Reversible Fragile Watermarking for Fine-Grained Tamper Localization in Spatial Data

Spatial data has been widely used in many areas. Meanwhile, the increasingly simplified data access and manipulation methods in spatial data related applications make it important to verify data truthfulness. In this paper, we propose a reversible fragile watermarking scheme for the content authentication of spatial data. The proposed scheme embeds (detects) four kinds of watermarks, i.e., group, object, vertex-local and vertex-global watermarks, into (from) each object (vertex) by altering the digits of the coordinates after the LSD (Least Significant Digit). According to the detection results of those four kinds of watermarks, the scheme can not only locate tampers, but also recognize modification types on both object and vertex levels. In addition, the proposed scheme is reversible, that is the original data can be restored from the watermarked data. The feature of reversibility makes the scheme suitable for applications which require high-precision data.

[1]  Xiamu Niu,et al.  GIS Watermarking: Hiding Data in 2D Vector Maps , 2007, Intelligent Multimedia Data Hiding: New Directions.

[2]  Leonidas J. Guibas,et al.  Partial matching of planar polylines under similarity transformations , 1997, SODA '97.

[3]  Nana Wang,et al.  Reversible fragile watermarking for 2-D vector map authentication with localization , 2012, Comput. Aided Des..

[4]  Mohammad Ali Akhaee,et al.  A Source-Channel Coding Approach to Digital Image Protection and Self-Recovery , 2015, IEEE Transactions on Image Processing.

[5]  Hany Farid,et al.  Digital Image Authentication From JPEG Headers , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Sanjay Kumar Singh,et al.  Video Authentication: Issues and Challenges , 2012 .

[7]  C. Kao,et al.  Application of integrated GIS and multimedia modeling on NPS pollution evaluation , 2009, Environmental monitoring and assessment.

[8]  Jing-Ming Guo,et al.  Continuous-tone Watermark Hiding in Halftone Images , 2010, 2010 12th International Asia-Pacific Web Conference.

[9]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[10]  Xiaotong Wang,et al.  A SURVEY OF DIGITAL VECTOR MAP WATERMARKING , 2006 .

[11]  Liujuan Cao,et al.  A recursive embedding algorithm towards lossless 2D vector map watermarking , 2013, Digit. Signal Process..

[12]  Fei Peng,et al.  A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation , 2010, Comput. Aided Des..

[13]  Wei Li,et al.  On the music content authentication , 2012, ACM Multimedia.

[14]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[15]  Chin-Chen Chang,et al.  An Efficient Fragile Watermarking for Web Pages Tamper-Proof , 2007, APWeb/WAIM Workshops.

[16]  Ralf Hartmut Güting,et al.  An introduction to spatial database systems , 1994, VLDB J..

[17]  Dhiren Patel,et al.  Relational Database Watermarking for Ownership Protection , 2012 .

[18]  Nana Wang,et al.  Reversible fragile watermarking for locating tampered blocks in 2D vector maps , 2013, Multimedia Tools and Applications.

[19]  Liuping Feng,et al.  Research and implementation of fragile watermark for vector graphics , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[20]  Sushil Jajodia,et al.  A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..

[21]  Fucheng You,et al.  A Fragile Digital Watermark Used to Verify the Integrity of Vector Map , 2009, 2009 International Conference on E-Business and Information System Security.

[22]  Ming-ming Gao,et al.  A Semi-fragile Digital Watermarking Algorithm for 2D Vector Graphics Tamper Localization , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[23]  Zhiyong Peng,et al.  A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps , 2014, APWeb.