Reference Hub8
Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps

Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps

Nana Wang
Copyright: © 2016 |Volume: 8 |Issue: 1 |Pages: 25
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466690240|DOI: 10.4018/IJDCF.2016010101
Cite Article Cite Article

MLA

Wang, Nana. "Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps." IJDCF vol.8, no.1 2016: pp.1-25. http://doi.org/10.4018/IJDCF.2016010101

APA

Wang, N. (2016). Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps. International Journal of Digital Crime and Forensics (IJDCF), 8(1), 1-25. http://doi.org/10.4018/IJDCF.2016010101

Chicago

Wang, Nana. "Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps," International Journal of Digital Crime and Forensics (IJDCF) 8, no.1: 1-25. http://doi.org/10.4018/IJDCF.2016010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

For 2D vector maps, obtaining high tamper localization accuracy without requiring extra space is a technically challenging problem. Using an adaptive group division approach and an improved reversible data hiding approach, the author proposes a reversible fragile watermarking method for locating tampered Polylines/Polygons in 2D vector maps. In particular, the author adaptively divide the features of the vector map into groups according to a predefined threshold, calculate an authentication watermark for each group, embed the watermark using the improved reversible data hiding approach, and hide the mark of each feature into the feature itself. Since the adaptive group division method and the improved reversible data hiding method are combined in an attempt to make full use of the watermark embedding space, superior tamper localization accuracy and original content recovery can be ensured. Besides, no extra space is required by hiding the mark of each feature. Experimental results have been provided to demonstrate the effectiveness of our method.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.