2013
DOI: 10.1007/s11042-012-1333-4
|View full text |Cite
|
Sign up to set email alerts
|

Reversible fragile watermarking for locating tampered blocks in 2D vector maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 35 publications
(27 citation statements)
references
References 24 publications
0
27
0
Order By: Relevance
“…Scaling refers to altering the size of the map, in both axes by a specific value [16]. Other relevant types of attacks are interpolation [26] and simplification [14] attacks. Simplification attacks refer to the process of removing vertices from the map [14], while interpolation attacks refer to the process of adding new vertices in the map [26].…”
Section: Research Backgroundmentioning
confidence: 99%
See 2 more Smart Citations
“…Scaling refers to altering the size of the map, in both axes by a specific value [16]. Other relevant types of attacks are interpolation [26] and simplification [14] attacks. Simplification attacks refer to the process of removing vertices from the map [14], while interpolation attacks refer to the process of adding new vertices in the map [26].…”
Section: Research Backgroundmentioning
confidence: 99%
“…5. Interpolation Attack: The interpolation attack refers to the process of adding new vertices to map's borders [26]. Similary to the simplification attack, when the centers of polygons are calculated by averaging the vertices, adding more vertices will change that average.…”
Section: Rotation Attack: the Rotation Means Turning The Vector Map Amentioning
confidence: 99%
See 1 more Smart Citation
“…Fragile watermarking allows the detection of any tampering with the vector map data [158,159]; however, any small change in the watermark would make it undetectable. This approach has a wide range of applications such as authentication and HV shift 1 [106] integrity protection of the vector maps [204,205].…”
Section: Robustnessmentioning
confidence: 99%
“…This makes watermark embedding more difficult as compared to video, audio images etc. For copyright protection, there have been different works done using the method of digital watermarking [3][4][5][6][7] and also the content authenticity [8][9][10][11][12][13][14] of 2-Dimensional vectors contrasted with various other options available, for example, digital signature and encryption method. The watermarking can give extra security for the important data [15] and save you time for the process of retransmission [11].…”
Section: Introductionmentioning
confidence: 99%