia Computing, Communications, and Applications 9, 3 (2013), 19.
[18]
Jessica Fridrich, Miroslav Goljan, and Rui Du. 2001. Invertible authentication. In Proceedings of SPIE. SPIE, 197--208.
[19]
Xiaotong Wang, Chengyong Shao, Xiaogang Xu, and Xiamu Niu. 2007. Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Transactions on Information Forensics and Security 2, 3 (2007), 311--320.
[20]
Nana Wang, Han Zhang, and Chaoguang Men. 2014. A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates. Computer-Aided Design 47 (2014), 108--117.
[21]
Peng-Cheng Wang and Chung-Ming Wang. 2007. Reversible data hiding for point-sampled geometry. Journal of Information Science and Engineering 23, 6 (2007), 1889--1900.
[22]
Han-ling Zhang and Ming-ming Gao. 2009. A semi-fragile digital watermarking algorithm for 2D vector graphics tamper localization. In Proceedings of the International Conference on Multimedia Information Networking and Security. IEEE, 549--552.
[23]
Lianbin Zheng, Yeli Li, Liuping Feng, and Huaqun Liu. 2010. Research and implementation of fragile watermark for vector graphics. In Proceedings of the International Conference on Computer Engineering and Technology. IEEE, V1-522--V1-525.
[24]
Zi-xing Lin, Fei Peng, and Min Long. 2017. A reversible watermarking for authenticating 2D vector graphics based on bionic spider web. Signal Processing: Image Communication 57 (2017), 134--146.
[25]
Fei Peng, Guo Re-Si, Li Chang-Tsun, and Min Long. 2010. A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Computer-Aided Design 42, 12 (2010), 1207--1216.
[26]
Di Xiao, Shulei Hu, and Hongying Zheng. 2015. A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics. Multimedia Tools and Applications 74, 6 (2015), 2109--2126.
[27]
Fei Peng, Qin Long, Zixing Lin, and Min Long. 2017. A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multimedia Tools and Applications (2017), 1--21.
[28]
Nana Wang. 2017. Reversible watermarking for 2D vector maps based on normalized vertices. Multimedia Tools and Applications 76, 20 (2017), 20935--20953.
[29]
S. Kirkpatrick, C. D. Gelatt, and M. P. Vecchi. 1983. Optimization by simulated annealing. Science 220, 4598 (1983), 671--680.
[30]
Marta Lanza, Ángel L. Gutiérrez, Jesús R. Pérez, Javier Morgade, Marta Domingo, Luis Valle, Pablo Angueira, and José Basterrechea. 2014. Coverage optimization and power reduction in SFN using simulated annealing. IEEE Transactions on Broadcasting 60, 3 (2014), 474--485.
[31]
Nicholas Metropolis, Arianna W. Rosenbluth, Marshall N. Rosenbluth, Augusta H. Teller, and Edward Teller. 1953. Equation of state calculations by fast computing machines. The Journal of Chemical Physics 21, 6 (1953), 1087--1092.
[32]
Retrieved April 30, 2018 from http://www.ibge.gov.br/english/geociencias/default_prod.shtm.
[33]
U. Harris. 1999 (updated 2014). Vestfold Hills 1:25000 Topographic GIS Dataset, Australian Antarctic Data Centre - CAASM Metadata. Retrieved April 30, 2018 from https://data.aad.gov.au/metadata/records/vest_hills_gis.
[34]
U. Harris. 1999 (updated 2014). Mount Menzies 1:50000 Topographic GIS Dataset, Australian Antarctic Data Centre - CAASM Metadata. Retrieved April 30, 2018 from https://data.aad.gov.au/metadata/records/Menz50k.
[35]
U. Harris. 1999 (updated 2014). Rauer Group 1:50000 Topographic GIS Dataset, Australian Antarctic Data Centre - CAASM Metadata. Retrieved April 30, 2018 from https://data.aad.gov.au/metadata/records/Raur50k.
[36]
U. Harris. 1999 (updated 2014). SR41-42 Northern Prince Charles Mountains - 1:1 Million Topographic GIS Dataset, Australian Antarctic Data Centre - CAASM Metadata. Retrieved April 30, 2018 from https://data.aad.gov.au/metadata/records/SR41-42.
[37]
Matthew Holliman and Memon Nasir. 2000. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing 9, 3 (2000), 432--441.

Cited By

View all
  • (2024)A dual watermarking algorithm for trajectory data based on robust watermarking and fragile watermarkingComputers & Geosciences10.1016/j.cageo.2024.105655191:COnline publication date: 1-Sep-2024
  • (2024)Trajectory Data Semi-fragile Watermarking Algorithm Considering Spatiotemporal FeaturesSpatial Data and Intelligence10.1007/978-981-97-2966-1_23(319-332)Online publication date: 25-Apr-2024
  • (2021)A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region NestingIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2020.296946431:1(411-424)Online publication date: Jan-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Spatial Algorithms and Systems
ACM Transactions on Spatial Algorithms and Systems  Volume 4, Issue 4
December 2018
73 pages
ISSN:2374-0353
EISSN:2374-0361
DOI:10.1145/3276978
  • Editor:
  • Hanan Samet
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 September 2018
Accepted: 01 June 2018
Revised: 01 June 2018
Received: 01 August 2017
Published in TSAS Volume 4, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. 2D vector map
  2. Fragile watermarking
  3. authentication
  4. region location
  5. tamper detection

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Natural Science Foundation of Higher Education Institutions of Jiangsu Province
  • National Natural Science Foundation of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)2
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A dual watermarking algorithm for trajectory data based on robust watermarking and fragile watermarkingComputers & Geosciences10.1016/j.cageo.2024.105655191:COnline publication date: 1-Sep-2024
  • (2024)Trajectory Data Semi-fragile Watermarking Algorithm Considering Spatiotemporal FeaturesSpatial Data and Intelligence10.1007/978-981-97-2966-1_23(319-332)Online publication date: 25-Apr-2024
  • (2021)A Semi-Fragile Reversible Watermarking for Authenticating 2D Engineering Graphics Based on Improved Region NestingIEEE Transactions on Circuits and Systems for Video Technology10.1109/TCSVT.2020.296946431:1(411-424)Online publication date: Jan-2021
  • (2019)Watermarking of Computer Generated Imagery : A Review2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT)10.1109/ICECCT.2019.8868953(1-7)Online publication date: Feb-2019

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media