Skip to main content
Log in

A Novel Hybrid Information Security Scheme for 2D Vector Map

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Information hiding is an essential research topic in the theory of hybrid information security. 2D vector map contains a wealth of hybrid information, which requires verification of authenticity and integrity. This paper proposes a novel hybrid information security scheme for 2D vector map. The features in vector map are first divided into disjoint groups to ensure the accuracy of tamper localization. In order to locate the batch features deletion attack, we design a feature group correlation technique based on vertex insertion. And a fragile watermark is generated by combining with polar coordinate transformation and hash function, which is robust to resist rotation, uniform scaling and translation (RST) operations. And we embed the watermark with an RST invariant watermarking method. We construct two datasets for experimentation and the results compared with previous methods indicate that the proposed scheme has good invisibility and high tampering localization accuracy on the feature addition and deletion attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ding G, Wang J, Wu Q et al (2016) Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Selected Areas Commun 34(1):107–121

    Article  Google Scholar 

  2. Ding G, Wang J, Wu Q et al (2014) Robust spectrum sensing with crowd sensors. IEEE Trans Commun 62(9):3129–3143

    Article  Google Scholar 

  3. Lin Y, Wang C, Ma C, Dou Z, Ma X (2016) A new combination method for multisensor conflict information. J Supercomput 72(7):1–17

    Article  Google Scholar 

  4. Wu Q, Li Y, Lin Y (2017) The application of nonlocal total variation in image denoising for mobile transmission. Multimed Tools Appl 76(16):17179–17191

    Article  Google Scholar 

  5. Lin Y, Wang C, Wang J, Dou Z (2016) A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 16(10):1–22

    Article  Google Scholar 

  6. Van BN, Lee SH, Ryong KK (2017) Selective encryption algorithm using hybrid transform for GIS vector map. J Inf Syst 13(1):68–82

    Google Scholar 

  7. Chen C (2016) QR code authentication with embedded message authentication code. Mobile Netw Appl 1–12

  8. Ma B, Wang Y, Li C, Zhang Z, Huang D (2012) A robust watermarking scheme based on dual quantization of wavelet significant difference. Adv Multimed Inf Process – PCM 2012

  9. Abubahia A, Cocea M (2015) A clustering approach for protecting GIS vector data. Adv Inf Syst Eng 133–147

  10. Wu Q, Li Y, Lin Y, Yang X (2014) The nonlocal sparse reconstruction algorithm by similarity measurement with shearlet feature vector. Math Probl Eng 2014(1):1–8

    MathSciNet  Google Scholar 

  11. Wang N, Zhao X, Xie C (2016) RST invariant reversible watermarking for 2d vector map. Int J Multimed Ubiquit Eng 11(2):265–276

    Article  Google Scholar 

  12. Wang N, Men C (2012) Reversible fragile watermarking for 2-d vector map authentication with localization. Comput Aided Des 44(4):320–330

    Article  Google Scholar 

  13. Boluk PS, Baydere S, Harmanci AE (2011) Robust image transmission over wireless sensor networks. Mobile Netw Appl 16(2):149–170

    Article  Google Scholar 

  14. Wei HL, Chou CM, Wang SW (2016) An NFC anti-counterfeiting framework for id verification and image protection. Mobile Netw Appl 21(4):646–655

    Article  Google Scholar 

  15. Weng L, Darazi R, Preneel B, Macq B (2012) Dooms robust image content authentication using perceptual hashing and watermarking. In: Pacific-rim conference on advances in multimedia information processing. Springer-Verlag, pp 315–326

  16. Haojun FU, Zhu C, Jian M (2011) Multipurpose watermarking algorithm for digital raster map based on wavelet transformation. Acta Geodaetica Et Cartographica Sinica 40(3):397–400

    Google Scholar 

  17. Altun O, Sharma G, Celik M, Bocko M (2006) A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans Inf Forens Secur 1(4):479–492

    Article  Google Scholar 

  18. Liu S, Pan Z, Fu W et al (2017) Fractal generation method based on asymptote family of generalized Mandelbrot set and its application. J Nonlinear Sci Appl 10(3):1148–1161

    Article  MathSciNet  Google Scholar 

  19. Liu S, Zhang Z, Qi L et al (2016) A fractal image encoding method based on statistical loss used in agricultural image compression. Multimed Tools Appl 75(23):15525–15536

    Article  Google Scholar 

  20. Li C, Ma B, Wang Y, Huang D, Zhang Z (2012) A secure semi-fragile self-recoverable watermarking algorithm using group-based wavelet quantization. Pacific-Rim Conf Multimed 327–336

  21. Fujiyoshi M, Kiya H (2015) Histogram-based near-lossless data hiding and its application to image compression. Adv Multimed Inf Process – PCM 2015

  22. Shi H, Li MC, Guo C, Tan R (2016) A region-adaptive semi-fragile dual watermarking scheme. Multimed Tools Appl 75(1):465–495

    Article  Google Scholar 

  23. Peng Y, Lan H, Yue M, Xue Y (2017) Multipurpose watermarking for vector map protection and authentication. Multimed Tools Appl 2017(1):1–21

    Google Scholar 

  24. Nidya S (2013) Reversible fragile watermarking based on difference expansion using manhattan distances for 2D vector map. In: 4TH International conference on electrical engineering and informatics, pp 614–620

  25. Neyman SN, Wijaya YH, Sitohang B (2015) A new scheme to hide the data integrity marker on vector maps using a feature-based fragile watermarking algorithm. Int Conf Data Softw Eng 1–6

  26. Ren N, Wang QS, Zhu CQ (2014) Selective authentication algorithm based on semi-fragile watermarking for vector geographical data. In: International conference on geoinformatics, pp 1–6

  27. Chou CM, Tseng DC (2009) Affine-transformation-invariant public fragile watermarking for 3d model authentication. IEEE Comput Graph Appl 29(2):72–79

    Article  Google Scholar 

  28. Wang N, Bian J, Zhang H (2015) RST invariant fragile watermarking for 2d vector map authentication. Int J Multimed Ubiquit Eng 10(4):155–172

    Article  Google Scholar 

  29. Wang N, Zhao X, Zhang H (2015) Block-based reversible fragile watermarking for 2D vector map authentication. Int J Digit Crime Forens (IJDCF) 7(3):60–80

    Article  Google Scholar 

  30. Zhao Y, Hong Z, Luo Y et al (2017) Prediction-based spectrum management in cognitive radio networks. IEEE Syst J PP(99):1–12

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported by project of NSFC of China (61472096, 61771154, 61202455, 61501132, 61301095).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruolin Zhou.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Da, Q., Sun, J., Zhang, L. et al. A Novel Hybrid Information Security Scheme for 2D Vector Map. Mobile Netw Appl 23, 734–742 (2018). https://doi.org/10.1007/s11036-018-0997-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-0997-z

Keywords

Navigation