Method for protecting integrity of digital vector map

An integrity protection and vector map technology, applied in image data processing, image data processing, instruments, etc., can solve the problems of weak anti-attack ability, inability to achieve tamper recovery, inability to resist attacks of deleting and adding line primitives, etc. Accelerate the storage speed, achieve accurate recovery, and improve the speed

Inactive Publication Date: 2012-11-28
HARBIN ENG UNIV
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During authentication, divide the vector map into blocks, extract the embedded watermark and compare it with the watermark generated by the current map block for tampering and location, and accurately locate the tampering position to the data block, but this method cannot resist the attack of deleting and adding line primitives [5]
[0005] The watermarking schemes used for authentication that have emerged in recent years can achieve tampering and location, but this type of strategy is relatively weak in attack resistance and cannot achieve tampering recovery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for protecting integrity of digital vector map
  • Method for protecting integrity of digital vector map
  • Method for protecting integrity of digital vector map

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Below in conjunction with accompanying drawing and example technical solution of the present invention is described further:

[0053] The present invention can be divided into three parts, 1. The generation process of three watermarks; 2. The hiding of the watermark in the driver layer; 3. The integrity authentication process.

[0054] 1. The watermark generation process, the steps are as follows.

[0055] Such as figure 1 The generation process of the shown watermark is divided into three paths, corresponding to the authentication watermark, location watermark and recovery watermark respectively.

[0056] (1) Generate authentication watermark

[0057] Read the vector map as a binary stream. Since we use meaningless bytes in the header file to store the watermark, we offset the pointer by 100 bytes, and then use the binary data stream of the rest of the map file as the input of MD5 for hashing. Processing, generate summary information that can uniquely identify the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of cryptology, information safety, geographic information system and digital image processing, in particular to a method for protecting and authenticating the integrity of a digital vector map which can withstand multiple attacks and improve the data writing speed. The method comprises three parts, namely watermark generating, watermark hiding and integrity authenticating, wherein the watermark generating comprises generating an authenticating watermark, generating a positioning watermark and generating a recovery watermark; the watermark hiding comprises transmitting the watermark information to a drive layer and hiding the watermark information; and the integrity authenticating comprises extracting an authenticating watermark, extracting a positioning watermark, extracting a recovery watermark and finishing falsification recovery. By the method, the storage speed is improved, the storage data volume is reduced, the safety is ensured, and the data writing speed is improved.

Description

technical field [0001] The invention relates to the fields of cryptography, information security, geographic information system and digital image processing, in particular to a method for complete protection and authentication of a digital vector map which can withstand various attacks and improve the speed of writing data. Background technique [0002] With the rapid development of information processing technology and surveying and mapping technology, digital vector maps have been widely used in geographic information systems, digital cities and intelligent transportation systems. Digital vector maps have the advantages of easy editing and dissemination, which greatly facilitates people's daily life. However, illegal tampering and dissemination of vector maps will seriously damage the legitimate interests of map owners. Therefore, it is very important to study the vector map integrity authentication mechanism to curb the illegal tampering and dissemination of the vector m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06T1/00
Inventor 门朝光衣秀田泽宇王娜娜
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products