Reversible fragile watermarking for locating tampered blocks in 2D vector maps

For 2D vector maps, obtaining good tamper localization performance and original content recovery with existing reversible fragile watermarking schemes is a technically challenging problem. Using an improved reversible watermarking method and a fragile watermarking algorithm based on vertex insertion, we propose a reversible fragile watermarking scheme that detects and locates tampered blocks with high accuracy while ensuring recovery of the original content. In particular, we propose dividing the features of the vector map into different blocks, calculating the block authentication watermarks and embedding the watermarks with different watermarking schemes. While the block division ensures superior accuracy of tamper localization, the reversible watermarking method and the fragile watermarking algorithm based on vertex insertion provide recovery of the original content. Experimental results show that the proposed scheme could detect and locate malicious attacks such as vertex/feature modification, vertex/feature addition, and vertex/feature deletion.

[1]  Guido D. Salvucci,et al.  Ieee standard for binary floating-point arithmetic , 1985 .

[2]  Xiaotong Wang,et al.  A SURVEY OF DIGITAL VECTOR MAP WATERMARKING , 2006 .

[3]  Hao-Tian Wu,et al.  Reversible Watermarking by Modulation and Security Enhancement , 2010, IEEE Transactions on Instrumentation and Measurement.

[4]  Ryutarou Ohbuchi,et al.  Robust watermarking of vector digital maps , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[5]  Tobias Isenberg,et al.  Illustration watermarks for vector graphics , 2003, 11th Pacific Conference onComputer Graphics and Applications, 2003. Proceedings..

[6]  Chung-Ming Wang,et al.  Reversible Data Hiding for Point-Sampled Geometry , 2007, J. Inf. Sci. Eng..

[7]  Ki-Ryong Kwon,et al.  Vector watermarking scheme for GIS vector map management , 2011, Multimedia Tools and Applications.

[8]  Ioannis Pitas,et al.  Watermarking Polygonal Lines Using Fourier Descriptors , 2004, IEEE Computer Graphics and Applications.

[9]  Ansi Ieee,et al.  IEEE Standard for Binary Floating Point Arithmetic , 1985 .

[10]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[11]  Liuping Feng,et al.  Research and implementation of fragile watermark for vector graphics , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[12]  A. Murat Tekalp,et al.  Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.

[13]  Rong-Ching Wu,et al.  Analysis of the Exponential Signal by the Interpolated DFT Algorithm , 2010, IEEE Transactions on Instrumentation and Measurement.

[14]  Christoph Busch,et al.  Reversible watermarking of 2D-vector data , 2004, MM&Sec '04.

[15]  Jean-Luc Dugelay,et al.  Reversible watermarking of 3D mesh models by prediction-error expansion , 2008, 2008 IEEE 10th Workshop on Multimedia Signal Processing.

[16]  Chin-Chen Chang,et al.  A reversible data hiding scheme using complementary embedding strategy , 2010, Inf. Sci..

[17]  William Puech,et al.  Lossless 3D steganography based on MST and connectivity modification , 2010, Signal Process. Image Commun..

[18]  Xiamu Niu,et al.  Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion , 2007, IEEE Transactions on Information Forensics and Security.

[19]  Hong Wen,et al.  A key points-based blind watermarking approach for vector geo-spatial data , 2011, Comput. Environ. Urban Syst..

[20]  Fei Peng,et al.  A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion , 2011, Comput. Aided Des..

[21]  Fucheng You,et al.  A Fragile Digital Watermark Used to Verify the Integrity of Vector Map , 2009, 2009 International Conference on E-Business and Information System Security.

[22]  Ioannis Pitas,et al.  Watermarking of sets of polygonal lines using fusion techniques , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[23]  Benoit M. Macq,et al.  Data hiding on 3-D triangle meshes , 2003, IEEE Trans. Signal Process..

[24]  Hongmei Gou,et al.  Data hiding in curves with application to fingerprinting maps , 2005, IEEE Transactions on Signal Processing.

[25]  Ryutarou Ohbuchi,et al.  Watermarking 2D vector maps in the mesh-spectral domain , 2003, 2003 Shape Modeling International..

[26]  Stefan Dziembowski,et al.  Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.

[27]  Zhiyong Peng,et al.  Watermarking geographical data on spatial topological relations , 2010, Multimedia Tools and Applications.

[28]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[29]  Carlos López-Vázquez,et al.  Watermarking of digital geospatial datasets: a review of technical, legal and copyright issues , 2002, Int. J. Geogr. Inf. Sci..

[30]  Ioannis Pitas,et al.  Blind city maps watermarking utilizing road width information , 2007, 2007 15th European Signal Processing Conference.

[31]  Ioannis Pitas,et al.  An Optimal Detector Structure for the Fourier Descriptors Domain Watermarking of 2D Vector Graphics , 2007, IEEE Transactions on Visualization and Computer Graphics.

[32]  Jun Tian,et al.  Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..