1. Introduction
Vector geographic data are fundamental achievements of national information infrastructure and earth science research and have been widely used in cartography, navigation, spatial analysis and many other areas. With the rapid development of computer and communication technology, vector geographic data can be conveniently replicated and distributed. The acquisition of vector geographic data is a costly process; therefore, the copyright protection of vector geographic data has become a hot issue in the geospatial data security domain.
As an effective algorithm for copyright protection, watermarking for vector geographic data has been studied for more than ten years [1]. A number of watermarking algorithms for vector geographic data have been proposed. Generally, digital watermark techniques for vector geographic data contain three parts: watermark generation, embedding, and detection. The first step is selecting a watermark, which could be an image, character, binary sequence, or voice. Preprocessing is performed when necessary, and examples include watermark encryption and watermark compression. The second step is to hide the watermark in the cover data used to embed the watermark. A watermark may be contained in the cover data or not. According to the different embedded domains, digital watermarking is categorized as spatial and transform domain watermarking. Spatial watermarking hides the watermark in the spatial domain component, and transform domain watermarking hides the watermark in the discrete cosine transform (DCT) [2]-[3], discrete Fourier transform (DFT) [4]-[6], or discrete wavelet transform (DWT) domain [7]-[8]. To date, many studies on digital watermark embedding for vector graphic data have been undertaken [9]-[16]. The third step of the digital watermark technique includes extracting and detecting the watermark. Extraction is mostly the inverse operation of the embedding process, and it is used to extract the embedded watermark. The detection step employs various methods to judge the specific content of the watermark. If the original data are not available for detection, the process is called “blind detection”, whereas if the data are available, then the process is called “informed detection.” Compared with research on embedding, the research on detection algorithms is limited [17]-[23]. For most existing watermarking algorithms, robustness has been qualitatively analyzed rather than quantitatively analyzed. However, the detection algorithm is an important part of digital watermark techniques and affects the robustness, reliability, and practicability of the watermark system. A better detection algorithm is useful for improving the robustness and capability of the watermark system.
Data deletions and data additions are the most common types of data processing performed in geographic information systems (GIS), and quantitatively analyzing the robustness of the watermark against data deletion and data addition attacks is a critical process. Therefore, we focus on the detection algorithm, and the design of a watermark detection algorithm based on statistical characteristics is presented. This paper proposes an adaptive watermark detection algorithm that a) can calculate the detection threshold, false positive error (FPE) and false negative error (FNE), b) is robust to data deletions and data additions and c) can qualitatively analyze the robustness of watermarks against data adding attacks.
The remainder of the paper is organized as follows. Section 2 briefly describes the watermark generation and embedding algorithms. Section 3 presents the fixed watermark detection process and establishes the adaptive watermark detection. Section 4 analyzes the characteristics of the proposed watermark detection method. Section 5 describes the experiments and results, and Section 6 presents the conclusions of the paper.
2. Watermark Generation and Embedding
2.1 Watermark Generation
Research manuscripts reporting on large datasets deposited in a publicly available database should specify where the data have been deposited and provide the relevant accession numbers. If the accession numbers have not yet been obtained at the time of submission, a note should be included stating that the numbers will be provided during review. The numbers must be provided prior to publication.
Watermark information can be classified into two main categories: significant watermarks and insignificant watermarks. A significant watermark is usually represented as a binary logo, and this logo is extracted to detect the presence of the watermark by visual inspection by a third entity, whereas an insignificant watermark is usually represented as a pseudo-random sequence. The presence of the watermark is detected using statistical correlations so that the detection of an insignificant watermark is more objective [11]. Moreover, the length of an insignificant watermark is usually much shorter than that of a significant watermark; thus, an insignificant watermark is more suitable for small datasets, which are common in vector geographic data. To establish the watermark detection model and quantitatively analyze the robustness of the proposed watermarking algorithm, we used a pseudo-random sequence as a watermark for this paper.
Let the watermark information be \(W=\{w[i], 0 \leq i<N\}, \text { where } w[i]\) is the watermark bit, \(i\) is the watermark bit index, \(N\) is the length of the watermark, and \(w[i] \in\{-1,1\}\) . The statistical characteristics of \(w[i]\) are \(P(w[i]=-1)=1 / 2\) and \(P(w[i]=1)=1 / 2\) , which means that the probabilities that \(w[i]\) are equal to -1 or 1 are the same. We set N to 200 for this paper.
The steps used to generate watermark information are as follows: first, a random integer is generated and used as a watermark seed; second, according to the watermark seed, the watermark is generated by the pseudo-random sequence generator; and third, the watermark seed is saved for the potential watermark detection. A one-to-one relationship is observed between the watermark seed and the corresponding watermark; therefore, we only need to save the watermark seed for the potential watermark detection.
In the subsequent section, the terms watermark seed, watermark, watermark bit, and watermark bit index are frequently referenced. The relationships among the watermark, watermark bit, and watermark bit index are shown in Fig. 1, in which N is the length of the watermark.
Fig. 1. Relationships among the watermark seed, the watermark, the watermark bits, and the watermark bit index
2.2 Watermark Embedding
The vector geographic data consist of the vertex coordinates. Vertex coordinates are the fundament units of points, polylines, and polygons that describe geographical objects, such as wells, rivers, and residential areas. To obtain a watermarking algorithm that is robust against the most common watermarking attacks such as data cropping, data reordering, data simplification, vertex adding and vertex deleting, we establish the mapping relationships between the vertex coordinates and the watermark bit index [23], and the watermark bits are then embedded into the corresponding vertex coordinates according to the mapping relationships.
In this paper, let the vertex coordinates of the vector geographic data be the set \(V C, V C=\left\{v c_{i} \mid\left(x_{i}, y_{i}\right), 0 \leq i<M\right\}\), where \(v c_{i}\) is the \(ith \) vertex, \(\left(x_{i}, y_{i}\right)\) is the coordinate of the ith vertex, and \(M \) is the number of vertex coordinates. The details of the steps for establishing mapping relationships are as follows.
1) The vertex coordinates \(VC\) are mapped to region \(R \) , which has a size of \(R_ x \times R_ y\) as shown as equation (1):
\(\left\{\begin{array}{l} x_{i}^{\prime}=\left\lfloor x_{i} * s\right\rfloor \% R_{-} x \\ y_{i}^{\prime}=\left\lfloor y_{i} * s\right\rfloor \% R_{-} y \end{array}\right.\), (1)
where \(\left(x_{i}^{\prime}, y_{i}^{\prime}\right)\) is the mapped coordinate and \(s\) is a scaling factor used to control the data distortions in the watermark embedding.
distortions in the watermark embedding.
2) The region R is divided into NcNr _ _ × grid cells and by establishing the mapping relationships between coordinate (, ) i i x y ′ ′ and the grid cell index (,) ic ir , which are shown in equation (2), where N r _ , N c _ , LD x _ , and LD y _ are all positive integers, R x _ can be divided by N c _ , and R y _ can be divided by N r _ . Additionally, N r R y LD y _ __ / _ = , N c R x LD x _ _/ _ = , and NcNr N _ _ × = .
References
- Cox I. J., Miller M. L. and Bloom J. A., Digital Watermarking, Morgan Kaufmann, San Diego, California, 2002; pp. XV.
- Voigt M., Yang B. and Busch C., "Reversible watermarking of 2D-vector data," in Proc. of the 2004 Workshop on Multimedia and Security, pp.160-165, September 20-21, 2004.
- Kang H. and Iwamura K., "Information hiding method using best DCT and wavelet coefficients and its watermark competition," Entropy, vol. 17, no. 3, pp. 1218-1235, March, 2015. https://doi.org/10.3390/e17031218
- Solachidis V. N. and Nikolaidis I. P., "Watermarking polygonal lines using Fourier descriptors," IEEE Computer Graphics and Applications, vol. 24, no. 3, pp. 44-51, May, 2004. https://doi.org/10.1109/MCG.2004.1297010
- S. N. Neyman, I. N. P. Pradnyana and B. Sitohang, "A new copyright protection for vector map using FFT-based watermarking," Telkomnika (Telecommunication Computing Electronics and Control), vol. 12, no. 2, pp. 367-378, June, 2014. https://doi.org/10.12928/telkomnika.v12i2.49
- M. Urvoy, D. Goudia and F. Autrusseau, "Perceptual DFT watermarking with improved detection and robustness to geometrical distortions," IEEE Transactions on Information Forensics and Security, vol. 9, no. 7, pp. 1108-1119, July, 2014. https://doi.org/10.1109/TIFS.2014.2322497
- Y. Li and L. Xu, "A blind watermarking of vector graphics images," in Proc. of 5th International Conference on Computational Intelligence and Multimedia Applications, ICCIMA 2003, pp. 424-429, September 27-30, 2003.
- A. Benoraira, K. Benmahammed and N. Boucenna, "Blind image watermarking technique based on differential embedding in DWT and DCT domains," EURASIP Journal on Advances in Signal Processing, vol. 2015, no. 1, pp. 55-65, July, 2015. https://doi.org/10.1186/s13634-015-0239-5
- R. Ohbuchi, H. Ueda and S. Endoh, "Robust watermarking of vector digital maps," in Proc. of 2002 IEEE International Conference on Multimedia and Expo, pp. 577-580, August 26-29, 2002.
- X. Zhou, Y. Ren and X. Pan, "Watermark embedded in polygonal line for copyright protection of contour map," International Journal of Computer Science and Network Security, vol. 6, no. 7B, pp. 202-205, July, 2006.
- Yang, C. S., Zhu, C. Q. and Wang, Y. Y, "Robust watermarking algorithm for geometrical transform for vector geo-spatial data based on invariant function," Acta Geodaetica Et Cartographica Sinica, vol. 40, no. 12, pp. 256-261, November, 2011.
- S. H. Lee, X. J. Huo and K. R. Kwon, "Vector watermarking method for digital map protection using arc length distribution," IEICE Transactions on Information and Systems, vol. E97-D, no. 1, pp. 34-42, January, 2014. https://doi.org/10.1587/transinf.E97.D.34
- Z. Peng, M. Yue, X. Wu and Y. Peng, "Blind watermarking scheme for polylines in vector geo-spatial data," Multimedia Tools and Applications, vol. 74, no. 24, pp. 11721-11739, December, 2015. https://doi.org/10.1007/s11042-014-2259-9
- N. Wang, "Reversible watermarking for 2D vector maps based on normalized vertices," Multimedia Tools and Applications, vol. 76, no. 20, pp. 20955-20956, October, 2017. https://doi.org/10.1007/s11042-016-4272-7
- N. N. Wang and X. J. Zhao, "2D vector map data hiding with directional relations preservation between points," Aeu-International Journal of Electronics and Communications, vol. 71, pp. 118-124, January, 2017. https://doi.org/10.1016/j.aeue.2016.10.010
- Wang, Y. Y., Yang, C. S. and Zhu, C. Q, "Digital watermarking against data merging attack for vector geographic data," Journal of Beijing University of Posts and Telecommunications, vol. 40, no. 4, pp.48-53, July, 2017.
- A. Adelsbach, S. Katzenbeisser and A. R. Sadeghi, "Watermark detection with zero-knowledge disclosure," Multimedia Systems, vol. 9, no. 3, pp. 266-278, September, 2003. https://doi.org/10.1007/s00530-003-0098-z
- A. Adelsbach, M. Rohe and A.-R. Sadeghi, "Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme," Communications and Multimedia Security, pp. 129-139, September 19-21, 2005.
- M. Malkin and T. Kalker, "A Cryptographic Method for Secure Watermark Detection," in Proc. of Information Hiding, pp. 26-41, July 10-12, 2006.
- Shao, C. Y., Wang, H. L., Niu, X. M. and Wang, X. T., "A shape-preserving method for watermarking 2D vector maps based on statistic detection," IEICE Transactions on Information and Systems, vol. E89-D, no. 3, pp.1290-1293, March, 2006. https://doi.org/10.1093/ietisy/e89-d.3.1290
- Zhu X. W., "Research of blind watermark detection algorithm based on generalized Gaussian distribution," Journal of Software, vol. 5, pp. 413-420, April, 2010.
- C. Zuo, A. Li and C. Meng, "GIS vector data automatic watermark detection based on mobile agent technology," in Proc. of 18th International Conference on Geoinformatics, pp. 1-4, June 18-20, 2010.
- Yang, C. S., Zhu, C. Q. and Wang, Y. Y., "Self-detection watermarking algorithm and its application to vector geo-spatial data," Geomatics and information science of Wuhan University, vol. 36, no. 12, pp. 1402-1405, December, 2011.
- B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Transactions on Information Theory, vol. 47, no. 4, pp. 1423-1442, May, 2001. https://doi.org/10.1109/18.923725
- D. H. Douglas and T. K. Peucker, "Algorithms for the reduction of the number of points required to represent a digitized line or its caricature," Cartographica: The International Journal for Geographic Information and Geovisualization, vol. 10, no. 2, pp. 112-122, December, 1973. https://doi.org/10.3138/FM57-6770-U75U-7727
Cited by
- Commutative encryption and watermarking based on SVD for secure GIS vector data vol.14, pp.4, 2020, https://doi.org/10.1007/s12145-021-00684-5
- Congruence and geometric feature-based commutative encryption-watermarking method for vector maps vol.159, 2020, https://doi.org/10.1016/j.cageo.2021.105009