Unlock instant, AI-driven research and patent intelligence for your innovation.

A Fragile Watermarking Method for Accurately Authenticating Vector Geographic Data

A technology of vector geographic data and fragile watermarks, applied in image data processing, image data processing, instruments, etc.

Active Publication Date: 2016-08-17
NANJING JIYIN INFORMATION TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to propose a fragile watermarking method for precise authentication of vector geographic data, aiming at the problem that only data block authentication can be realized in the accurate authentication of vector geographic data at present, so that the watermark can not only resist data modification, random point addition, random Detection of tampering such as point deletion, data cropping, and data translation, and the ability to locate tampering on data points of vector geographic data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fragile Watermarking Method for Accurately Authenticating Vector Geographic Data
  • A Fragile Watermarking Method for Accurately Authenticating Vector Geographic Data
  • A Fragile Watermarking Method for Accurately Authenticating Vector Geographic Data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Such as Figure 2 to Figure 6 As shown, this embodiment selects a piece of 1:250,000 vector geographic data containing 4688 linear elements as the experimental data, and provides a test effect of the present invention for the detection results after the watermark information is embedded and the data is attacked. and analysis example.

[0044] (1) Noise attack

[0045] The noise attack simulates the random modification operation on the vector geographic data, superimposes the noise uniformly distributed on [-4, 4] to 25% of the coordinate points in the watermark data, and then detects the fragile watermark on it. Experimental results show that the algorithm can effectively detect data modification.

[0046] (2) Increase point attack

[0047] Randomly increase data point attack on the vector geographic data containing watermark, increase the point by 20%, and then perform vulnerable watermark detection on it. The experimental results show that the algorithm can effect...

Embodiment 2

[0053] Such as figure 1 As shown, the purpose of the present invention is to propose a fragile watermarking method for accurate authentication of vector geographic data, so that the watermark can not only resist data modification, random Points, random point deletion, data clipping, data translation and other tampering detection, and can locate the tampering to the data points of the vector geographic data.

[0054] In order to realize the above-mentioned purpose of the invention, the technical scheme that the present invention takes is:

[0055] A method for accurately authenticating fragile watermarks of vector geographic data, characterized in that it comprises the following steps:

[0056] (1) Watermark information generation

[0057] Step 1: Reading and processing of data, reading the vector geographic data to be embedded with watermark information;

[0058] Step 2: For any point in the vector geographic data (x j ,y j ), j=1,2,...,m, m is the number of data points i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a vector geographic data accurate authentication fragile watermarking method. The method uses characteristics of vector geographic data to map and generate fragile watermark information, and based on a quantitative idea, watermark information of data points and adjacent data points are embedded on the data points. Meanwhile, segment-beginning data points of the vector geographic data (application after point data is sorted in a zigzag manner) are subjected to special embedding to ensure authentication of the segment-beginning data points. Through fragile watermark detection, tamper detection such as data modification of the vector geographic data, random increasing points, random decreasing points, data clipping, data translation and the like is achieved, and tampering can be positioned on the data points of the vector geographic data to achieve accurate authentication of the vector geographic data. The algorithm combines accuracy requirements of the vector geographic data when the fragile watermark is generated and quantitatively embedded, so that embedding of the watermark is controlled within a data error range to meet the needs of practical application.

Description

technical field [0001] The invention relates to the technical field of geographic information integrity authentication, in particular to a fragile watermark method for accurate authentication of vector geographic data. Background technique [0002] Vector geographic data is an important part of national basic geographic data. With the increasing application of vector geographic data, especially in the current network and information age, the security of vector geographic data is also facing severe challenges. Digital encryption technology can no longer fully meet the requirements of vector geographic data security protection, and digital watermarking technology is playing an increasingly important role in vector geographic data security protection. [0003] Digital watermarks include robust watermarks and fragile watermarks. Robust watermarks are mainly used for data copyright protection, and fragile digital watermarks are mainly used for data authenticity and integrity iden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
Inventor 朱长青王奇胜吴维
Owner NANJING JIYIN INFORMATION TECH