Advertisement

Multimedia Tools and Applications

, Volume 73, Issue 3, pp 1913–1942 | Cite as

Polyline curvatures based robust vector data hashing

  • Suk-Hwan LeeEmail author
  • Won-Joo Hwang
  • Ki-Ryong KwonEmail author
Article

Abstract

The growth in applications for vector data such as CAD design drawings and GIS digital maps has increased the requirements for authentication, copy detection, and retrieval of vector data. Vector data hashing is one of the main techniques for meeting these requirements. Its design must be robust, secure, and unique, which is similar to image or video hashing. This paper presents a vector data hashing method based on the polyline curvature for design drawings and digital maps. Our hashing method extracts the feature values by projecting the polyline curvatures, which are obtained from groups of vector data using GMM clustering, onto random values, before generating the final binary hash by binarization. A robustness evaluation showed that our hashing method had a very low false detection probability during geometrical modifications, rearrangements, and similar transformations of objects and layers. A security evaluation based on differential entropy showed that the level of uncertainty was very high with our hashing method. Furthermore, a uniqueness evaluation showed that the Hamming distances between hashes were very low.

Keywords

Vector data model Content hashing Authentication Copy detection Design drawing  Digital map 

Notes

Acknowledgements

This work was supported by the Korea Research Foundation Grant funded by the Korean Government (MEST) (KRF-2009- 0071269 and KRF-2011-0023118).

References

  1. 1.
    Aybet J, Al-Saedy H, Farmer M (2008) Watermarking spatial data in geographic information systems. Commun Comput Inf Sci 45:18–26CrossRefGoogle Scholar
  2. 2.
    AutoCAD (2011) http://www.autodesk.com. Accessed 26 Dec 2011
  3. 3.
    Bilmes JA (1998) A gentle tutorial on the em algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models. Tech. Rep. TR-97-021, International Computer Science InstituteGoogle Scholar
  4. 4.
    Chang K (2007) Introduction to geographic information system, 4th edn. McGraw-Hill, New YorkGoogle Scholar
  5. 5.
    Chen Y, Gupta MR (2010) EM demystified: an expectation-maximization tutorial. UWEE Technical Report, Number UWEETR-2010-0002Google Scholar
  6. 6.
    Coskun B, Sankur B, Memon N (2006) Spatio-temporal transform based video hashing. IEEE Trans Multimedia 8(6):1190–1208CrossRefGoogle Scholar
  7. 7.
    De Roover C, De Vleeschouwer C, Lefebvre F, Macq B (2005) Robust video hashing based on radial projections of key frames. IEEE Trans Signal Process 53(10, Part 2):4020–4037CrossRefMathSciNetGoogle Scholar
  8. 8.
    Differential Geometry of Curves (2011) http://en.wikipedia.org. Accessed 26 Dec 2011
  9. 9.
    Farin G, Hoschek J, Kim M-S (2002) Handbook of computer aided geometric design. Elsevier ScienceGoogle Scholar
  10. 10.
    Kreyszig E (1991) Differential geometry. Dover, New YorkGoogle Scholar
  11. 11.
    Lee SH, Kwon KR (2010) CAD drawing watermarking scheme. Digit Signal Process 20(5):1379–1399CrossRefGoogle Scholar
  12. 12.
    Lee S-H, Kwon K-R (2011) Vector watermarking scheme for GIS vector map management. Multimed Tools Appl. 63(3):757–790CrossRefGoogle Scholar
  13. 13.
    Lee S-H, Kwon K-R (2012) Robust 3D mesh model hashing based on feature object. Digit Signal Process 22:744–759CrossRefMathSciNetGoogle Scholar
  14. 14.
    Lee S-H, Lee E-J, Kwon K-R (2010) Robust 3D mesh hashing based on shape features. In: IEEE international conference on multimedia and expo, pp 1040–1043Google Scholar
  15. 15.
    Mao Y, Wu M (2007) Unicity distance of robust image hashing. IEEE Trans Inf Forensics Secur 2:462–467CrossRefGoogle Scholar
  16. 16.
    Monga V, Mhcak MK (2007) Robust and secure image hashing via non-negative matrix factorizations. IEEE Trans Inf Forensics Secur 2(3, Part 1):376–390CrossRefGoogle Scholar
  17. 17.
    Monga V, Banerjee A, Evans BL (2006) A clustering based approach to perceptual image hashing. IEEE Trans Inf Forensics Secur 1:68–79CrossRefGoogle Scholar
  18. 18.
    National Geographic Information Institute (2011) http://www.ngi.go.kr. Accessed 26 Dec 2011
  19. 19.
    Niu X-M, Shao C-Y, Wang X-T (2007) GIS watermarking: hiding data in 2D vector maps. Stud Comput Intell 58:123–155CrossRefGoogle Scholar
  20. 20.
    Ohbuchi R, Ueda H, Endoh S (2002) Robust watermarking of vector digital maps. In: Proc. of IEEE international conference on multimedia and expo (ICME), vol 1, pp 577–580Google Scholar
  21. 21.
    Penga F, Guoa R-S, Lib C-T, Longc M (2010) A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput Aided Des 42(12):1207–1216CrossRefGoogle Scholar
  22. 22.
    Shao CY, Wang HL, Niu XM, Wang XT (2006) A shape-preserving method for watermarking 2D vector maps based on statistic detection. IEICE Trans Inf Syst E89-D(3):1290–1293CrossRefGoogle Scholar
  23. 23.
    Swaminathan A, Mao Y, Wu M (2006) Robust and secure image hashing. IEEE Trans Inf Forensics Secur 1(2):215–230CrossRefGoogle Scholar
  24. 24.
    Tarmissia K, Hamza AB (2009) Information-theoretic hashing of 3D objects using spectral graph theory. Expert Syst Appl 36(5):9409–9414CrossRefGoogle Scholar
  25. 25.
    Vogit M, Busch C (2002) Watermarking 2D-vector data for geographical information systems. In: Proc. of the SPIE, security and watermarking of multimedia content, San Jose, USA, vol 4675, pp 621–628Google Scholar
  26. 26.
    Wang C, Peng Z, Peng Y, Yu L, Wang J, Zhao Q (2010) Watermarking geographical data on spatial topological relations. Multimed Tools Appl 57(1):67–89CrossRefGoogle Scholar
  27. 27.
    Wu B, Wang W, Peng Z, Du D, Wang C (2010) Design and implementation of spatial data watermarking service system. Geo-spatial Inf Sci 13(1):40–48CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Department of Information SecurityTongmyong UniversityBusanKorea
  2. 2.Department of Information Communication EngineeringInje UniversityKyungNamKorea
  3. 3.Department of IT Convergence and Application EngineeringPukyong National UniversityBusanKorea

Personalised recommendations