DEM Integrity authentication method based on prevention of repeating embedding of double watermarks

An authentication method and anti-duplication technology, applied in the field of geographic information security, which can solve the problems of incomplete data and wrong data authentication, and achieve the effect of preventing repeated embedding, accurate integrity authentication results, and avoiding tampering and denial behavior.

Active Publication Date: 2015-08-26
NANJING JIYIN INFORMATION TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to address the problem that only using a fragile watermark may cause the data that has not been embedded with a fragile watermark to be mistakenly authenticated as incomplete data, and that someone with ulterior motives can tamper with the data by first tampering with the data and then embed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DEM Integrity authentication method based on prevention of repeating embedding of double watermarks
  • DEM Integrity authentication method based on prevention of repeating embedding of double watermarks
  • DEM Integrity authentication method based on prevention of repeating embedding of double watermarks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0038] In this embodiment, a piece of 1:10,000 grid DEM experimental data (such as image 3 ), for the whole process of watermark information generation, embedding and detection, an embodiment of the method of the present invention is given, and the present invention is further described in detail.

[0039] 1. Watermark information generation and embedding

[0040] Step 1: extract the terrain feature points to be embedded in the watermarked DEM data, and obtain the feature area and non-feature area of ​​the data;

[0041] Step 2: Detect the correlation coefficient of the robust watermark in the extracted data feature area. If the correlation coefficient is less than 0.5, skip to step 3. Otherwise, skip to step 5, and no longer embed the watermark on the data;

[0042] Step 3: Use the mapping mechanism to generate a robust watermark W_R from ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a DEM integrity authentication method based on prevention of repeating embedding of double watermarks, a robustness watermark pre-detection mechanism is added before watermark embedding, and repeated embedding of the watermarks is effectively prevented without influencing the integrity authentication effect of a fragile watermark. Aiming at the problems that under the condition of only using the fragile watermark, data which are not embedded with the watermark and tampered data after watermark embedding are considered to not pass authentication and are not differentiated, and an axe-grinder tampers the DEM data containing the fragile watermark, and then denies the tampering behavior by re-embedding the same fragile watermark, the invention designs a method with prevention of the repeated embedding of double robustness plus fragile water marks, and can more accurately effectively authenticate the integrity of the DEM data.

Description

technical field [0001] The invention belongs to the technical field of geographic information security, and in particular relates to a DEM integrity authentication method based on anti-repetition embedding double watermarks. Background technique [0002] Under the background of the rapid development of information technology, the economic and social benefits of geographic data have received more and more attention and attention, and the reliability and integrity of data have also become a hot research topic. Fragile watermark is an advanced data integrity authentication technology. Many scholars have conducted in-depth research on its application in geographic data integrity authentication, but they mainly focus on vector and remote sensing image data. For DEM data integrity Fragile watermarking algorithms for sex authentication are rarely published. [0003] In addition, the existing integrity authentication methods based on fragile watermarks are all based on the premise ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06T1/00
Inventor 朱长青许惠崔翰川邹秀珍
Owner NANJING JIYIN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products