Skip to main content

A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps

  • Conference paper
Web Technologies and Applications (APWeb 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8709))

Included in the following conference series:

Abstract

As the most important geographical data, 2D vector maps have been widely used in various areas. Meanwhile, the increasingly simplified data access and manipulation methods in geographical data related applications make it important to verify data truthfulness. In this paper, we propose a fragile watermarking scheme for the content authentication of 2D vector maps. The scheme embeds (detects) two kinds of watermarks, i.e., group watermark and object watermark, into (from) each object. Based on the patterns extracted from the detection results, the scheme can not only detect and locate data modifications, but also characterize modification types. Both theoretical analysis and experimental evaluation are carried out to verify the fragility of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lin, C.E., Kao, C.M., Lai, Y.C., Shan, W.L., Wu, C.Y.: Application of Integrated GIS and Multimedia Modeling on NPS Pollution Evaluation. Environmental Monitoring and Assessment 158(11), 319–331 (2009)

    Article  Google Scholar 

  2. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  3. Guo, J.M., Liu, Y.F.: Continuous-tone Watermark Hiding in Halftone Images. In: Proceedings of the 16th International Asia-Pacific Web Conference on Web Technologies and Applications, pp. 411–414 (2010)

    Google Scholar 

  4. Wu, C.-C., Chang, C.-C., Yang, S.-R.: An Efficient Fragile Watermarking for Web Pages Tamper-Proof. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM 2007. LNCS, vol. 4537, pp. 654–663. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Kee, E., Johnson, M.K., Farid, H.: Digital Image Authentication from JPEG Headers. IEEE Transactions on Information Forensics and Security 6(3), 1066–1075 (2011)

    Article  Google Scholar 

  6. Li, W., Zhu, B., Wang, Z.: On the music content authentication. In: Proc. of ACM International Conference on Multimedia, pp. 1101–1104 (2012)

    Google Scholar 

  7. Upadhyay, S., Singh, S.K.: Video Authentication: Issues and Challenges. International Journal of Computer Science 9(1-3), 409–418 (2012)

    Google Scholar 

  8. Guo, H., Li, Y., Liu, A., Jajodia, S.: A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations. Information Sciences 176, 1350–1378 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  9. Niu, X.M., Shao, C.Y., Wang, X.T.: A Survey of Digital Vector Map Watermarking. International Journal of Innovative Computing, Information and Control 2(6), 1301–1316 (2006)

    Google Scholar 

  10. Guting, R.H.: An Introduction to Spatial Database Systems. The VLDBJ 3(4), 357–399 (1994)

    Article  Google Scholar 

  11. Zheng, L., You, F.: A Fragile Digital Watermark Used to Verify the Integrity of Vector Map. In: Proc. of IEEE International Conference on E-Business and Information System Security, pp. 1–4 (2009)

    Google Scholar 

  12. Wang, N., Men, C.: Reversible Fragile Watermarking for Locating Tampered Blocks in 2D Vector Maps. In: Multimedia Tools and Applications, pp. 1–31 (2013)

    Google Scholar 

  13. Zhang, H., Gao, M.: A Semi-fragile Digital Watermarking Algorithm for 2D Vector Graphics Tamper Localization. In: Proc. of IEEE International Conference on Multimedia Information Networking and Security, vol. 1, pp. 549–552 (2009)

    Google Scholar 

  14. Zheng, L., Li, Y., Feng, L., Liu, H.: Research and Implementation of Fragile Watermark for Vector Graphics. In: Proc. of IEEE International Conference on Computer Engineering and Technology, vol. 1, pp. V1-522–V1-525 (2010)

    Google Scholar 

  15. Wang, N., Men, C.: Reversible Fragile Watermarking for 2-D Vector Map Authentication with Localization. Computer-Aided Design 44(4), 320–330 (2012)

    Article  Google Scholar 

  16. Schneier, B.: Applied Cryptography. John Wiley and Sons (1996)

    Google Scholar 

  17. Cohen, S.D., Guibas, L.J.: Partial Matching of Planar Polylines under Similarity Transformations. In: Proc. of the ACM-SIAM Symposium on Discrete Algorithms, pp. 777–786 (1997)

    Google Scholar 

  18. IEEE Standard for Binary Floating-point Arithmetic. ANSI/IEEE Standard 754-1985

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Yue, M., Peng, Z., Peng, Y. (2014). A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8709. Springer, Cham. https://doi.org/10.1007/978-3-319-11116-2_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11116-2_12

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11115-5

  • Online ISBN: 978-3-319-11116-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics