DOI QR코드

DOI QR Code

High-Capacity and Robust Watermarking Scheme for Small-Scale Vector Data

  • Tong, Deyu (College of Information Engineering, Nanjing University of Finance and Economics) ;
  • Zhu, Changqing (Key Laboratory of Virtual Geographic Environment (Nanjing Normal University), Ministry of Education) ;
  • Ren, Na (Key Laboratory of Virtual Geographic Environment (Nanjing Normal University), Ministry of Education) ;
  • Shi, Wenzhong (Department of Land Surveying and Geo-Informatics, The Hong Kong Polytechnic University)
  • Received : 2018.07.04
  • Accepted : 2019.07.04
  • Published : 2019.12.31

Abstract

For small-scale vector data, restrictions on watermark scheme capacity and robustness limit the use of copyright protection. A watermarking scheme based on robust geometric features and capacity maximization strategy that simultaneously improves capacity and robustness is presented in this paper. The distance ratio and angle of adjacent vertices are chosen as the watermark domain due to their resistance to vertex and geometric attacks. Regarding watermark embedding and extraction, a capacity-improved strategy based on quantization index modulation, which divides more intervals to carry sufficient watermark bits, is proposed. By considering the error tolerance of the vector map and the numerical accuracy, the optimization of the capacity-improved strategy is studied to maximize the embedded watermark bits for each vertex. The experimental results demonstrated that the map distortion caused by watermarks is small and much lower than the map tolerance. Additionally, the proposed scheme can embed a copyright image of 1024 bits into vector data of 150 vertices, which reaches capacity at approximately 14 bits/vertex, and shows prominent robustness against vertex and geometric attacks for small-scale vector data.

Keywords

1. Introduction

 As an important data type and form of geographic information system (GIS), geographical vector data have been widely used for research in many industries. Due to the high accuracy and copyright value of vector data, data piracy and leakage have become security issues that severely threaten data owners. Although the study of GIS has moved into the big data era [1, 2], the data volume of geographical vector data may be very small, e.g., tiled vector map used in online map service, observation points near country borders and objects in military usage, etc. The low volume feature makes the vector data easier to duplicate, distribute and modify. Hence, it is important to protect the copyright of vector data, especially for small-scale data.

 Digital watermarking is an effective method for copyright identification and usage tracking, which means embedding copyright information into media secretly without degrading data fidelity [3, 4]. It has been studied and applied in copyright protection for a variety of multimedia data [5-12], including vector data [13-30]. However, in terms of small-scale vector data, both the watermarking capacity and robustness have been the key factors in watermarking algorithm research. The watermarking capacity determines whether the copyright information can be successfully embedded into small-scale data, while the robustness provides the watermark resistance against various kinds of attacks. Although some researches concerning about watermarking vector data have been conducted, the robustness and watermark capacity are not sufficiently high and applicable for small-scale vector data. The detailed analysis of this drawback is clarified in section 2.

 To improve the capacity and robustness of watermarking algorithm for small-scale vector data, a high-capacity and robust watermarking scheme is proposed in this paper. The main contributions are summarized as follows:

 (1) The distance ratio and angle formed by adjacent vertices are chosen as the robust geometric features carrying watermark information. As the stability of the geometric features under vertex attacks and geometric attacks, the proposed watermarking algorithm is essentially robust against those attacks.

 (2) The capacity-improved strategy is proposed based on quantization index modulation (QIM) and geometric constraints. By dividing more intervals in QIM and optimizing the interval parameter under constraints, the capacity is increased into a much higher level.

 The remaining parts of this paper are arranged as follows. In section 2, the related work is reviewed. Section 3 discusses and analyzes the robust geometric features, where watermark is embedded and extracted. The capacity-improved strategy is proposed in section 4, and its optimization is given in section 5. Based on the robust geometric features and capacity-improved strategy, the proposed watermarking scheme is demonstrated in section 6, and the experimental results are presented in section 7. Finally, conclusions are drawn in section 8.

 

2. Related Work

 The watermarking method consists of three steps. First, the data is converted in watermark domain and watermark is embedded into it. Then, watermarked data is distributed or shared by its owners. Finally, if there is any suspect data, watermark is extracted from its watermark domain and copyright identification is realized according to the extracted watermark. The whole procedure is illustrated in Fig. 1.

E1KOBZ_2019_v13n12_6190_f0001.png 이미지

Fig. 1. The watermarking procedure

 From the perspective of embedding domain, watermarking algorithms for vector data can be divided into the spatial domain and the transformation domain. Watermarking algorithms based on spatial domain embed watermark into spatial coordinates [15, 16, 18, 20, 23, 28, 31], statistical indices [14, 32-34], metric measurements [22], angles [35], areas [36], arc lengths [25], geometric coordinates [26, 37, 38], etc. Generally, watermarking methods considering geometric feature factors have more resistance against rotation, scaling and translation (RST) attack. Furthermore, transformation-based watermarking methods embed watermark in the coefficients after transformations such as discrete Fourier transformation [26, 37, 38] and discrete wavelet transformation [19]. Transformation-based methods are more robust against several types of global attack, including noise addition or filtering. Apart from the embedding domain, these research also proposed different embedding strategies to enhance the watermark robustness against various types of attack.

 It can be seen from the above research, more attention has been paid on robustness rather than watermark capacity. As another key factor of watermarking schemes, watermark capacity determines how many watermark bits can be embedded into the small-scale vector data. Commonly, the capacity is measured as the number of bits that each vertex can provide. If the watermarking capacity is low, the copyright information cannot be completely embedded in small-scale vector data, which leads to watermark extraction failure.

 Until now, few researchers contributed to the study of high-capacity watermarking. Wang compressed watermark with vertex properties and embed them into coordinates directly with the capacity of nearly 0.3 bits/vertex [18]. Yamada offered an embedding strategy that inserts new vertices into polylines; the capacity reached 500 bytes for less than 500 vectors [20]. In fact, this mechanism can provide an arbitrary capacity as long as the accuracy is high enough. However, inserting new vertices changes the vertex number and increases the data volume, making it easy to remove the embedded watermark and degrading data fidelity. Cao proposed a watermarking strategy which embeds watermark iteratively into the median value of coordinate sequence [32, 34]. The capacity of this method exceeded 5 bits/vertex with some visible distortions. The methods provided in [23, 33] embed watermarks according to a histogram of the coordinates and result in a capacity of approximately 0.8 bits/vertex. Xiao improved the quantization modulation scheme by setting more quantization intervals, which resulted in a capacity of 2 bits/vertex [28]. Wang split the distance into several intervals to represent more state values [26]. In this scheme, each vertex can carry at least 2 bits, and the capacity is proportional to the number of subintervals.

 However, the problems of watermarking small-scale vector data, namely the watermark capacity and robustness, have not been comprehensively addressed. Most of the previous methods, either focusing on robustness [13-15, 19, 21, 22, 25] or reversibility [18, 23, 28, 33], fail to handle small-scale vector data as the capacity less than 4 bits/vertex. For example, embedding a 32×32 binary image into a vector data with 150 vertices is difficult for them. Although the capacity of some proposed watermark schemes is high enough for small-scale vector data [26, 32, 34], low robustness of those watermarking schemes means that watermark cannot be properly extracted after data manipulation. This is because the embedding strategies or domains of them, attaching importance to reversibility [18, 23, 26, 32-34], are not resisted towards attacks including vertex deletion, vertex insertion, vertex update, rotation, etc. Hence, the high watermark capacity and robustness have not been achieved at the same time to watermark small-scale vector data.

 In this paper, a watermarking algorithm intended for improving watermark capacity and robustness simultaneously have been studied and verified.

 

3. Robust Geometric Features

3.1 Features Chosen

 Prior to study watermark embedding strategies, the watermark embedding domain or position needs to be studied first. Several high-capacity watermarking methods directly embed watermarks into the coordinates of vector data. In contrast with these embedding domains, geometric features are considered in the proposed watermarking method. Here, the distance ratio and angle of adjacent lines are chosen to carry the watermark information.

 According to the structure of the geographical vector data, polylines are similar to polygons; hence, the features are easily determined by their adjacent relationship in topology. For discrete points, the adjacent relationship can refer to the object index in data file. Specifically, the distance ratio and angle of adjacent polylines are denoted as R and A, respectively. P represents a polyline, polygon or a set of points. Suppose P consists of n vertices recorded as \(V_{i}\left(x_{i}, y_{i}\right)(i=1,2, \dots, n)\) , where   and xi  are yi the coordinates of each vertex. Then, the computation of the distance ratio \(R_{i}(i=2,3, \dots, n-1)\)  is:

\(R_{i}=\frac{\left|V_{i} V_{i+1}\right|}{\left|V_{i-1} V_{i}\right|}=\frac{\sqrt{\left(x_{i+1}-x_{i}\right)^{2}+\left(y_{i+1}-y_{i}\right)^{2}}}{\sqrt{\left(x_{i}-x_{i-1}\right)^{2}+\left(y_{i}-y_{i-1}\right)^{2}}}\)       (1)

and the computation of angle   is:

\(\begin{array}{c}A_{i}=\angle V_{i-1} V_{i} V_{i+1}=\arccos \left(\frac{\overrightarrow{V_{i} V_{i-1}} \cdot \overrightarrow{V_{i} V_{i+1}}}{\left|V_{i} V_{i-1}\right| \times\left|V_{i} V_{i+1}\right|}\right) \\=\arccos \left(\frac{\left(x_{i-1}-x_{i}\right)\left(x_{i+1}-x_{i}\right)+\left(y_{i-1}-y_{i}\right)\left(y_{i+1}-y_{i}\right)}{\sqrt{\left(x_{i-1}-x_{i}\right)^{2}+\left(y_{i-1}-y_{i}\right)^{2}} \sqrt{\left(x_{i+1}-x_{i}\right)^{2}+\left(y_{i+1}-y_{i}\right)^{2}}}\right)\end{array}\)       (2)

 Fig. 2 illustrates these features.

E1KOBZ_2019_v13n12_6190_f0002.png 이미지

Fig. 2. Illustration of the distance ratio and the angle of the adjacent lines

 

3.2 Feature Properties

 In the proposed watermarking scheme, the distance ratio R and the angle A carry watermark information because watermark capacity and robustness are related to their characteristics. These feature properties are discussed and analyzed here.

 1) Independence. The distance ratio and angle provide two types of watermark carriers. As watermark embedding changes the feature values, conflicts caused by the changes should be avoided. Otherwise, watermarks will be embedded improperly due to conflicts. Thus, the independence of the features should be guaranteed first.

 To clearly demonstrate the independence of the distance ratio and angle, polar coordinates are used instead of Cartesian coordinates. The symbols used in Fig. 2 are also used here. For each distance ratio Ri and angle Ai, the origin of the polar coordinate is set to point Vi, and the unit length is \(\left|V_{i} V_{i-1}\right|\) . Then, the coordinates of Vi+1  are \(\left(R_{i}, A_{i}\right)\)  . Consequently, the process of watermark embedding changes \(V_{i+1}\left(R_{i}, A_{i}\right) \text { to } V_{i+1}^{\prime}\left(R_{i}+\Delta R, A_{i}+\Delta A\right)\) . As polar coordinates can be mapped into Cartesian coordinates, the position of the watermarked vertex \(V_{i+1}^{\prime}\)  can be determined accurately and uniquely. From this perspective, the independence of the distance ratio from the angle is clarified clearly.

 2) Robustness against geometric attack. Common geometric attacks of GIS vector data include translation, scaling and rotation. It is easy to deduce that the distance ratio and angle of adjacent lines are invariant in these geometric transformations. Then, for each vertex Vi, the watermarked coordinates \(V_{i+1}^{\prime}\left(R_{i}+\Delta R, A_{i}+\Delta A\right)\)  remain unchanged and the watermark can be extracted without distortion. Hence, the features essentially and naturally provide robustness against geometric attacks.

 3) Robustness against vertex attacks. Vertex editing is widely used to process GIS vector data, which affects watermark extraction. Common vertex attacks include vertex deletion, vertex insertion and vertex update. These three types of attacks are shown in Fig. 3–5.

E1KOBZ_2019_v13n12_6190_f0003.png 이미지 

Fig. 3. Vertex deletion attack

E1KOBZ_2019_v13n12_6190_f0004.png 이미지 

Fig. 4. Vertex insertion attack

E1KOBZ_2019_v13n12_6190_f0005.png 이미지 

Fig. 5. Vertex update attack

 For the vertex deletion attack in Fig. 3, the deletion of vertex Vi will only change the original distance ratios \(\frac{\left|V_{i-1} V_{i}\right|}{\left|V_{i-2} V_{i-1}\right|}, \frac{\left|V_{i} V_{i+1}\right|}{\left|V_{i-1} V_{i}\right|}, \frac{\left|V_{i+1} V_{i+2}\right|}{\left|V_{i} V_{i+1}\right|}\)   and the angles \(\angle V_{i-2} V_{i-1} V_{i}, \angle V_{i-1} V_{i} V_{i+1}, \angle V_{i} V_{i+1} V_{i+2}\) ; the other features remain the same. In watermark extraction, incorrect watermark information will be extracted by distance ratios \(\frac{\left|V_{i-1} V_{i+1}\right|}{\left|V_{i-2} V_{i-1}\right|}, \frac{\left|V_{i+1} V_{i+2}\right|}{\left|V_{i-1} V_{i+1}\right|}\)  and angles \(\angle V_{i-2} V_{i-1} V_{i}, \angle V_{i-2} V_{i-1} V_{i}\). However, this type of error, which can be reduced or eliminated by the mapping mechanism of the proposed scheme in section 6, is not considered here. The analysis here focuses on the remaining watermark capacity after attacks. If a geometric object P consists of n vertices \(V_{i}(i=1,2, \dots, n)\) , the watermark capacity that each distance ratio and angle can provide is denoted as a and b bits, respectively. Then, the watermark capacity provided by P is \((a+b)(n-5)\)  bits. After the watermarked vertex \(V_{i}(i=3,4, \dots n-2, n \geq 5)\)  is deleted, the remaining watermark capacity provided by P is \((a+b)(n-5)\)  bits. If m consequent vertices have been deleted in P, the watermark capacity becomes \((a+b)(n-m-4)\)  bits. In the worst situation, the watermark capacity is still greater than \((a+b)(n-3 m-2)\)  bits after deleting m vertices from each interval containing 3 vertices (e.g., the vertices \(V_{3 i}(i=1,2, \dots m)\)  are deleted). This nearly linear relationship demonstrates that the features are robust against vertex deletion.

 The features robustness against vertex insertion and updating are analyzed in the same way. For vertex insertion attack, inserting n consequent vertices reduces the capacity to \((a+b)(n-4)\)  bits, which is a constant value. For vertex update attacks, the relationship between the updated vertex count and capacity is the same as that of vertex deletion. Hence, the watermark capacity with a number of inserted or updated vertices is also nearly linearly dependent.

 Taking these properties into consideration, the distance ratio and angle are robust against geometric and vertex attacks. Hence, in the proposed watermarking scheme, watermark will be embedded in these features, which carry watermark in a stable and robust way.

 

4. Capacity-Improved Watermarking Strategy

 In the proposed watermarking scheme, watermark is embedded in and extracted from the features mentioned above. Quantization index modulation (QIM), which proves to be effective and robust [39], is adopted as the watermark embedding and extracting method. As the watermark capacity is limited for small-scale vector data, a capacity-improved watermarking strategy based on QIM is studied here to embed as much watermark as possible.

4.1 Introduction to QIM

 QIM divides the value space into two types of intervals, where each interval represents a watermark value, and modulates the original value into the section corresponding to the embedded watermark value. Specifically, if a binary watermark bit \(w(w \in\{0,1\})\)  is embedded into the numerical value c and the quantization interval length is l, then the numerical value c is modulated to c’ according to:

\(\left\{\begin{array}{ll}c^{\prime}=c & \text { if } x \% 2 l       (3)

 Here, % represents the modulo operation. The watermark embedding process based on QIM is illustrated in Fig. 6.

E1KOBZ_2019_v13n12_6190_f0006.png 이미지

Fig. 6. Illustration of the watermark-embedding process based on QIM

 Then, the watermark bit w can be extracted by:

\(\left\{\begin{array}{l} w=0 \text { if } c^{\prime} \% 2 l<l \\ w=1 \text { if } c^{\prime} \% 2 l \geq l \end{array}\right.\)     (4)

 

4.2 Capacity-Improved QIM

 The two types of intervals in QIM correspond to the binary watermark bits. To carry more watermark bits, the value range can be divided into more types of intervals with shorter lengths. When the number of interval types changes from 2 to k, the corresponding watermark becomes \(w(w \in\{0,1,2, \ldots, k-1\})\) . Then, the watermark embedding process using QIM is expected to modulate the value from current interval into watermark value interval. For example, the original value c is laid on the interval representing value p, embedding watermark “2” means moving the value c into the interval indicating w = 2, which is shown in Fig. 7.

E1KOBZ_2019_v13n12_6190_f0007.png 이미지

Fig. 7. Illustration of embedding watermark “2” by capacity-improved QIM

 Generally, embedding the watermark \(w(w \in\{0,1,2, \ldots, k-1\})\)  into value c is the procedure that first calculates the value p indicated by the current interval:

\(p=\left\lfloor\frac{c-\left\lfloor\frac{c}{k l}\right\rfloor \times k l}{l}\right\rfloor\)       (5)

and then modulate value c into c':

\(c^{\prime}=c+l \times(w-p)\)       (6)

 The operation \(\lfloor \rfloor\)  rounds the number down to the nearest integer.

 Then, extracting watermark \(w(w \in\{0,1,2, \ldots, k-1\})\)  from value c’ yields:

\(w=\left\lfloor\frac{c^{\prime}-\left\lfloor\frac{c^{\prime}}{k l}\right\rfloor \times k l}{l}\right\rfloor\)       (7)

 Hence, the capacity-improved QIM increases the watermark capacity from 1 bit to   bits for each watermarked value c’.

 

4.3 Distortion Reduction

 In the embedding process of capacity-improved QIM, the maximum distortion on numerical value c is kl because the modulation is only in one direction according to Equation (6). To further enhance the watermark capacity under the same distortion tolerance, the embedding process can be optimized to modulate in dual directions, as the intervals are repeated and continuous along the value axis. For example, if the original value c laid on the interval representing value p, embedding watermark “1” is to move the value c into the interval indicating w = 1, the moving direction is determined by the shortest modulation length. The modulation process is shown in Fig. 8.

E1KOBZ_2019_v13n12_6190_f0008.png 이미지

Fig. 8. Modulation by reducing distortions

 In this circumstance, the maximum distortion \(\Delta_{\max }\)  for each watermarked value is reduced to:

\(\Delta_{\max }=\left\lfloor\frac{k}{2}\right\rfloor l\)       (8)

 Generally, the modulation of distortion reduction is expressed as:

\(\left\{\begin{array}{l} c^{\prime}=c+(w-p) \times l \text { if }|p-w| \leq\left\lfloor\frac{k}{2}\right\rfloor \\ c^{\prime}=c+(w-p+k) \times l \text { if } w-p+k \leq\left\lfloor\frac{k}{2}\right\rfloor \text { and } p \geq w \\ c^{\prime}=c+(w-p-k) \times l \text { if } p-w+k<\left\lfloor\frac{k}{2}\right\rfloor \text { and } p<w \end{array}\right.\)    (9)

 The extraction formula is the same as Equation (7). If the distortion tolerance stays the same, then the maximum capacity will increase 1 bit for each watermarked value c’ compared with the method in section 4.2.

 

5. Capacity Maximization under Constraints

5.1 Two Constraints

 The distance ratio R and angle A studied in section 3 are used to carry information, and the distortion-reduced QIM discussed in section 4.3 is adopted to embed watermark into these features. However, the watermark capacity cannot be infinitely large and is strictly constrained by two aspects: numerical accuracy limitations and vector data tolerance. Hence this section mainly consider how to maximize the capacity under the constraints.

 The numerical accuracy limitation is due to the finite precision of the floating number in computer systems. Specifically, numerical accuracy is denoted as  . If the floating numbers x1  and x2  satisfy \(\left|x_{1}-x_{2}\right|<\gamma\) , then these two numbers are considered to be equal in computer systems \(\left(x_{1}=x_{2}\right)\). In the process of embedding watermarks, the numerical accuracy implies that the minimum interval l in QIM should meet the requirement:

\(l \geq \gamma\)       (10)

 The vector data tolerance means that after embedding watermark, the modifications of the vertex coordinates should be limited in a small range. Otherwise, the usability of vector data will be cracked. The vector data tolerance is denoted as T   . If the vertex becomes V'(x',y')  after watermarking, it should satisfy:

\(\sqrt{\left(x^{\prime}-x\right)^{2}+\left(y^{\prime}-y\right)^{2}} \leq \tau\)       (11)

 

5.2 Capacity-Improved QIM under Constraints

 Considering the above constraints, the parameters in distortion-reduced QIM would be optimized to maximize the watermark capacity. Suppose the original distance ratio R and the angle A become R’ and A’ after watermark embed, the vertices related to R and A are then denoted as \(V_{1}\left(x_{1}, y_{1}\right), V_{2}\left(x_{2}, y_{2}\right)\) and  \(V_{3}\left(x_{3}, y_{3}\right)\). Besides, the coordinates of vertex V1 and V2 remain invariant and vertex \(V_{3}\left(x_{3}, y_{3}\right)\)  becomes \(V_{3}^{\prime}\left(x_{3}^{\prime}, y_{3}^{\prime}\right)\). The modulations of R and A are denoted as \(\Delta R\) and \(\Delta A\left(\Delta A \ll \frac{\pi}{2}\right)\), respectively. Because there are each two directions of modulation on R and A, the spatial relationship between watermarked vertex  \(V_{3}^{\prime}\left(x_{3}^{\prime}, y_{3}^{\prime}\right)\)  and original vertex  has four possible situations. In each situation, the watermarked vertex \(V_{3}^{\prime}\left(x_{3}^{\prime}, y_{3}^{\prime}\right)\)  is denoted as \(v_{1}, v_{2}, v_{3}, v_{4}\)  respectively, as shown in Fig. 9.

E1KOBZ_2019_v13n12_6190_f0009.png 이미지

Fig. 9. The modulation of vertex V3

 In Fig. 9, the auxiliary points M and N are labeled, which means the modulation moves  V3 to M or N first and then moves N to v1  or v2 . In addition, M is moved to v3 or v4 . Hence, because \(\left|V_{2} V_{3}\right|=\left|V_{2} M\right|=\left|V_{2} N\right|=R\left|V_{1} V_{2}\right|\)  and the length of \(\left|N v_{1}\right|\)  is denoted as  \(\Delta l\), there is \(\left|N v_{1}\right|=\left|N v_{2}\right|=\left|M v_{3}\right|=\left|M v_{4}\right|=\Delta l=\Delta R\left|V_{1} V_{2}\right|\) .

 According to the law of sines:

\(\left|V_{3} N\right|=\frac{\sin \Delta A\left|V_{2} V_{3}\right|}{\sin \left(\frac{\pi-\Delta A}{2}\right)}\)       (12)

and based on the law of cosines, the distance between \(V_{3}\)  and \(v_{1}, v_{2}, v_{3}, v_{4}\)  is calculated as:

\(\left|V_{3} v_{1}\right|=\left|V_{3} v_{3}\right|=\sqrt{\Delta l^{2}+\left|V_{3} N\right|^{2}-2 \Delta l\left|V_{3} N\right| \cos \left(\frac{\pi-\Delta A}{2}\right)}\)       (13)

\(\left|V_{3} v_{2}\right|=\left|V_{3} v_{4}\right|=\sqrt{\Delta l^{2}+\left|V_{3} N\right|^{2}-2 \Delta l\left|V_{3} N\right| \cos \left(\frac{\pi+\Delta A}{2}\right)}\)       (14)

 The interval lengths of the modulation on distance ratio R and angle A are denoted as lg  and lA , and the interval counts are kR  and kA , respectively. According to the analysis in section 4.2, the maximum capacity for each vertex is \(\left\lfloor\log _{2} k_{R}\right\rfloor+\left\lfloor\log _{2} k_{A}\right\rfloor\)  . Considering the numerical accuracy constraint and vector data tolerance, the optimization of maximizing watermark capacity is:

\(\max \left\lfloor\log _{2} k_{R}\right\rfloor+\left\lfloor\log _{2} k_{A}\right\rfloor\)       (15)

\(\text {s.t. } l_{R} \geq \gamma, l_{A} \geq \gamma\)       (16)

\(\gamma \leq\left|V_{3} v_{1}\right| \leq \tau, \gamma \leq\left|V_{3} v_{2}\right| \leq \tau\)       (17)

\(l_{R} \leq \Delta R \leq\left\lfloor\frac{k_{R}}{2}\right\rfloor l_{R}, l_{A} \leq \Delta A \leq\left\lfloor\frac{k_{A}}{2}\right\rfloor l_A \)       (18)

 When   is very small [26] (e.g.10-10  ),  \(\sin \gamma \approx \gamma\) and  \(\cos \gamma \approx 1\). Hence,  \(\left|V_{3} v_{1}\right|=\left|V_{3} v_{2}\right|\) and Equation (17) is converted to:

\(\gamma \leq \sqrt{\Delta R^{2}+\Delta A^{2} R^{2}}\left|V_{1} V_{2}\right| \leq \tau\)       (19)

 It is clear that the capacity becomes maximized when \(l_{R}=\gamma, l_{A}=\gamma\)  because \(\left|V_{2} V_{3}\right|=R\left|V_{1} V_{2}\right|\) . Thus, Equation (19) equals:

\(\sqrt{\left[\frac{k_{R}}{2}\right]\left|V_{1} V_{2}\right|^{2}+\left\lfloor\frac{k_{A}}{2}\right\rfloor\left|V_{2} V_{3}\right|^{2}} \leq \frac{\tau}{\gamma}\)       (20)

 From Equation (20), the interval counts kR  and KA  are related to the lengths of the adjacent lines \(\left|V_{1} V_{2}\right|\)  and \(\left|V_{2} V_{3}\right|\) .

 

5.3 Optimization Solution

 Theoretically, the optimization of Equation (15) under the constraints in Equation (20) is related to the vector data properties, meaning that the vector data should be analyzed first. Moreover, if kR  and kA  are determined from specific vector data, these parameters must be stored in the watermark extraction process so the watermarking scheme is not fully blind. To directly and conveniently use the specific parameters kR and kA , the optimization solution based on the common properties of vector data is given as follows.

 In the extreme situation when both \(\left|V_{1} V_{2}\right|\)  and  \(\left|V_{2} V_{3}\right|\) achieve the maximum length, then:

\(\max \left|V_{1} V_{2}\right|=\max \left|V_{2} V_{3}\right| \leq \alpha \tau\)       (21)

where parameter \(\alpha\)  is the maximum line length Lmax  divided by vector data tolerance \(\tau\) :

\(\alpha=\frac{L_{\max }}{\tau}\)       (22)

 The interval counts kR  and kA   are then calculated by:

\(k_{R}=k_{A} \leq \frac{1}{\alpha^{2} \gamma^{2}}+1\)       (23)

 Parameter \(\alpha\)  can be determined empirically by considering extreme situations. First, assume the map scale of vector data is small. For example, for vector data of China with a map scale of 1:1 000 000 in the geographic coordinate system, the maximum distance of the adjacent vertices is often less than 5°. According to the map standards [40], map tolerance is usually no higher than  ; in this situation, parameter \(\alpha\)=103 . Another situation is when the map scale becomes large, such as a residential area with a map scale of 1:1000 in the projected coordinate system. In this case, the maximum distance of the adjacent vertices is often less than 7500 m, and the map tolerance is often smaller than 0.1 m. Parameter \(\alpha\)  is then determined as \(7.5 \times 10^{4}\) . Combining these two situations, the larger value \(7.5 \times 10^{4}\) , which satisfies the stronger requirement, is a candidate value for parameter \(\alpha\).

 For the numerical accuracy \(\gamma\) , Wang suggested that  \(\gamma=10^{-15}\)  [26]. The number 15 may be deduced from the IEEE 754 specifications [41]. Here, a stricter condition is considered when the integer part of a number exceeds 107 in the project coordinate system. Thus, the numerical accuracy  \(\gamma\) becomes 10-8. In addition, some of the least significant digits may change under data manipulation, such as vector data format exchange. Hence, to ensure accuracy, two least significant digits are eliminated and \(\gamma\)  is determined as 10-6.

 When \(\alpha=7.5 \times 10^{4}\)  and \(\gamma=10^{-6}\) , the interval counts are calculated by:

\(k_{R}=k_{A} \leq \frac{1}{\alpha^{2} \gamma^{2}}+1 \approx 179\)       (24)

 When \(k_{R}=k_{A}=2^{n}, n \in Z\) , the watermark capacity denoted by Equation (15) is an integer. For convenience in computation, the candidate values for the interval counts kR  and kA  are both 128. The theoretical watermark capacity then becomes 14 bits/vertex.

 

6. Watermarking Scheme

6.1 Watermark Embedding

 Watermark embedding consists of the following steps:

 1) Convert the binary watermark information into a sequence W based on \(\beta \)\(\beta=\left\lfloor 1+\log _{2} k_{R}\right\rfloor\) . The watermark sequence W then becomes \(W=\left\{w_{j}, j=0,1,2, \dots, M-1\right\}\)  with \(w_{j} \in\{0,1,2, \ldots, \beta-1\}\) , and M denotes the watermark length.

 2) Read the vertices sets \(V_{i}(i=1,2, \dots, n)\)  of the vector data. For discrete points, read the vertices in the storage order.

 3) Starting from i=2 , calculate the distance ratio Ri and angle Ai according to Equations (1) and (2).

 4) The mapping mechanism is used to establish a robust relationship between the embedded watermark index j and embedded domain. First, obtain the first q digits IRi from Ri, which means:

\(I R_{i}=\left\lfloor R_{i} \times 10^{q}\right\rfloor\)       (25)

 Five is a candidate value for q to distinguish the first q digits of Ri with other numbers. Then, the relationship between IRi and the watermark index j is established by:

\(j=h a s h\left(I R_{i}\right) \% M\)       (26)

where hash is a random hash function, for example, the Logistic chaos function. The relationship between IAi and the watermark index j is established in the same way.

 5) Embed the watermark wj into Ri using the capacity-improved QIM strategy according to Equation (9). The interval counts and length are the same as those provided in section 5.3. Ai is then embedded in the same way. After watermark embedding, Vi+1  is moved to V'i+1 .

 6) Update  Vi+1 with  V'i+1  in the vertex sets \(V_{i}(i=1,2, \dots, n)\)  and continue to embed until all the vertices have been watermarked.

 

6.2 Watermark Extraction

 The watermark extraction procedure is the inverse of the watermark-embedding procedure and consists of the following steps:

 1) Read the vertices sets \(V_{i}(i=1,2, \dots, n)\)  and perform the calculations in the same way as for watermark embedding.

 2) Starting from i=2 , calculate the distance ratio Ri and the angle Ai according to Equations (1) and (2).

 3) Establish the same mapping mechanism as that in watermark embedding. Parameter q is also the same here.

 4) Extract the watermark value according to Equation (7) and the watermark index j using the mapping mechanism. Record the extracted watermark information.

 5) For each watermark index j, the corresponding watermark value is determined by the larger count of records. Combining this majority principle and the mapping mechanism, the error introduced by the new generated features mentioned in section 3.2 is reduced to a minor level.

 6) Convert the extracted watermark sequence into binary information and determine the copyright of the vector data.

 

7. Experimental and Analysis

 Experiments have been conducted to verify the imperceptibility, capacity and robustness of the proposed watermarking scheme. The experiments are performed mainly on ArcMap 10.4 and MATLAB 2016a.

7.1 Experimental Data

 In the experiments, two small-scale vector datasets and one medium-scale vector dataset, denoted as Data(A), Data(B) and Data(C), respectively, are used to carry the watermarks. The experimental data properties are listed in Table 1.

Table 1. The experimental data properties.

E1KOBZ_2019_v13n12_6190_t0001.png 이미지

 The experimental data are shown in Fig. 10.

E1KOBZ_2019_v13n12_6190_f0010.png 이미지

Fig. 10. The experimental data: (a) Data(A); (b) Data(B); (c) Data(C)

 A 32×32 binary image, shown in Fig. 11, is used as the copyright image in the experiment.

E1KOBZ_2019_v13n12_6190_f0011.png 이미지

Fig. 11. The copyright image

 

7.2 Extracted Watermark

 Using the proposed watermarking method, the copyright image is embedded in the experimental data and then extracted. The correctness ratio (CR), is defined here to measure the similarity between the extracted copyright image and the original. If  \(W^{\prime}=\left\{w_{j}^{\prime}, j=0,1,2, \dots, M-1\right\}\) represents the extracted watermark and the original watermark is \(W=\left\{w_{j}, j=0,1,2, \dots, M-1\right\}\) , then the index CR is deduced from the bit error ratio (BER) and is calculated as:

\(C R=1-B E R=\frac{1}{M} \sum_{i=1}^{M} X N O R\left(w^{\prime}[i], w[i]\right)\)       (27)

where XNOR  represents the exclusive OR operation. The extracted watermarks and their CRs are shown in Table 2.

Table 2. The extracted watermarks.

E1KOBZ_2019_v13n12_6190_t0002.png 이미지

 According to the extracted watermark results, although some minor differences exist in the watermark image extracted from Data(A), its content can be easily recognized, and the CR is greater than 0.9. Hence, the proposed watermarking method can embed most of the watermark image into the vector data of only 100 vertices and identify the copyright successfully. The extracted watermark for Data(B) demonstrates that the proposed watermarking method can embed and extract the copyright image without error when the vertex count slightly increases. Additionally, the method is also applicable to medium-scale or large-scale vector data, as deduced from the result of Data(C).

 

7.3 Imperceptibility

 The watermarked experimental data are shown in Fig. 12.

E1KOBZ_2019_v13n12_6190_f0012.png 이미지

Fig. 12. Watermarked experimental data: (a) Watermarked Data(A); (b) Watermarked Data(B); (c) Watermarked Data(C)

 No visual difference can be seen between the watermarked data in Fig. 12 and the original data in Fig. 10. To quantitatively measure the distortions introduced by the watermark, statistical indices, including maximum (Max), mean (Mean), and standard deviation (Std), are calculated according to the spatial distances between the watermarked vertices and the original vertices. Table 3 lists the statistical results.

Table 3. Distortion Statistics.

E1KOBZ_2019_v13n12_6190_t0003.png 이미지

 From the distortion statistics, it is clear that the maximum distortions introduced by the watermark are far below the accuracy tolerances. In addition, the distortions remain stable according to the standard deviations. For the geographic coordinate system, the distortion is very small and satisfies the accuracy requirement because the proposed capacity-improved QIM strategy takes the distortions into consideration and controls the maximum distortion to be strictly less than the data tolerance. Hence, the effectiveness in error control and the superior imperceptibility of the proposed watermarking method have been proven.

 

7.4 Capacity

 For the capacity experiments, the small-scale Data(B) is chosen to delete or insert vertices to generate small-scale data consisting of 100, 150, 200 and 300 vertices. After embedding and extracting the watermark, the CR of the extracted image and the capacity are calculated according to the vertex count and the embedded watermark bits. Thus, the capacity index is measured based on the number of bits/vertex. The comparison methods include two high-capacity watermarking methods and two robust watermarking methods. The high-capacity watermarking methods are described in [26] and [34] and are denoted as Method(A) and Method(B), respectively. The robust methods are referred to in [25] and [38] and are denoted as Method(C) and Method(D), respectively. To apply the same conditions of data tolerance and numerical accuracy, the value of parameter c is set to 4 in Method(A) and the value of t is set to 10 in Method(B). The value of parameter m in Method(C) is set to 1 to increase the capacity. The experimental capacity results are listed in Table 4.

Table 4. Watermark capacity experimental results.

E1KOBZ_2019_v13n12_6190_t0004.png 이미지

 From Table 4, the proposed method can embed almost 14 watermark bits into each vertex, and the extracted watermark from data with 100 vertices is clear. Other high-capacity watermarking methods, including Method(A) and Method(B), the capacity index is lower than the proposed one. In addition, the watermark capacities of Method(C) and Method(D), which paid more attention to robustness, are lower than 2 bits/vertex. In conclusion, the proposed method outperforms the other methods in watermarking capacity.

 In fact, the key advantage of the proposed algorithm is the capacity-improved watermarking strategy. Unlike classical QIM only using two interval types, the capacity-improved watermarking strategy divides much more intervals to carry watermark information, meaning that each interval represents more watermark bits, instead of one bit. Based on the capacity maximization optimization, 128 interval types can contain approximately 7 bit watermark information in QIM. Thus the watermark capacity achieves 14 bits/vertex as angles and distance ratios both carry watermarks. Combine the theoretical analysis and experiment result, the proposed watermark method is proven to meet the capacity requirement of copyright protection for small-scale data.

 

7.5 Robustness

 In the robustness experiments, the robustness of the proposed method and the comparison algorithms is verified for small-scale and medium-scale vector data. The small-scale vector dataset Data(B) consists of 150 vertices and the medium-scale vector data Data(C) consists of 3079 vertices. The attack types are divided into vertex and geometric attacks. The vertex attacks consist of vertex deletion, vertex insertion and vertex updating, while geometric attacks include rotation, scaling and translation. Regarding the robustness index, CR is used to measure the robustness of different methods.

 

7.5.1 Robustness against Vertex Attacks for Small-Scale Vector Data

 The experimental results of robustness against vertex attack for small-scale Data(B) are shown in Fig. 13–15.

E1KOBZ_2019_v13n12_6190_f0013.png 이미지

Fig. 13. Robustness against vertex deletion for small-scale vector data

E1KOBZ_2019_v13n12_6190_f0014.png 이미지

Fig. 14. Robustness against vertex insertion for small-scale vector data

E1KOBZ_2019_v13n12_6190_f0015.png 이미지

Fig. 15. Robustness against vertex update for small-scale vector data

 From Fig. 13–15, it is obvious that the robustness of the proposed watermarking method is better than that of the compared methods. When no attack has been conducted on the watermarked data, the CR values of Method(A) and Method(B) are higher than those of Method(C) and Method(D) because the former methods are designed as high-capacity watermarking methods. However, when some degree of attacks, such as vertex deletion, vertex insertion or vertex update, has occurred on the watermarked data, the robustness of Method(A) and Method(B) decrease rapidly due to a lack of robustness against vertex attack. Although the decreases in the robustness of Method(C) and Method(D) are not severe, their watermark capacity limits the embedded watermark bits in small-scale vector data; thus, the CR values of these two methods are still not high enough.

 Moreover, the robustness of the proposed watermarking method outperforms other methods because the combination of robust geometric features and capacity-improved strategy has been used. From the experimental results, the decline of the proposed method robustness is slow and nearly linear, which is consistent with the analysis results presented in section 3.2. Furthermore, this phenomenon proves that the incorrectly extracted watermark bits introduced by vertex attacks are reduced, as mentioned in section 3.2. In summary, the robustness of the proposed watermarking method has been verified by experiments when applied to small-scale vector data.

7.5.2 Robustness against Vertex Attacks for Medium-scale Vector Data

 The experimental results of robustness against vertex attack for medium-scale Data(C) are shown in Fig. 16–18.

E1KOBZ_2019_v13n12_6190_f0016.png 이미지

Fig. 16. Robustness against vertex deletion for medium-scale vector data

E1KOBZ_2019_v13n12_6190_f0017.png 이미지

Fig. 17. Robustness against vertex insertion for medium-scale vector data

E1KOBZ_2019_v13n12_6190_f0018.png 이미지

Fig. 18. Robustness against vertex update for medium-scale vector data

 When handling medium-scale vector data, the superiority of the robustness of the proposed watermarking method can also be deduced from Fig. 16–18. For example, after deleting 60%, inserting 375% or updating 55% of the vertices, the CR of the proposed method is still higher than 0.9, which implies that the watermark is extracted successfully and identifies the copyright information clearly. However, in this situation, the CR of the other methods are lower than 0.9. Moreover, the maximized capacity watermarking strategy enables more watermark bits to be embedded compared to other methods. Thus, the redundancy of the watermark bits will help the watermarking method resist vertex attacks.

 

7.5.3 Robustness against Geometric Attacks

 As geometric transformations are other common operations used for vector data, robustness against them is vital when evaluating the watermarking method. The robustness of the proposed method and the comparisons are shown in Table 5. The resistance to geometric attack is denoted as “√” or “×”, representing the robustness against attack or not, respectively.

Table 5. Robustness against geometric attack.

E1KOBZ_2019_v13n12_6190_t0005.png 이미지

 From Table 5, the proposed method and Method(C) are resistant towards translation, scaling or rotation attack, while the other methods are not completely robust against these attacks. The geometric attack results also demonstrate the high robustness of the proposed algorithm.

 Considering the above robustness experimental results, the superior robustness of the proposed method benefits from two aspects, naming the watermarking domain and watermarking strategy. The performance of watermark domain is analyzed in section 2, as the distance ratio and angle provide resistance against vertex attacks and geometric attacks. Besides, the capacity-improved watermarking strategy increases the embedded watermark bits in vector data. This means the higher watermark redundancy and probability of watermark extraction against vertex attacks. Thus, the whole algorithm robustness is improved by these two mechanisms at the same time.

 

8. Conclusion

 This paper presents a high-capacity and robust watermarking scheme for vector data aimed at copyright protection for small-scale vector data. The proposed watermarking scheme is based on the robust geometric features of vector data, which provide robustness against vertex and geometric attacks. A capacity maximization watermarking strategy is also proposed to improve capacity by optimizing the watermark-embedding parameters under the constraints of numerical accuracy and map tolerance. Experiments have been conducted to verify the effectiveness of the proposed watermarking scheme. The tiny map distortions introduced by the watermark demonstrate the good imperceptibility of the proposed scheme, as the error is strictly controlled by the watermarking strategy. Regarding the capacity, the proposed scheme can successfully embed an image of 1024 bits into vector data with 150 vertices, and the capacity reaches nearly 14 bits/vertex, which is superior to other high-capacity watermarking and robust schemes. In addition, the experimental results also prove that the proposed scheme is more robust against vertex deletion, vertex insertion, vertex update, rotation, scaling and translation attacks, than the other watermarking schemes. In conclusion, the proposed watermark scheme, which improves the watermark capacity and robustness simultaneously, is able to protect the copyright for small-scale vector data.

References

  1. J. Thatcher, "Big data, big questions| Living on fumes: Digital footprints, data fumes, and the limitations of spatial big data," International Journal of Communication, vol. 8, pp. 1765-1783, 2014.
  2. H. J. Miller and M. F. Goodchild, "Data-driven geography," GeoJournal, vol. 80, no. 4, pp. 449-461, 2015. https://doi.org/10.1007/s10708-014-9602-6
  3. G. C. Langelaar, I. Setyawan and R. L. Lagendijk, "Watermarking digital image and video data - a state-of-the-art overview," IEEE Signal Processing Magazine, vol. 17, no. 5, pp. 20-46, 2000. https://doi.org/10.1109/79.879337
  4. T. Hai, C. Li, J. M. Zain and A. N. Abdalla, "Robust image watermarking theories and techniques: A review," Journal of Applied Research and Technology, vol. 12, pp. 122-138, 2014. https://doi.org/10.1016/S1665-6423(14)71612-8
  5. P. Zhu, F. Jia and J. Zhang, "A copyright protection watermarking algorithm for remote sensing image based on binary image watermark," Optik, vol. 124, no. 20, pp. 4177-4181, 2013. https://doi.org/10.1016/j.ijleo.2012.12.049
  6. Q. Su and G. Wang, "An improved color image watermarking algorithm based on QR decomposition," Multimedia Tools and Applications, vol. 76, no. 1, pp. 707-729, 2017. https://doi.org/10.1007/s11042-015-3071-x
  7. G. Doerr and J. L. Dugelay, "A guide tour of video watermarking," Signal Processing-Image Communication, vol. 18, no. 4, pp. 263-282, 2003. https://doi.org/10.1016/S0923-5965(02)00144-3
  8. R. O. Preda and D. N. Vizireanu, "A robust digital watermarking scheme for video copyright protection in the wavelet domain," Measurement, vol. 43, no. 10, pp. 1720-1726, 2010. https://doi.org/10.1016/j.measurement.2010.07.009
  9. D. Kirovski and H. S. Malvar, "Spread-spectrum watermarking of audio signals," IEEE Transactions on Signal Processing, vol. 51, No. 4, pp. 1020-1033, 2003. https://doi.org/10.1109/TSP.2003.809384
  10. M. Arnold, X. Chen, P. Baum, U. Gries and G. Doerr, "A Phase-Based audio watermarking system robust to acoustic path propagation," IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 411-425, 2014. https://doi.org/10.1109/TIFS.2013.2293952
  11. H. M. Meral, B. Sankur, A. S. Ozsoy, T. Gungor and E. Sevinc, "Natural language watermarking via morphosyntactic alterations," Computer Speech and Language, vol. 23, no. 1, pp. 107-125, 2009. https://doi.org/10.1016/j.csl.2008.04.001
  12. K. Jawad and A. Khan, "Genetic algorithm and difference expansion based reversible watermarking for relational databases," Journal of Systems and Software, vol. 86, no. 11, pp. 2742-2753, 2013. https://doi.org/10.1016/j.jss.2013.06.023
  13. V. Solachidis and I. Pitas, "Watermarking polygonal lines using Fourier descriptors," IEEE Computer Graphics and Applications, vol. 24, no. 3, pp. 44-51, 2004. https://doi.org/10.1109/MCG.2004.1297010
  14. C. Shao, H. Wang, X. Niu and X. Wang, "A shape-preserving method for watermarking 2D vector maps based on statistic detection," IEICE Transactions on Information and Systems, vol. E89D, no. 3, pp. 1290-1293, 2006.
  15. P. Jia, Y. Chen, J. Ma and D. Zhu, "Digital watermark-based security technology for geo-spatial graphics data," Chinese Geographical Science, vol. 16, no. 3, pp. 276-281, 2006. https://doi.org/10.1007/s11769-006-0276-y
  16. Y. Pu, W. Du and I. Jou, "Perceptually transparent polyline watermarking based on normal multi-resolution representation," IEICE Transactions on Information and Systems, vol. E89D, no. 12, pp. 2939-2949, 2006.
  17. V. R. Doncel, N. Nikolaidis and I. Pitas, "An optimal detector structure for the Fourier descriptors domain watermarking of 2D vector graphics," IEEE Transactions on Visualization and Computer Graphics, vol. 13, no. 5, pp. 851-863, 2007. https://doi.org/10.1109/TVCG.2007.1050
  18. X. Wang, C. Shao, X. Xu and X. Niu, "Reversible data-hiding scheme for 2-d vector maps based on difference expansion," IEEE Transactions On Information Forensics And Security, vol. 2, no. 3, pp. 311-320, 2007. https://doi.org/10.1109/TIFS.2007.902677
  19. D. Im, H. Lee, S. Ryu and H. Lee, "Vector watermarking robust to both global and local geometrical distortions," IEEE Signal Processing Letters, vol. 15, pp. 789-792, 2008. https://doi.org/10.1109/LSP.2008.2006338
  20. T. Yamada, Y. Fujii, S. Tezuka and N. Komoda, "Line-Division-Based digital watermarking system for facilitating fair use of Small-Size vector map content," Electronics and Communications in Japan, vol. 91, no. 9, pp. 11-19, 2008. https://doi.org/10.1002/ecj.10010
  21. H. Yan, J. Li and H. Wen, "A key points-based blind watermarking approach for vector geo-spatial data," Computers, Environment and Urban Systems, vol. 35, no. 6, pp. 485-492, 2011. https://doi.org/10.1016/j.compenvurbsys.2010.10.004
  22. C. Wang, Z. Peng, Y. Peng, L. Yu, J. Wang and Q. Zhao, "Watermarking geographical data on spatial topological relations," Multimedia Tools and Applications, vol. 57, no. 1, pp. 67-89, 2012. https://doi.org/10.1007/s11042-010-0536-9
  23. P. Fei, C. Li and L. Min, "A reversible watermark scheme for 2D vector map based on reversible contrast mapping," Security and Communication Networks, vol. 6, no. 9, pp. 1117-1125, 2013. https://doi.org/10.1002/sec.680
  24. S. Lee, S. Kwon and K. Kwon, "Robust hashing of vector data using generalized curvatures of polyline," IEICE Transactions on Information and Systems, vol. E96D, no. 5, pp. 1105-1114, 2013.
  25. S. Lee, X. Huo and K. Kwon, "Vector watermarking method for digital map protection using arc length distribution," IEICE Transactions on Information and Systems, vol. E97.D, no. 1, pp. 34-42, 2014. https://doi.org/10.1587/transinf.E97.D.34
  26. N. Wang, H. Zhang and C. Men, "A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates," Computer-Aided Design, vol. 47, pp. 108-117, 2014. https://doi.org/10.1016/j.cad.2013.10.005
  27. Z. Peng, M. Yue, X. Wu and Y. Peng, "Blind watermarking scheme for polylines in vector geo-spatial data," Multimedia Tools and Applications, vol. 74, no. 24, pp. 11721-11739, 2015. https://doi.org/10.1007/s11042-014-2259-9
  28. D. Xiao, S. Hu and H. Zheng, "A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics," Multimedia Tools and Applications, vol. 74, no. 6, pp. 2109-2126, 2015. https://doi.org/10.1007/s11042-013-1744-x
  29. X. Niu, C. Shao and X. Wang, "A survey of digital vector map watermarking," International Journal of Innovative Computing Information and Control, vol. 2, no. 6, pp. 1301-1316, 2006.
  30. A. Abubahia and M. Cocea, "Advancements in GIS map copyright protection schemes - a critical review," Multimedia Tools and Applications, vol. 76, no. 10, pp. 12205-12231. 2017. https://doi.org/10.1007/s11042-016-3441-z
  31. Y. Wang, C. Yang and C. Zhu, "A multiple watermarking algorithm for vector geographic data based on coordinate mapping and domain subdivision," Multimedia Tools and Applications, vol. 77, no. 15, pp. 19261-19279, 2017. https://doi.org/10.1007/s11042-017-5358-6
  32. L. Cao, C. Men and Y. Gao, "A recursive embedding algorithm towards lossless 2D vector map watermarking," Digital Signal Processing, vol. 23, no. 3, pp. 912-918, 2013. https://doi.org/10.1016/j.dsp.2012.11.007
  33. F. Peng, Y. Liu and M. Long, "Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting," Computer-Aided Design, vol. 49, pp. 42-50, 2014. https://doi.org/10.1016/j.cad.2013.12.006
  34. L. Cao and C. Men, "High-capacity reversible watermarking scheme of 2D-vector data," Signal, Image and Video Processing, vol. 9, no. 6, pp. 1387-1394, 2015. https://doi.org/10.1007/s11760-013-0606-3
  35. L. Cao, C. Men and R. Ji, "Nonlinear scrambling-based reversible watermarking for 2D-vector maps," Visual Computer, vol. 29, no. 3, pp. 231-237, 2013. https://doi.org/10.1007/s00371-012-0732-x
  36. S. Lee and K. Kwon, "Vector watermarking scheme for GIS vector map management," Multimedia Tools and Applications, vol. 63, no. 3, pp. 757-790, 2013. https://doi.org/10.1007/s11042-011-0894-y
  37. N. Wang, "Reversible watermarking for 2D vector maps based on normalized vertices," Multimedia Tools and Applications, vol. 76, no. 20, pp. 20935-20953, 2017. https://doi.org/10.1007/s11042-016-3970-5
  38. H. Yan, L. Zhang and W. Yang, "A normalization-based watermarking scheme for 2D vector map data," Earth Science Informatics, vol. 10, no. 4, pp. 471-481, 2017. https://doi.org/10.1007/s12145-017-0310-x
  39. B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001. https://doi.org/10.1109/18.923725
  40. Regulation State Administration for Market, "Basic requirements for products of digital topographic map," GB/T 17278-2009, Standards Press of China, 2009.
  41. IEEE Std 754-2008, "IEEE Standard for Floating-Point Arithmetic," pp. 1-70, 2008.