Watermarking Study on The Vector Map

Hartanto Tantriawan, Rinaldi Munir

Abstract


In addition to being employed in a variety of military and security applications, GIS vector maps are frequently used in social, environmental, and economic applications like navigation, business planning, infrastructure & utility allocation, and disaster management. Given the high value of this map, copyright protection is implemented in the watermarking as a required safeguard against unauthorized modification and exchange of GIS vector maps. Watermarking is inserting information (watermark) stating ownership of multimedia data. This paper discusses several approaches that can be used to watermark vector maps, including using the space-domain algorithm and transform-domain algorithm. Second The watermarking algorithm was developed with the following quality metrics: fidelity, robustness, capacity, complexity, and security. The challenge in this study is that the higher the capacity, the lower the fidelity value. Low fidelity causes map properties to be lost, making the map unusable. These two things need to be balanced.

Keywords


Watermarking; DFT; DWT; Space-Domain; Transform-Domain

Full Text:

PDF

References


B. Lin and A. Li, “Study on benchmark system for copyright marking algorithms of GIS vector data,” 2010. doi: 10.1109/GEOINFORMATICS.2010.5567749.

S. Huber, R. Kwitt, P. Meerwald, M. Held, and A. Uhl, “Watermarking of 2D vector graphics with distortion constraint,” 2010. doi: 10.1109/ICME.2010.5583049.

C. Wang, L. Zhang, B. Liang, H. Zheng, W. Du, and Y. Peng, “Watermarking vector maps based on minimum encasing rectangle,” in Proceedings - 4th International Conference on Intelligent Computation Technology and Automation, ICICTA 2011, 2011, vol. 2. doi: 10.1109/ICICTA.2011.589.

F. L. Bauer, Decrypted secrets: Methods and maxims of cryptology. 2007. doi: 10.1007/978-3-540-48121-8.

“Information hiding terminology,” 1996. doi: 10.1007/3-540-61996-8_52.

D. Kahn, “The history of steganography,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1996, vol. 1174. doi: 10.1007/3-540-61996-8_27.

H. Berghel, “Watermarking cyberspace,” Communications of the ACM, vol. 40, no. 11, 1997, doi: 10.1145/265684.265687.

F. Perez-Gonzalez and J. R. Hernandez, “Tutorial on digital watermarking,” 1999. doi: 10.1109/ccst.1999.797926.

L. Cao, C. Men, and Y. Gao, “A recursive embedding algorithm towards lossless 2D vector map watermarking,” Digital Signal Processing: A Review Journal, vol. 23, no. 3, 2013, doi: 10.1016/j.dsp.2012.11.007.

N. Wang, H. Zhang, and C. Men, “A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates,” CAD Computer Aided Design, vol. 47, 2014, doi: 10.1016/j.cad.2013.10.005.

Z. Peng, M. Yue, X. Wu, and Y. Peng, “Blind watermarking scheme for polylines in vector geo-spatial data,” Multimedia Tools and Applications, vol. 74, no. 24, 2015, doi: 10.1007/s11042-014-2259-9.

N. Wang, “Reversible watermarking for 2D vector maps based on normalized vertices,” Multimedia Tools and Applications, vol. 76, no. 20, 2017, doi: 10.1007/s11042-016-3970-5.

H. Yan, L. Zhang, and W. Yang, “A normalization-based watermarking scheme for 2D vector map data,” Earth Science Informatics, vol. 10, no. 4, 2017, doi: 10.1007/s12145-017-0310-x.

Y. Qiu, H. Gu, and J. Sun, “High-payload reversible watermarking scheme of vector maps,” Multimedia Tools and Applications, vol. 77, no. 5, 2018, doi: 10.1007/s11042-017-4546-8.

N. Wang and C. Men, “Reversible fragile watermarking for 2-D vector map authentication with localization,” CAD Computer Aided Design, vol. 44, no. 4, 2012, doi: 10.1016/j.cad.2011.11.001.

N. Wang and C. Men, “Reversible fragile watermarking for locating tampered blocks in 2D vector maps,” Multimedia Tools and Applications, vol. 67, no. 3, 2013, doi: 10.1007/s11042-012-1333-4.

N. Wang and M. Kankanhalli, “2D vector map fragile watermarking with region location,” ACM Transactions on Spatial Algorithms and Systems, vol. 4, no. 4, 2018, doi: 10.1145/3239163.

A. Abubahia and M. Cocea, “Advancements in GIS map copyright protection schemes - a critical review,” Multimedia Tools and Applications, vol. 76, no. 10, 2017, doi: 10.1007/s11042-016-3441-z.

ESRI, “ESRI Shapefile Technical Description,” Computational Statistics, vol. 16, no. July, 1998, doi: 10.1016/0167-9473(93)90138-J.

Saraju P. Mohanty, “Digital Watermarking: A Tutorial Review,” 2003, Accessed: Jan. 25, 2021. [Online]. Available: https://www.researchgate.net/publication/2568630_Digital_Watermarking_A_Tutorial_Review/stats

C. López, “Watermarking of digital geospatial datasets: A review of technical, legal and copyright issues,” International Journal of Geographical Information Science, vol. 16, no. 6, 2002, doi: 10.1080/13658810210129148.

T. Abbas and M. Jawad, “Digital vector map watermarking: applications, techniques and attacks ,” Oriental. J Comput Sci Technol, vol. 6, no. 3, pp. 333–339, 2013.

A. Abubahia and M. Cocea, “Partition Clustering for GIS Map Data Protection,” in Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI, 2014, vol. 2014-December. doi: 10.1109/ICTAI.2014.128.

H. Peng, G. Jianya, and C. Liang, “An improved adaptive watermarking algorithm for vector digital maps,” 2006. doi: 10.1109/IGARSS.2006.731.

P. Bhanuchandar, M. S. G. Prasad, and K. P. Srinivas, “A SURVEY ON VARIOUS WATERMARKING METHODS FOR GIS VECTOR DATA,” International Journal Computer & Electronics Research, vol. 2, no. 3, Jun. 2013.

H. H. Chang, T. Chen, and K. S. Kan, “Watermarking 2D/3D graphics for copyright protection,” in ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 2003, vol. 4. doi: 10.1109/icassp.2003.1202744.

W. Xun, H. Ding-Jun, and Z. Zhi-Yong, “A robust zero-watermarking algorithm for 2D vector digital maps,” in Lecture Notes in Electrical Engineering, 2012, vol. 107 LNEE. doi: 10.1007/978-94-007-1839-5_56.

Q. Zhao, L. Sui, C. Wang, and X. Yin, “Publicly verify the integrity of the geographical data using public watermarking scheme,” in Communications in Computer and Information Science, 2013, vol. 398 PART I. doi: 10.1007/978-3-642-45025-9_63.

L. Zheng and F. You, “A fragile digital watermark used to verify the integrity of vector map,” 2009. doi: 10.1109/EBISS.2009.5137869.

M. R. Mouhamed, A. M. Rashad, and A. Ella Hassanien, “Blind 2D vector data watermarking approach using random table and polar coordinates,” 2012. doi: 10.1109/URKE.2012.6319586.

Y. Li and L. Xu, “A blind watermarking of vector graphics images,” 2003. doi: 10.1109/ICCIMA.2003.1238163.

Z. Junfeng and X. Bing, “Research on digital watermarking algorithms for 2D graphics,” 2011. doi: 10.1109/ICCSN.2011.6013689.

C. Men, L. Cao, and J. Sun, “A perception-based reversible watermarking algorithm for 2D-vector maps,” Gaojishu Tongxin/Chinese High Technology Letters, vol. 20, no. 4, 2010, doi: 10.3772/j.isan.1002-0470.2010.04.003.

D. Xu and Q. Wang, “The study of watermarking algorithm for vector geospatial data based on the phase of DFT,” in 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, 2010, pp. 625–629. doi: 10.1109/WCINS.2010.5541855.

S. Zope-Chaudhari and P. Venkatachalam, “Protecting geospatial data using digital watermarking,” in 2012 International Conference on Computer and Communication Engineering (ICCCE), 2012, pp. 594–598. doi: 10.1109/ICCCE.2012.6271256.

X. Xi, X. Zhang, Y. Sun, X. Jiang, and Q. Xin, “Topology-Preserving and Geometric Feature-Correction Watermarking of Vector Maps,” IEEE Access, vol. 8, 2020, doi: 10.1109/ACCESS.2020.2973458.

N. Ren, Q. S. Wang, and C. Q. Zhu, “Selective authentication algorithm based on semi-fragile watermarking for vector geographical data,” 2014. doi: 10.1109/GEOINFORMATICS.2014.6950830.

S. N. Neyman, B. Sitohang, and F. Cahyono, “An improvement technique of fragile watermarking to assurance the data integrity on vector maps,” in 2013 International Conference on Computer, Control, Informatics and Its Applications (IC3INA), 2013, pp. 179–184. doi: 10.1109/IC3INA.2013.6819170.

A. M. Abubahia and M. Cocea, “Exploiting vector map properties for GIS data copyright protection,” in Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI, 2016, vol. 2016-January. doi: 10.1109/ICTAI.2015.89.

N. Ren, C. Zhu, D. Tong, W. Chen, and Q. Zhou, “Commutative Encryption and Watermarking Algorithm Based on Feature Invariants for Secure Vector Map,” IEEE Access, 2020, doi: 10.1109/ACCESS.2020.3043450.

AutoCAD, “Dxf reference.,” 2007.




DOI: http://dx.doi.org/10.24014/ijaidm.v6i1.22211

Refbacks

  • There are currently no refbacks.


Office and Secretariat:

Big Data Research Centre
Puzzle Research Data Technology (Predatech)
Laboratory Building 1st Floor of Faculty of Science and Technology
UIN Sultan Syarif Kasim Riau

Jl. HR. Soebrantas KM. 18.5 No. 155 Pekanbaru Riau – 28293
Website: http://predatech.uin-suska.ac.id/ijaidm
Email: ijaidm@uin-suska.ac.id
e-Journal: http://ejournal.uin-suska.ac.id/index.php/ijaidm
Phone: 085275359942

Click Here for Information


Journal Indexing:

Google Scholar | ROAD | PKP Index | BASE | ESJI | General Impact Factor | Garuda | Moraref | One Search | Cite Factor | Crossref | WorldCat | Neliti  | SINTA | Dimensions | ICI Index Copernicus 

IJAIDM Stats