A zero-watermarking scheme with embedding timestamp in vector maps for Big Data computing

Digital watermarking is a frontier technology for information security and also one of the most effective approaches to protect the copyright security of vector maps. Zero-watermarking, a sort of constructed watermarking, is different from the traditional embedded watermarking. Due to the lack of embedding watermark into the vector data, zero watermark exists an obvious difficulty to resist interpretation attack. In this paper, we present an improved zero-watermarking scheme for vector maps by introducing the timestamp method to resist the interpretation attack. The proposed scheme does not need any modifications on the original map data, providing the following feature: adding timestamp to the binary sequence of the scrambled watermarking image, performing the exclusive OR operation on scrambled sequence and extracted feature points, and conducting a reverse extraction detection and a timestamp validation on the zero-watermarking sequence. The experimental results show that the proposed scheme could not only resist interpretation attack in zero-watermarking effectively but also is of robustness and invisibility for the geometric attacks and map updating attacks.

[1]  B. R. Han,et al.  Zero-watermarking Algorithm for Medical Volume Data Based on Difference Hashing , 2015, Int. J. Comput. Commun. Control.

[2]  Wei Ren,et al.  Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid , 2013, Int. J. Distributed Sens. Networks.

[3]  Kim-Kwang Raymond Choo,et al.  Spectral–spatial multi-feature-based deep learning for hyperspectral remote sensing image classification , 2016, Soft Computing.

[4]  Huadong Guo Big data for scientific research and discovery , 2015 .

[5]  Asha Rani,et al.  A Zero-Watermarking Scheme using Discrete Wavelet Transform☆ , 2015 .

[6]  Albert Y. Zomaya,et al.  Particle Swarm Optimization based dictionary learning for remote sensing big data , 2015, Knowl. Based Syst..

[7]  Yuwei Peng,et al.  A Zero-Watermarking Scheme for Vector Map Based on Feature Vertex Distance Ratio , 2015, J. Electr. Comput. Eng..

[8]  Mihaela Cocea,et al.  Exploiting Vector Map Properties for GIS Data Copyright Protection , 2015, 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI).

[9]  Rajiv Ranjan,et al.  Semantic analysis and retrieval of spatial data based on the uncertain ontology model in Digital Earth , 2015, Int. J. Digit. Earth.

[10]  Lizhe Wang,et al.  Sparse representation-based correlation analysis of non-stationary spatiotemporal big data , 2016, Int. J. Digit. Earth.

[11]  Yen-Shou Lai,et al.  A zero-watermark scheme with geometrical invariants using SVM and PSO against geometrical attacks for image protection , 2013, J. Syst. Softw..

[12]  Lin Wei,et al.  A Watermarking Algorithm Resisting to Projection Transformation for Vector Geographic Data , 2016 .

[13]  Liujuan Cao,et al.  A recursive embedding algorithm towards lossless 2D vector map watermarking , 2013, Digit. Signal Process..

[14]  Tao Jiang,et al.  Security analysis of a homomorphic signature scheme for network coding , 2015, Secur. Commun. Networks.

[15]  Jian-Guo Sun,et al.  A Reversible Digital Watermarking Algorithm for Vector Maps , 2014, Int. J. Netw. Secur..

[16]  Wei Zhang,et al.  Universal steganography model for low bit-rate speech codec , 2016, Secur. Commun. Networks.

[17]  Lizhe Wang,et al.  A Web 2.0‐based science gateway for massive remote sensing image processing , 2015, Concurr. Comput. Pract. Exp..

[18]  W. Xun,et al.  A Robust Zero-Watermarking Algorithm for 2D Vector Digital Maps , 2012 .

[19]  Sen Bai,et al.  Steganography Integration Into a Low-Bit Rate Speech Codec , 2012, IEEE Transactions on Information Forensics and Security.

[20]  Xiang Li,et al.  On the study of fusion techniques for bad geological remote sensing image , 2015, J. Ambient Intell. Humaniz. Comput..

[21]  Aboul Ella Hassanien,et al.  Blind Watermark Approach for Map Authentication Using Support Vector Machine , 2013 .

[22]  Freek D. van der Meer,et al.  Ontology-aided annotation, visualization, and generalization of geological time-scale information from online geological map services , 2012, Comput. Geosci..

[23]  Ryutarou Ohbuchi,et al.  Robust watermarking of vector digital maps , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[24]  Chunfang Kong,et al.  Landslide susceptibility evaluation based on BPNN and GIS: a case of Guojiaba in the Three Gorges Reservoir Area , 2015, Int. J. Geogr. Inf. Sci..

[25]  Gang Liu,et al.  Decomposition tree: a spatio-temporal indexing method for movement big data , 2015, Cluster Computing.

[26]  Tao Jiang,et al.  Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding , 2016, IEEE Transactions on Information Forensics and Security.

[27]  Zhihua Cai,et al.  Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards , 2014, Secur. Commun. Networks.

[28]  Yu Xin,et al.  A practical scheme of defeating interpretation attack of digital watermarking , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[29]  朱长青,et al.  GIS Spatial Data Updating Algorithm Based on Digital Watermarking Technology , 2015 .

[30]  Albert Y. Zomaya,et al.  Remote sensing big data computing: Challenges and opportunities , 2015, Future Gener. Comput. Syst..

[31]  Benhard Sitohang,et al.  A New Copyright Protection for Vector Map using FFT-based Watermarking , 2014 .

[32]  Sanjeev Khanna,et al.  Watermarking maps: hiding information in structured data , 2000, SODA '00.

[33]  Jean-Christophe Lapayre,et al.  Medical Image Compression Approach Based on Image Resizing, Digital Watermarking and Lossless Compression , 2017, J. Signal Process. Syst..

[34]  Yu-Chi Pu,et al.  Toward Blind Robust Watermarking of Vector Maps , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[35]  Wei Ren,et al.  APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks , 2013, Int. J. Distributed Sens. Networks.

[36]  Peng Liu,et al.  Link the remote sensing big data to the image features via wavelet transformation , 2016, Cluster Computing.