定位篡改实体组的矢量地图脆弱水印算法

侯翔, 闵连权, 唐立文

侯翔, 闵连权, 唐立文. 定位篡改实体组的矢量地图脆弱水印算法[J]. 武汉大学学报 ( 信息科学版), 2020, 45(2): 309-316. DOI: 10.13203/j.whugis20170404
引用本文: 侯翔, 闵连权, 唐立文. 定位篡改实体组的矢量地图脆弱水印算法[J]. 武汉大学学报 ( 信息科学版), 2020, 45(2): 309-316. DOI: 10.13203/j.whugis20170404
HOU Xiang, MIN Lianquan, TANG Liwen. Fragile Watermarking Algorithm for Locating Tampered Entity Groups in Vector Map Data[J]. Geomatics and Information Science of Wuhan University, 2020, 45(2): 309-316. DOI: 10.13203/j.whugis20170404
Citation: HOU Xiang, MIN Lianquan, TANG Liwen. Fragile Watermarking Algorithm for Locating Tampered Entity Groups in Vector Map Data[J]. Geomatics and Information Science of Wuhan University, 2020, 45(2): 309-316. DOI: 10.13203/j.whugis20170404

定位篡改实体组的矢量地图脆弱水印算法

基金项目: 

国家自然科学基金 41471337

详细信息
    作者简介:

    侯翔, 博士, 主要从事地理空间数据安全研究。hxhouxianghx@163.com

    通讯作者:

    闵连权, 博士, 教授。rainman_mlq@163.com

  • 中图分类号: P208

Fragile Watermarking Algorithm for Locating Tampered Entity Groups in Vector Map Data

Funds: 

The National Natural Science Foundation of China 41471337

More Information
  • 摘要: 针对矢量地图数据的完整性认证问题,提出了一种定位篡改实体组的脆弱水印算法。首先将各个地理实体用其最小外接矩形的中点表征,在此基础上采用优化的k均值聚类对地理实体进行分组;然后通过构建实体组的完整性特征参数并结合混沌映射生成脆弱水印;最后将认证信息嵌入到排序处理后的坐标中。水印检测与嵌入过程相对应,通过对比检测出水印和生成水印的一致性,判断实体组是否遭到了篡改。实验结果表明,该算法在有效保持矢量地图数据精度的同时,能够对矢量地图的完整性作出准确认证,具有良好的篡改定位精度。
    Abstract: To study the problem of integrity authentication for vector map data, a fragile watermarking algorithm for locating tampered entity groups is proposed. Firstly, each geographic entity is represented by the midpoint of its minimum bounding rectangles. On this basis, geographic entities are divided into groups using optimized k-means clustering algorithm. Then fragile watermarking is generated through building integrity authentication parameter and combining it with chaotic mapping. Finally, authentication information is embedded in the sorted coordinates. Watermarking detection corresponds to the embedding procedure. Whether the map data have been tampered could be determined by comparing the consistency of the extracted watermarking with the generated watermarking. Experimental results show that the proposed algorithm is able to preserve the accuracy of vector map data effectively and authenticate the integrity of vector map accurately at the same time. Furthermore, the algorithm shows favorable tamper localization ability.
  • 图  1   地理实体及其最小外接矩形的中点分布

    Figure  1.   Geographic Entities and Distribution of the Midpoints of Minimum Bounding Rectangles

    图  2   篡改漏检示意图

    Figure  2.   Sketch Map of Tampering Undetected

    图  3   实验数据

    Figure  3.   Experimental Data

    图  4   不可见性实验

    Figure  4.   Experimental Results of Imperceptibility

    图  5   增加实体及认证结果

    Figure  5.   Entity Addition and Authentication Result

    图  6   删除实体及认证结果

    Figure  6.   Entity Deletion and Authentication Result

    图  7   修改实体及认证结果

    Figure  7.   Entity Modification and Authentication Result

    图  8   实体乱序、坐标点逆序及认证结果

    Figure  8.   Entity Rearrangement, Vertices Reversing and Authentication Result

    表  1   篡改定位能力对比

    Table  1   Comparison of Tamper Localization Ability

    攻击方式 文献[13] 文献[15] 文献[19] 文献[20] 文献[21] 本文算法
    增加实体 N N N N N N
    删除实体 N N N N N N
    修改实体 N N N N N N
    实体乱序 N N N 0 0 0
    坐标点逆序 N N N 0 0 0
    下载: 导出CSV
  • [1]

    Ahmed A, Mihaela C. Advancements in GIS Map Copyright Protection Schemes-A Critical Review[J]. Multimedia Tools Applications, 2017, 76(10):12205-12231 doi: 10.1007/s11042-016-3441-z

    [2] 闵连权, 杨辉, 侯翔, 等.地理空间信息数字水印技术[M].北京:测绘出版社, 2017

    Min Lianquan, Yang Hui, Hou Xiang, et al. Watermarking of Geospatial Information[M]. Beijing:Surveying and Mapping Press, 2017

    [3] 孙鸿睿, 李光强, 朱建军, 等.改进的差值扩张和平移矢量地图可逆水印算法[J].武汉大学学报·信息科学版, 2012, 37(8):1004-1007 http://ch.whu.edu.cn/CN/abstract/abstract304.shtml

    Sun Hongrui, Li Guangqiang, Zhu Jianjun, et al. Improved Reversible Watermarking Algorithm for Vector Map Based on Difference Expansion and Shifting[J]. Geomatics and Information Science of Wuhan University, 2012, 37(8):1004-1007 http://ch.whu.edu.cn/CN/abstract/abstract304.shtml

    [4] 闵连权.地理空间数据隐藏与数字水印[M].北京:测绘出版社, 2015

    Min Lianquan. Information Hiding and Watermarking of Geospatial Data[M]. Beijing:Surveying and Mapping Press, 2015

    [5]

    Peng Zhiyong, Yue Mingliang, Wu Xia, et al. Blind Watermarking Scheme for Polylines in Vector Geo-spatial Data[J]. Multimedia Tools Applications, 2015, 74(24):11721-11739 doi: 10.1007/s11042-014-2259-9

    [6] 杨成松, 朱长青, 王莹莹.矢量地理数据自检测水印算法[J].武汉大学学报·信息科学版, 2011, 36(12):1402-1405 http://ch.whu.edu.cn/CN/abstract/abstract737.shtml

    Yang Chengsong, Zhu Changqing, Wang Yingying. Self-detection Watermarking Algorithm and Its Application to Vector Geo-spatial Data[J]. Geomatics and Information Science of Wuhan University, 2011, 36(12):1402-1405 http://ch.whu.edu.cn/CN/abstract/abstract737.shtml

    [7] 张黎明, 闫浩文, 齐建勋, 等.基于DFT的可控误差矢量空间数据盲水印算法[J].武汉大学学报·信息科学版, 2015, 40(7):990-994 http://ch.whu.edu.cn/CN/abstract/abstract3310.shtml

    Zhang Liming, Yan Haowen, Qi Jianxun, et al. A Blind Watermarking Algorithm for Copyright Protection of Vector Geospatial Data Under Controllable Errors Based on DFT[J]. Geomatics and Information Science of Wuhan University, 2015, 40(7):990-994 http://ch.whu.edu.cn/CN/abstract/abstract3310.shtml

    [8]

    Lin Zixing, Peng Fei, Long Min. A Reversible Watermarking for Authenticating 2D Vector Graphics Based on Bionic Spider Web[J]. Signal Processing:Image Communication, 2017, 57(9):134-146 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=f6562f173a11d17aca3a675cb1ccbab8

    [9] 任娜, 吴维, 朱长青, 等.一种抗要素删除的矢量地理数据精确认证算法[J].地理与地理信息科学, 2015, 31(4):43-46 doi: 10.3969/j.issn.1672-0504.2015.04.009

    Ren Na, Wu Wei, Zhu Changqing, et al. An Accuracy Authentication Algorithm of Anti-Deleting Elements for Vector Geographic Data[J]. Geography and Geo-information Science, 2015, 31(4):43-46 doi: 10.3969/j.issn.1672-0504.2015.04.009

    [10] 隋莉莉, 汪传建.基于弱水印的地理数据拓扑完整性检验方法[J].计算机科学, 2016, 43(2):183-187 http://d.old.wanfangdata.com.cn/Periodical/jsjkx201602040

    Sui Lili, Wang Chuanjian. Checking Topological Integrity of Geographic Data Based on Fragile Watermarking[J]. Computer Science, 2016, 43(2):183-187 http://d.old.wanfangdata.com.cn/Periodical/jsjkx201602040

    [11]

    Zheng Liangbin, You Fucheng. A Fragile Digital Watermark Used to Verify the Integrity of Vector Map[C]. International Conference on E-Business and Information System Security (EBISS), Wuhan, China, 2009

    [12] 任娜, 吴维, 朱长青.一种点约束分块的矢量地理数据精确认证算法[J].地球信息科学学报, 2015, 17(2):166-171 http://d.old.wanfangdata.com.cn/Periodical/dqxxkx201502007

    Ren Na, Wu Wei, Zhu Changqing. An Accurate Authentication Algorithm Based on Point Constraint Block for Vector Geographic Data[J]. Journal of Geo-information Science, 2015, 17(2):166-171 http://d.old.wanfangdata.com.cn/Periodical/dqxxkx201502007

    [13] 郑良斌, 冯柳平, 陈如琪, 等.矢量图形脆弱水印研究与实现[J].计算机应用研究, 2011, 28(10):3820-3822 doi: 10.3969/j.issn.1001-3695.2011.10.058

    Zheng Liangbin, Feng Liuping, Chen Ruqi, et al. Research and Implementation of Fragile Watermark for Vector Graphics[J]. Application Research of Computers, 2011, 28(10):3820-3822 doi: 10.3969/j.issn.1001-3695.2011.10.058

    [14]

    Wang Nana, Men Chaoguang. Reversible Fragile Watermarking for 2D Vector Map Authentication with Localization[J]. Computer-Aided Design, 2012, 44(4):320-330 doi: 10.1016/j.cad.2011.11.001

    [15]

    Shelvie N N, Benhard S, Sobar S. Reversible Fragile Watermarking Based on Difference Expansion Using Manhattan Distances for 2D Vector Map[J]. Procedia Technology, 2013, 11:614-620 doi: 10.1016/j.protcy.2013.12.236

    [16]

    Wang Xiaotong, Shao Chengyong, Xu Xiaogang, et al. Reversible Data-Hiding Scheme for 2D Vector Maps Based on Difference Expansion[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3):311-320 doi: 10.1109/TIFS.2007.902677

    [17] 汪传建, 彭煜玮, 赵庆展, 等.基于弱水印的地理数据篡改检验方法[J].小型微型计算机系统, 2014, 35(12):2628-2632 doi: 10.3969/j.issn.1000-1220.2014.12.008

    Wang Chuanjian, Peng Yuwei, Zhao Qingzhan, et al. Fragile Watermarking Scheme for Checking the Tamper of Geographical Data[J]. Journal of Chinese Computer Systems, 2014, 35(12):2628-2632 doi: 10.3969/j.issn.1000-1220.2014.12.008

    [18]

    Yue Mingliang, Peng Zhiyong, Peng Yuwei. A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps[J]. Lecture Notes in Computer Science, 2014, 8709:129-140 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=CC0214557126

    [19] 李莎莎, 王海荣, 周卫, 等.基于易碎水印的GIS矢量数据完整性认证方法[J].测绘通报, 2013(11):101-105 http://d.old.wanfangdata.com.cn/Periodical/chtb201311029

    Li Shasha, Wang Hairong, Zhou Wei, et al. Fragile Watermarking Based Integrality Authentication for GIS Vector Data[J]. Bulletin of Surveying and Mapping, 2013(11):101-105 http://d.old.wanfangdata.com.cn/Periodical/chtb201311029

    [20]

    Wang Nana. Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps[J]. International Journal of Digital Crime and Forensics, 2016, 8(1):1-25 http://www.wanfangdata.com.cn/details/detail.do?_type=perio&id=642e5d81d21efb56f6516c64521f3bff

    [21]

    Wang N, Bian J, Zhang H. RST Invariant Fragile Watermarking for 2D Vector Map Authentication[J]. International Journal of Multimedia and Ubiquitous Engineering, 2015, 10(4):155-172 doi: 10.14257/ijmue.2015.10.4.16

    [22] 闵连权, 李强, 杨玉彬, 等.矢量地图数据的水印技术综述[J].测绘科学技术学报, 2009, 26(2):96-102 doi: 10.3969/j.issn.1673-6338.2009.02.006

    Min Lianquan, Li Qiang, Yang Yubin, et al. A Survey of Watermarking Techniques for Vector Map Data[J]. Journal of Geomatics Science and Technology, 2009, 26(2):96-102 doi: 10.3969/j.issn.1673-6338.2009.02.006

    [23] 笪清安.矢量地图脆弱水印算法的研究[D].哈尔滨: 哈尔滨工程大学, 2017

    Da Qing'an. Research on Fragile Watermarking Algorithm for Vector Map[D]. Harbin: Harbin Engineering University, 2017

    [24] 张黎明.地理空间矢量数据数字水印算法研究[D].兰州: 兰州交通大学, 2016

    Zhang Liming. On Digital Watermarking Algorithms for Vector Geospatial Data[D]. Lanzhou: Lanzhou Jiaotong University, 2016

图(8)  /  表(1)
计量
  • 文章访问数:  813
  • HTML全文浏览量:  163
  • PDF下载量:  74
  • 被引次数: 0
出版历程
  • 收稿日期:  2018-10-14
  • 发布日期:  2020-02-04

目录

    /

    返回文章
    返回