Skip to main content

Information Hiding for Spatial and Geographical Data

  • Chapter

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. von Ahn L, Hopper NJ (2004) Public-Key Steganography. In: Advances in Cryptology(Eurocrypt 2004), LNCS vol. 3027, Springer Berlin Heidelberg, 323–341

    Google Scholar 

  2. Backes M, Cachin C (2005) Public-Key Steganography with Active Attacks. In: Proc. Theory of Cryptography Conference (TCC’05), Cambridge, MA, USA, LNCS vol. 3378, Springer-Verlag, Berlin, Germany, 210–226

    Google Scholar 

  3. Bergman C, Davidson J (2005) Unitary Embedding for Data Hidig with the SVD. In: Proc. SPIE: Security, Steganography and Watermarking of MultimediaContents VII, San Jose, CA, USA, 619–630

    Google Scholar 

  4. Cachin M (2004) An Information-Theoretic Model for Steganography. Information and Computation, 192(1):41–56

    Article  MATH  Google Scholar 

  5. Calagna M, Guo H, Mancini LV, Jajodia S (2006) A Robust Watermarking Scheme based on SVD Compression. In:Proc. ACM SIGAPP Symposium on Applied Computing(SAC’06), Dijon, France, 1341–1347

    Google Scholar 

  6. Checcacci N, Barni M, Bartolini F, Basagni S (2000) Robust Video Watermarking for Wireless Multimedia Communications. In: Proc. IEEE Wireless Communications and NetworkingConference (WCNC’00), Chicago, IL, USA, 1530–1535

    Google Scholar 

  7. Cox IJ, Kilian J, Leightont T, Shamoon T (1997) Secure Spread Spectrum Watermarking for Images, Audio and Video. IEEE Transactions on Image Processing, 6(2):1673–1687

    Article  Google Scholar 

  8. Delgado J, Prados J, Rodrriguez E (2005) A New Approach for Interoperability between ODRL and MPEG-21 REL. In: Proc. 2nd International Workshop on the Open Digital RightsLanguage (ODRL’05), Lisbon, Portugal, 9–20

    Google Scholar 

  9. Döllner J (2005) Geospatial Digital Rights Management in Geovisualization. The Cartographic Journal, 42(1):27–34

    Article  Google Scholar 

  10. Ganic E, Eskicioglu A M (2004) Robust DWT-SVD Domain Image Watermarking: Embedding Data in allFrequencies. In: Proc. ACM Multimedia and Securityworkshop (MM-SEC’04), Magdeburg, Germany,166–174

    Google Scholar 

  11. Goldstein JS, Reed IS (1997) Reduced-Rank Adaptive Filtering. IEEE Transactions on Signal Processing, 45(2):492–496

    Article  Google Scholar 

  12. Golub GH, Van Loan CF (1996) Matrix Computations, Johns Hopkins University Press, Baltimore

    MATH  Google Scholar 

  13. Heileman G L, Yang Y (2003) The Effects of Invisible Watermarking on Satellite Image Classification. In: Proc. 3rd ACM workshop on Digital Rights Management (DRM’03), Washington, DC, USA, 120–132

    Google Scholar 

  14. Hopper NJ, Langford J, von Ahn L (2002) Provably Secure Steganography. In: Advances in Cryptology (CRYPTO 2002), 77–92

    Google Scholar 

  15. Jain AK (1989) Fundamentals of Digital Image Processing. Prentice Hall

    Google Scholar 

  16. Johnson NF, Duric Z, Jajodia S (2001) Information Hiding Steganography and Watermarking - Attacks and Countermeasures. Kluwer Academic Publishers, Boston/Dordrecht/London

    Google Scholar 

  17. Kwok SH, Yang CC, Tam KY (2000) Watermark Design Pattern for Intellectual Property Protection in Electronic Commerce Applications. In: Proc. 33rd Hawaii International Conference on System Sciences (HICSS’00), 6037

    Google Scholar 

  18. Masry M A (2005) A Watermarking Algorithm for Map and Chart Images. In: Proc.SPIE: Security, Steganography and Watermarking of Multimedia Contents VII, San Jose, CA, USA, 495–503

    Google Scholar 

  19. Memon N, Wong PW (1998) Protecting Digital Media Content. Communications of ACM, 41(7):35–43

    Article  Google Scholar 

  20. Peng ZR, Tsou MH (2003) Internet GIS - Distributed Geographical Information Services for the Internet and Wireless Networks. John Wiley and Sons, Hoboken, NJ

    Google Scholar 

  21. Sion R (2004) Proving Ownership over Categorical Data. In: Proc.20th International Conference on Data Engineering (ICDE’04), Boston, MA, 584–596

    Google Scholar 

  22. The Geo DRM working group, http://www.opengeospatial.org/groups/?iid=129

    Google Scholar 

  23. The MPEG-21 REL (ISO/IEC 21000-5:2004), http://rightsexpress.contentguard.com

    Google Scholar 

  24. The ODRL Initiative, http://odrl.net

    Google Scholar 

  25. Tian B, Shaikh MA, Azimi-Sadjadi MR, Vonder Haar TH, Reinke DL (1999), A Study of Cloud Classification with Neural Networks using Spectral and Textural Features. IEEE Transactions on Neural Networks, 10(1):138–151

    Article  Google Scholar 

  26. Tseng YC, Pan HK (2002), Data Hiding in 2-Color Images. IEEE Transactions on Computers, 51(7):873–880

    Article  Google Scholar 

  27. Web-based Management and Representation of Spatial and Geographic Data, http://homes.dico.unimi.it/dbandsec/spadaweb

    Google Scholar 

  28. Zhang XP, Li K (2005) Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”. IEEE Transactions on Multimedia: Correspondence, 7(3):593–594

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Calagna, M., Mancini, L.V. (2007). Information Hiding for Spatial and Geographical Data. In: Belussi, A., Catania, B., Clementini, E., Ferrari, E. (eds) Spatial Data on the Web. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69878-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69878-4_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69877-7

  • Online ISBN: 978-3-540-69878-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics