Advertisement

Multimedia Tools and Applications

, Volume 57, Issue 1, pp 67–89 | Cite as

Watermarking geographical data on spatial topological relations

  • Chuanjian Wang
  • Zhiyong Peng
  • Yuwei Peng
  • Liang Yu
  • Junzhou Wang
  • Qingzhan Zhao
Article

Abstract

Geographical data is of great value for data producers. How to protect copyright of geographical data effectively using digital watermarking is a hot research issue. In this paper, spatial topological relation existing between polygons is chosen as cover data, and watermark is embedded by slightly modifying the metric measure of spatial topological relation, and some geographical objects are scaled to derive the watermarked data. Global Main Scaling Distance is introduced to measure the distortions caused by watermark embedding. Experimental results show that the proposed algorithm has a good robustness against geometrical attacks, simplification, interpolation and noise addition attacks, and preserves shape of the watermarked geographical objects. Furthermore, a good tradeoff between robustness and fidelity is acquired in the proposed algorithm.

Keywords

Geographical data Watermarking Spatial topological relation Watermark synchronization Shape-preserving 

Notes

Acknowledgements

This research is funded by National Natural Science Foundation of China (Project No. 90718027), and the Key Technologies Science and Technology Program (Project No. 2007BAH12B01, 2007BAH12B07), and the Natural Science Foundation of Hubei Province (Project No. 2008CDA007), and the National High Technology Research and Development Program (Project No. 2006AA12Z210), and Independent Research Foundation of Wuhan University (Project No. 6082011) and Open Research Foundation of State Key Laboratory of Aerospace Information Security and Trusted Computing.

References

  1. 1.
    Agrawal R, Kiernan J (2002) Watermarking relational databases. In: Proceeding of the 28th VLDB conference, Hong Kong, China, pp 155–166Google Scholar
  2. 2.
    Allison DCS, Noga MT (1981) On the computation of minimnum encasing rectangles and set diameter. Technical report CS81017-R, Computer Science, Virginia TechGoogle Scholar
  3. 3.
    Bazin C, Le Bars JM, Madelaine J (2007) A blind, fast and robust method for geographical data watermarking. In: ACM symposium on information, computer and communications security (ASIACCS’07), pp 265–272Google Scholar
  4. 4.
    Collberg CS, Thomborson C (2002) Watermarking, tamper-proofing, and obfuscation—tools for software protection. IEEE Trans Softw Eng 28:735–746CrossRefGoogle Scholar
  5. 5.
    Cox J, Miller M, Bloom J (2001) Digital watermarking: principles and practice. Morgan Kaufmann, San Mateo, CAGoogle Scholar
  6. 6.
    Deng M, Li CM, Liu WB (2002) Describing spatial relations between area objects via combining topological with metrication. Acta Geodaetica et Cartographica Sinica 31(2):164–169 (in Chinese)Google Scholar
  7. 7.
    Doncel VR, Nikolaidis N, Pitas I (2007) An optimal detector structure for the Fourier descriptors domain watermarking of 2D vector graphics. IEEE Trans Vis Comput Graph 13(5):851–863CrossRefGoogle Scholar
  8. 8.
    Egenhofer MJ, Herring J (1994) Categorizing binary topological relations between regions, lines and points in geographic databases. Technical report, Department of Surveying Engineering, University of MaineGoogle Scholar
  9. 9.
    Gou HM and Wu M (2005) Data hiding in curves with application to fingerprinting maps. IEEE Trans Signal Process 53(10):3988–4005MathSciNetCrossRefGoogle Scholar
  10. 10.
    Huang M, Zhou X, Cao JH et al (2007) Geo-WDBMS: an improved DBMS with the function of watermarking geographical data. In: DASFAA 2007. LNCS, vol 4443, pp 1098–1109Google Scholar
  11. 11.
    Kang H, Kim K, Choi J (2001) A vector watermarking using the generalized square mask. In: Proc. international symposium on information technology: coding and computing 2001, pp 234–236Google Scholar
  12. 12.
    Lafaye J, Béguec J, Gross-Amblard D, Ruas A (2007) Invisible graffiti on your buildings: blind and squaring-proof watermarking of geographical databases. In: 10th international symposium on spatial and temporal databases. Lecture notes in computer science, advances in spatial and temporal databases. LNCS 4605, pp 312–329Google Scholar
  13. 13.
    Li XJ, Cai JF (2007) Robust transmission of JPEG2000 encoded images over packet loss channel. ICME 2007, pp 947–950Google Scholar
  14. 14.
    Li YY, Xu LP (2003) A blind watermarking of vector graphics images. In: Proceedings of fifth international conference on computational intelligence and multimedia applications (ICCIMA 2003), pp 424–429Google Scholar
  15. 15.
    Ng W, Lau HL (2005) Effective approaches for watermarking XML data. In: Proceeding of DASFAA 2005. LNCS, vol 3453, pp 68–80Google Scholar
  16. 16.
    Niu XM, Shao CY, Wang XT (2007) GIS watermarking: hiding data in 2D vector maps. Studies in Computational Intelligence (SCI) 58:123–155CrossRefGoogle Scholar
  17. 17.
    Ohbuchi R, Ueda H, Endoh S (2002) Robust watermark of vector digital maps. ICME2002Google Scholar
  18. 18.
    Sakamoto M, Matsuura Y, Takashima Y (2000) A scheme of digital watermarking for geographical map data. In: Symposium on cryptography and information securityGoogle Scholar
  19. 19.
    Schneier B (1996) Applied cryptography. Wiley, New YorkGoogle Scholar
  20. 20.
    Schulz G, Voigt M (2004) A high capacity watermarking system for digital maps. In: Proceedings of the 2004 multimedia and security workshop on multimedia and security, pp 180–186Google Scholar
  21. 21.
    Shariff ARBM, Egenhofer MJ, Mark DM (1998) Natural-language spatial relations between linear and areal objects: the topology and metric of English-language terms. Int J Geogr Inf Sci 12(3): 215–245Google Scholar
  22. 22.
    Shehab M, Beritno E, Ghafoor A (2008) Watermarking relational databases using optimization-based techniques. IEEE Trans Knowl Data Eng 20(1):2008CrossRefGoogle Scholar
  23. 23.
    Sion R (2004) Proving ownership over categorical data. In: Proceedings of the IEEE international conference on data engineering, vol 20, pp 584–595Google Scholar
  24. 24.
    Sion R, Atallah M, Prabhakar S (2004) Rights protection for relational data. IEEE Trans Knowl Data Eng 16(6):2004Google Scholar
  25. 25.
    Solachidis V, Nikolaidis N, Pitas I (2000) Watermarking polygonal lines using Fourier descriptors. In: Proc. IEEE international conference on acoustics, speech and signal processing (ICASSP’2000), pp 1955–1958Google Scholar
  26. 26.
    Topkara M, Taskiran CM, Delp EJ (2005) Natural language watermarking. In: Conference on security, steganography and watermarking of multimedia contents VII, pp 441–452Google Scholar
  27. 27.
    Waston AB (1993) DCT quantization matrices optimized for individual images. In: Proceeding of SPIE 1913–14, pp 202–216Google Scholar
  28. 28.
    Yu-Chi Pu, I-Chang Jou(2009) Blind and robust watermarking for street-network vector maps. Inf Technol J 8(7):982–989CrossRefGoogle Scholar
  29. 29.
    Zhao CY (2006) Studying on the technologies of storage and processing of spatial vector data in high-performance parallel GIS. Dissertation, Wuhan University (in Chinese)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Chuanjian Wang
    • 1
    • 2
  • Zhiyong Peng
    • 1
  • Yuwei Peng
    • 1
  • Liang Yu
    • 1
  • Junzhou Wang
    • 1
  • Qingzhan Zhao
    • 2
  1. 1.Computer SchoolWuhan UniversityWuhanChina
  2. 2.College of Information Science and TechnologyShihezi UniversityShiheziChina

Personalised recommendations