Abstract
As the most important geographical data, 2D vector maps have been widely used in various areas. Meanwhile, the increasingly simplified data access and manipulation methods in geographical data related applications make it important to verify data truthfulness. In this paper, we propose a fragile watermarking scheme for the content authentication of 2D vector maps. The scheme embeds (detects) two kinds of watermarks, i.e., group watermark and object watermark, into (from) each object. Based on the patterns extracted from the detection results, the scheme can not only detect and locate data modifications, but also characterize modification types. Both theoretical analysis and experimental evaluation are carried out to verify the fragility of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lin, C.E., Kao, C.M., Lai, Y.C., Shan, W.L., Wu, C.Y.: Application of Integrated GIS and Multimedia Modeling on NPS Pollution Evaluation. Environmental Monitoring and Assessment 158(11), 319–331 (2009)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)
Guo, J.M., Liu, Y.F.: Continuous-tone Watermark Hiding in Halftone Images. In: Proceedings of the 16th International Asia-Pacific Web Conference on Web Technologies and Applications, pp. 411–414 (2010)
Wu, C.-C., Chang, C.-C., Yang, S.-R.: An Efficient Fragile Watermarking for Web Pages Tamper-Proof. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM 2007. LNCS, vol. 4537, pp. 654–663. Springer, Heidelberg (2007)
Kee, E., Johnson, M.K., Farid, H.: Digital Image Authentication from JPEG Headers. IEEE Transactions on Information Forensics and Security 6(3), 1066–1075 (2011)
Li, W., Zhu, B., Wang, Z.: On the music content authentication. In: Proc. of ACM International Conference on Multimedia, pp. 1101–1104 (2012)
Upadhyay, S., Singh, S.K.: Video Authentication: Issues and Challenges. International Journal of Computer Science 9(1-3), 409–418 (2012)
Guo, H., Li, Y., Liu, A., Jajodia, S.: A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations. Information Sciences 176, 1350–1378 (2006)
Niu, X.M., Shao, C.Y., Wang, X.T.: A Survey of Digital Vector Map Watermarking. International Journal of Innovative Computing, Information and Control 2(6), 1301–1316 (2006)
Guting, R.H.: An Introduction to Spatial Database Systems. The VLDBJ 3(4), 357–399 (1994)
Zheng, L., You, F.: A Fragile Digital Watermark Used to Verify the Integrity of Vector Map. In: Proc. of IEEE International Conference on E-Business and Information System Security, pp. 1–4 (2009)
Wang, N., Men, C.: Reversible Fragile Watermarking for Locating Tampered Blocks in 2D Vector Maps. In: Multimedia Tools and Applications, pp. 1–31 (2013)
Zhang, H., Gao, M.: A Semi-fragile Digital Watermarking Algorithm for 2D Vector Graphics Tamper Localization. In: Proc. of IEEE International Conference on Multimedia Information Networking and Security, vol. 1, pp. 549–552 (2009)
Zheng, L., Li, Y., Feng, L., Liu, H.: Research and Implementation of Fragile Watermark for Vector Graphics. In: Proc. of IEEE International Conference on Computer Engineering and Technology, vol. 1, pp. V1-522–V1-525 (2010)
Wang, N., Men, C.: Reversible Fragile Watermarking for 2-D Vector Map Authentication with Localization. Computer-Aided Design 44(4), 320–330 (2012)
Schneier, B.: Applied Cryptography. John Wiley and Sons (1996)
Cohen, S.D., Guibas, L.J.: Partial Matching of Planar Polylines under Similarity Transformations. In: Proc. of the ACM-SIAM Symposium on Discrete Algorithms, pp. 777–786 (1997)
IEEE Standard for Binary Floating-point Arithmetic. ANSI/IEEE Standard 754-1985
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Yue, M., Peng, Z., Peng, Y. (2014). A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8709. Springer, Cham. https://doi.org/10.1007/978-3-319-11116-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-11116-2_12
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11115-5
Online ISBN: 978-3-319-11116-2
eBook Packages: Computer ScienceComputer Science (R0)