An Exact Authentication Algorithm for Vector Geographic Data Based on Fragile Watermarking Technology

被引:0
作者
Ren, Na [1 ,2 ]
Zhu, Chang-Qing [1 ,2 ]
机构
[1] Nanjing Normal Univ, Key Lab Virtual Geog Environm, Minist Educ, Nanjing 210023, Jiangsu, Peoples R China
[2] Jiangsu Ctr Collaborat Innovat Geog Informat Reso, Nanjing 210023, Jiangsu, Peoples R China
来源
2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016) | 2016年
关键词
Exact Authentication; Vector Geographic Data; Fragile Watermarking; Anti-deleting elements; SCHEME;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The fragile watermarking technique has been viewed as an effective method for content authentication, which not only can detect any modifications but also can locate the modified areas. In this work, an exact authentication scheme was developed to accurately detect malicious attacks while ensuring an exact location for the tampered area. Our innovative strategy uses the spatial relationships between elements of data points to establish links between elements and accurately remove vector data. Initially, our approach extracts the numerical coordinate values for the original fragile watermark. Then, the watermark information in accordance with quantitative data points embedded in the adjacent area are sorted. Furthermore, the extracted watermark and the original watermark are compared. During authentication, the extracted watermark and the original fragile watermark are compared depending on whether the authentication data are consistent with the fragile watermark. Thus, the modified positions are detected. Finally, many tamper attacks are applied and analyzed to test the fidelity and fragility of the algorithm by experiments. Our findings verify that the algorithm has an excellent performance for tamper detection, especially for deleting elements.
引用
收藏
页码:249 / 260
页数:12
相关论文
共 18 条
[1]  
Alomari R.S., 2004, International Journal of Computing and Information Sciences, V2, P27
[2]  
[Anonymous], 2005, P DOCT FOR CHIN
[3]   An optimal detector structure for the Fourier descriptors domain watermarking of 2D vector graphics [J].
Doncel, Victor Rodriguez ;
Nikolaidis, Nikos ;
Pitas, Ioannis .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2007, 13 (05) :851-863
[4]  
Kitamura I, 2001, INT GEOSCI REMOTE SE, P1191, DOI 10.1109/IGARSS.2001.976788
[5]   Vector watermarking scheme for GIS vector map management [J].
Lee, Suk-Hwan ;
Kwon, Ki-Ryong .
MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 63 (03) :757-790
[6]  
Liangbin Zheng, 2010, 2010 2nd International Conference on Computer Engineering and Technology (ICCET), P522, DOI 10.1109/ICCET.2010.5485995
[7]   New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization [J].
Maeno, K ;
Sun, QB ;
Chang, SF ;
Suto, M .
IEEE TRANSACTIONS ON MULTIMEDIA, 2006, 8 (01) :32-45
[8]  
MeenakshiDevi P., 2009, Journal of Computer Sciences, V5, P831, DOI 10.3844/jcssp.2009.831.837
[9]  
Neyman Shelvie Nidya, 4 INT C EL ENG INF 2, V11, P614
[10]   A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation [J].
Peng, Fei ;
Guo, Re-Si ;
Li, Chang-Tsun ;
Long, Min .
COMPUTER-AIDED DESIGN, 2010, 42 (12) :1207-1216