“…Semi-fragile schemes allow the detection of malicious tampering with the vector map data [36,118,191]; in these schemes, the watermark is still detectable after non-malicious transformations, however, it is not detectable after malicious attacks. A successful attack refers to the success in removing the embedded watermark while preserving the validity of the vector map data [111]. In literature, the attacks can be classified in two categories: (a) geometric attacks [30,170,181], and (b) signal operation attacks [158,169].…”