2016
DOI: 10.4018/ijdcf.2016010101
|View full text |Cite
|
Sign up to set email alerts
|

Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps

Abstract: For 2D vector maps, obtaining high tamper localization accuracy without requiring extra space is a technically challenging problem. Using an adaptive group division approach and an improved reversible data hiding approach, the author proposes a reversible fragile watermarking method for locating tampered Polylines/Polygons in 2D vector maps. In particular, the author adaptively divide the features of the vector map into groups according to a predefined threshold, calculate an authentication watermark for each … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Digital watermarking technology [6][7][8][9], as an effective means of security to protect data, has been gradually applied to vector maps in recent years, and it has achieved good results. Digital watermarks of vector maps can be divided into two types: robust watermarks [10,11] and fragile watermarks [12,13]. The former are mainly used for copyright protection, which requires that the embedded watermark can still be detected to identify the copyright after cyber-attacks; the latter are mainly used for integrity authentication, in which the watermarks are destroyed after the data are illegally falsified and thus the tampered-with areas can be accurately located.…”
Section: Introductionmentioning
confidence: 99%
“…Digital watermarking technology [6][7][8][9], as an effective means of security to protect data, has been gradually applied to vector maps in recent years, and it has achieved good results. Digital watermarks of vector maps can be divided into two types: robust watermarks [10,11] and fragile watermarks [12,13]. The former are mainly used for copyright protection, which requires that the embedded watermark can still be detected to identify the copyright after cyber-attacks; the latter are mainly used for integrity authentication, in which the watermarks are destroyed after the data are illegally falsified and thus the tampered-with areas can be accurately located.…”
Section: Introductionmentioning
confidence: 99%
“…Watermarking of vector map data has been researched for the last 2 decades as a solution for the protection of this type of geographical data [12,[15][16][17][18][19][20][21].…”
Section: Introductionmentioning
confidence: 99%
“…This makes watermark embedding more difficult as compared to video, audio images etc. For copyright protection, there have been different works done using the method of digital watermarking [3][4][5][6][7] and also the content authenticity [8][9][10][11][12][13][14] of 2-Dimensional vectors contrasted with various other options available, for example, digital signature and encryption method. The watermarking can give extra security for the important data [15] and save you time for the process of retransmission [11].…”
Section: Introductionmentioning
confidence: 99%