Copyright Protection and Content Authentication Based on Linear Cellular Automata Watermarking for 2D Vector Maps

被引:0
作者
AL-ardhi, Saleh [1 ]
Thayananthan, Vijey [1 ]
Basuhail, Abdullah [1 ]
机构
[1] King Abdulaziz Univ, Jeddah, Saudi Arabia
来源
ADVANCES IN COMPUTER VISION, CVC, VOL 1 | 2020年 / 943卷
关键词
Reversible watermarking; RST invariance attacks; Linear cellular automata; 2D vector map; Copyright protection; Content authentication; REVERSIBILITY; SCHEME;
D O I
10.1007/978-3-030-17795-9_52
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Copyright protection and content authentication are security problems affecting applications of geographical information system (GIS) based on two-dimensional vector maps and constitute major obstacles limiting the use of such maps. By permitting original data recovery after watermark extraction, reversible watermark can eliminate such obstacles. Parallel computation models called cellular automata provide an effective approach, yielding intricate outcomes from a basic structure. The various existing types of cellular automata differ in how complex they are and how they behave, since the number of parameters that need to be configured is substantial. Unlike other multimedia forms, 2D vector maps are more difficult to watermark with cellular automata due to their distinct features. To overcome this difficulty, a new approach underpinned by a linear cellular automata (LCA) transform is suggested in this study, comprising development of a new system of coordinates consisting of relative coordinates to yield cover data, embedding an encrypted watermark key in the LSB for every relative coordinate, and LCA transform application to conceal the location of the embedded encrypted watermark key in every relative coordinate. The results confirm the approach can prevent prevalent security risks and provide complex, hidden and reversible computation, thus protecting 2D vector map integrity.
引用
收藏
页码:700 / 719
页数:20
相关论文
共 55 条
[1]   Digital Image Scrambling Using 2D Cellular Automata [J].
Abu Dalhoum, Abdel Latif ;
Mahafzah, Basel A. ;
Awwad, Aiman Ayyal ;
Aldamari, Ibrahim ;
Ortega, Alfonso ;
Alfonseca, Manuel .
IEEE MULTIMEDIA, 2012, 19 (04) :28-36
[2]   A Clustering Approach for Protecting GIS Vector Data [J].
Abubahia, Ahmed ;
Cocea, Mihaela .
ADVANCED INFORMATION SYSTEMS ENGINEERING, CAISE 2015, 2015, 9097 :133-147
[3]  
[Anonymous], 2014 INT C DAT SOFTW
[4]  
[Anonymous], MULTIMED TOOLS APPL
[5]  
[Anonymous], 2005, P DOCT FOR CHIN
[6]  
[Anonymous], IND C INT SYST ICIS
[7]  
[Anonymous], JISUANJI GONGCHENG
[8]  
[Anonymous], 2012, JJIH MSP
[9]  
[Anonymous], IEEE ICCSIT
[10]  
[Anonymous], COORDINATES