Advertisement

Mobile Networks and Applications

, Volume 23, Issue 4, pp 734–742 | Cite as

A Novel Hybrid Information Security Scheme for 2D Vector Map

  • Qingan Da
  • Jianguo Sun
  • Liguo Zhang
  • Liang Kou
  • Wenshan Wang
  • Qilong Han
  • Ruolin Zhou
Article

Abstract

Information hiding is an essential research topic in the theory of hybrid information security. 2D vector map contains a wealth of hybrid information, which requires verification of authenticity and integrity. This paper proposes a novel hybrid information security scheme for 2D vector map. The features in vector map are first divided into disjoint groups to ensure the accuracy of tamper localization. In order to locate the batch features deletion attack, we design a feature group correlation technique based on vertex insertion. And a fragile watermark is generated by combining with polar coordinate transformation and hash function, which is robust to resist rotation, uniform scaling and translation (RST) operations. And we embed the watermark with an RST invariant watermarking method. We construct two datasets for experimentation and the results compared with previous methods indicate that the proposed scheme has good invisibility and high tampering localization accuracy on the feature addition and deletion attack.

Keywords

Hybrid information security Fragile watermarking Tamper localization Feature group correlation Batch features deletion 

Notes

Acknowledgments

This work was supported by project of NSFC of China (61472096, 61771154, 61202455, 61501132, 61301095).

References

  1. 1.
    Ding G, Wang J, Wu Q et al (2016) Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Selected Areas Commun 34(1):107–121CrossRefGoogle Scholar
  2. 2.
    Ding G, Wang J, Wu Q et al (2014) Robust spectrum sensing with crowd sensors. IEEE Trans Commun 62(9):3129–3143CrossRefGoogle Scholar
  3. 3.
    Lin Y, Wang C, Ma C, Dou Z, Ma X (2016) A new combination method for multisensor conflict information. J Supercomput 72(7):1–17CrossRefGoogle Scholar
  4. 4.
    Wu Q, Li Y, Lin Y (2017) The application of nonlocal total variation in image denoising for mobile transmission. Multimed Tools Appl 76(16):17179–17191CrossRefGoogle Scholar
  5. 5.
    Lin Y, Wang C, Wang J, Dou Z (2016) A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 16(10):1–22CrossRefGoogle Scholar
  6. 6.
    Van BN, Lee SH, Ryong KK (2017) Selective encryption algorithm using hybrid transform for GIS vector map. J Inf Syst 13(1):68–82Google Scholar
  7. 7.
    Chen C (2016) QR code authentication with embedded message authentication code. Mobile Netw Appl 1–12Google Scholar
  8. 8.
    Ma B, Wang Y, Li C, Zhang Z, Huang D (2012) A robust watermarking scheme based on dual quantization of wavelet significant difference. Adv Multimed Inf Process – PCM 2012Google Scholar
  9. 9.
    Abubahia A, Cocea M (2015) A clustering approach for protecting GIS vector data. Adv Inf Syst Eng 133–147Google Scholar
  10. 10.
    Wu Q, Li Y, Lin Y, Yang X (2014) The nonlocal sparse reconstruction algorithm by similarity measurement with shearlet feature vector. Math Probl Eng 2014(1):1–8MathSciNetGoogle Scholar
  11. 11.
    Wang N, Zhao X, Xie C (2016) RST invariant reversible watermarking for 2d vector map. Int J Multimed Ubiquit Eng 11(2):265–276CrossRefGoogle Scholar
  12. 12.
    Wang N, Men C (2012) Reversible fragile watermarking for 2-d vector map authentication with localization. Comput Aided Des 44(4):320–330CrossRefGoogle Scholar
  13. 13.
    Boluk PS, Baydere S, Harmanci AE (2011) Robust image transmission over wireless sensor networks. Mobile Netw Appl 16(2):149–170CrossRefGoogle Scholar
  14. 14.
    Wei HL, Chou CM, Wang SW (2016) An NFC anti-counterfeiting framework for id verification and image protection. Mobile Netw Appl 21(4):646–655CrossRefGoogle Scholar
  15. 15.
    Weng L, Darazi R, Preneel B, Macq B (2012) Dooms robust image content authentication using perceptual hashing and watermarking. In: Pacific-rim conference on advances in multimedia information processing. Springer-Verlag, pp 315–326Google Scholar
  16. 16.
    Haojun FU, Zhu C, Jian M (2011) Multipurpose watermarking algorithm for digital raster map based on wavelet transformation. Acta Geodaetica Et Cartographica Sinica 40(3):397–400Google Scholar
  17. 17.
    Altun O, Sharma G, Celik M, Bocko M (2006) A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans Inf Forens Secur 1(4):479–492CrossRefGoogle Scholar
  18. 18.
    Liu S, Pan Z, Fu W et al (2017) Fractal generation method based on asymptote family of generalized Mandelbrot set and its application. J Nonlinear Sci Appl 10(3):1148–1161MathSciNetCrossRefGoogle Scholar
  19. 19.
    Liu S, Zhang Z, Qi L et al (2016) A fractal image encoding method based on statistical loss used in agricultural image compression. Multimed Tools Appl 75(23):15525–15536CrossRefGoogle Scholar
  20. 20.
    Li C, Ma B, Wang Y, Huang D, Zhang Z (2012) A secure semi-fragile self-recoverable watermarking algorithm using group-based wavelet quantization. Pacific-Rim Conf Multimed 327–336Google Scholar
  21. 21.
    Fujiyoshi M, Kiya H (2015) Histogram-based near-lossless data hiding and its application to image compression. Adv Multimed Inf Process – PCM 2015Google Scholar
  22. 22.
    Shi H, Li MC, Guo C, Tan R (2016) A region-adaptive semi-fragile dual watermarking scheme. Multimed Tools Appl 75(1):465–495CrossRefGoogle Scholar
  23. 23.
    Peng Y, Lan H, Yue M, Xue Y (2017) Multipurpose watermarking for vector map protection and authentication. Multimed Tools Appl 2017(1):1–21Google Scholar
  24. 24.
    Nidya S (2013) Reversible fragile watermarking based on difference expansion using manhattan distances for 2D vector map. In: 4TH International conference on electrical engineering and informatics, pp 614–620Google Scholar
  25. 25.
    Neyman SN, Wijaya YH, Sitohang B (2015) A new scheme to hide the data integrity marker on vector maps using a feature-based fragile watermarking algorithm. Int Conf Data Softw Eng 1–6Google Scholar
  26. 26.
    Ren N, Wang QS, Zhu CQ (2014) Selective authentication algorithm based on semi-fragile watermarking for vector geographical data. In: International conference on geoinformatics, pp 1–6Google Scholar
  27. 27.
    Chou CM, Tseng DC (2009) Affine-transformation-invariant public fragile watermarking for 3d model authentication. IEEE Comput Graph Appl 29(2):72–79CrossRefGoogle Scholar
  28. 28.
    Wang N, Bian J, Zhang H (2015) RST invariant fragile watermarking for 2d vector map authentication. Int J Multimed Ubiquit Eng 10(4):155–172CrossRefGoogle Scholar
  29. 29.
    Wang N, Zhao X, Zhang H (2015) Block-based reversible fragile watermarking for 2D vector map authentication. Int J Digit Crime Forens (IJDCF) 7(3):60–80CrossRefGoogle Scholar
  30. 30.
    Zhao Y, Hong Z, Luo Y et al (2017) Prediction-based spectrum management in cognitive radio networks. IEEE Syst J PP(99):1–12CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of Computer Science and TechnologyHarbin Engineering UniversityHarbinChina
  2. 2.Department of Electrical and Computer EngineeringWestern New England UniversitySpringfieldUSA

Personalised recommendations