Combinational spatial and frequency domains watermarking for 2D vector maps

被引:0
|
作者
Liming Zhang
Haowen Yan
Rui Zhu
Ping Du
机构
[1] Lanzhou Jiaotong University,Faculty of Geomatics
[2] National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring,undefined
来源
关键词
Vector map; Multiple watermarking; Watermarking algorithm; DFT;
D O I
暂无
中图分类号
学科分类号
摘要
Watermarking plays an import role in digital copyright protection. It enables copyright owners to embed invisible watermarks within copies of data before distribution. However, most existing watermarking algorithms for 2D vector maps use either spatial domain methods, e.g., the Least Significant Bit or frequency domain methods, e.g., discrete Fourier transform (DFT), and very few algorithms combine the two domains. In order to improve the robustness of watermarks to against more common attacks, a novel algorithm using a combination of spatial and frequency domains is presented. Both the spatial domain and the frequency domain can be used for watermark embedding. Obviously, the advantages of each method are retained and the disadvantages of each method are offset by complementation. The watermark was also shuffled before embedding. A one-way hash function was used to map the watermark and 2D vector map. By using two different methods, one part of the watermark was embedded into the spatial domain first and another part of the watermark was embedded into the DFT domain. Additionally, the watermark was embedded multiple times. No original map data are required for the watermark extraction procedure. Analysis shows that the distortions of the watermarked data are extremely small, and the algorithm is more robust than methods using a single domain. It can resist the most common attacks, such as vertex insertion and removal, cropping, compression, reordering, and data format conversion attacks. It is also robust against rotation scaling and translation attacks.
引用
收藏
页码:31375 / 31387
页数:12
相关论文
共 50 条
  • [31] Parallel blind digital image watermarking in spatial and frequency domains
    Piotr Lenarczyk
    Zbigniew Piotrowski
    [J]. Telecommunication Systems, 2013, 54 : 287 - 303
  • [32] Parallel blind digital image watermarking in spatial and frequency domains
    Lenarczyk, Piotr
    Piotrowski, Zbigniew
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 54 (03) : 287 - 303
  • [33] A new geometric-transformation robust and practical embedding scheme for watermarking 2D vector maps in the graph spectral domain
    Zhong, Shangping
    Hu, Yue
    Lu, Jianming
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 24 - +
  • [34] Nonlinear scrambling-based reversible watermarking for 2D-vector maps
    Liujuan Cao
    Chaoguang Men
    Rongrong Ji
    [J]. The Visual Computer, 2013, 29 : 231 - 237
  • [35] Reversible watermarking for 2D-vector maps based on graph spectral domain
    Men, Chao-Guang
    Cao, Liu-Juan
    Sun, Jian-Guo
    [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2009, 41 (12): : 83 - 87
  • [36] Nonlinear scrambling-based reversible watermarking for 2D-vector maps
    Cao, Liujuan
    Men, Chaoguang
    Ji, Rongrong
    [J]. VISUAL COMPUTER, 2013, 29 (03): : 231 - 237
  • [37] ITERATIVE EMBEDDING-BASED REVERSIBLE WATERMARKING FOR 2D-VECTOR MAPS
    Cao, Liujuan
    Men, Chaoguang
    Li, Xiang
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 3685 - 3688
  • [38] A perception-based reversible watermarking algorithm for 2D-vector maps
    Men C.
    Cao L.
    Sun J.
    [J]. Gaojishu Tongxin/Chinese High Technology Letters, 2010, 20 (04): : 342 - 348
  • [39] A normalization-based watermarking scheme for 2D vector map data
    Haowen Yan
    Liming Zhang
    Weifang Yang
    [J]. Earth Science Informatics, 2017, 10 : 471 - 481
  • [40] A technique for digital watermarking in combined spatial and transform domains using chaotic maps
    Anees, Amir
    Siddiqui, Adil Masood
    [J]. 2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 119 - 124