CN105488434B - A kind of map vector completeness certification method based on label - Google Patents
A kind of map vector completeness certification method based on label Download PDFInfo
- Publication number
- CN105488434B CN105488434B CN201510883547.5A CN201510883547A CN105488434B CN 105488434 B CN105488434 B CN 105488434B CN 201510883547 A CN201510883547 A CN 201510883547A CN 105488434 B CN105488434 B CN 105488434B
- Authority
- CN
- China
- Prior art keywords
- watermark
- group
- primitive
- authentication
- primitives
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
本发明提供一种基于标记的矢量地图完整性认证方法。包括如下步骤:识别可嵌入水印顶点坐标;自适应划分图元组;生成认证水印;嵌入认证水印;标记图元;水印认证及原始数据无损恢复。本发明将矢量地图图元自适应地划分为不同的组,考虑矢量地图的精度误差容限的前提下,采用可逆信息隐藏方法实现认证水印的嵌入,并基于插入顶点的方法,在每个图元中添加标记以指示其所属图元组,保证水印认证阶段图元组的正确划分,精确定位篡改图元的同时,具有较好不可见性,且能够容忍图元乱序和顶点逆序攻击;另一方面该算法在水印认证阶段,去除标记并提取认证水印后,无损还原矢量地图原始数据,能够有效确保矢量地图数据的精确使用。
The invention provides a mark-based vector map integrity authentication method. The method includes the following steps: identifying vertex coordinates that can be embedded with watermarks; adaptively dividing graph element groups; generating authentication watermarks; embedding authentication watermarks; marking graph elements; watermark authentication and lossless restoration of original data. The invention adaptively divides vector map primitives into different groups, and adopts a reversible information hiding method to embed authentication watermarks under the premise of considering the precision error tolerance of vector maps, and based on the method of inserting vertices, in each map Marks are added to the element to indicate the group of primitives it belongs to, so as to ensure the correct division of the group of primitives in the watermark authentication stage, while accurately locating the tampered primitives, it has better invisibility, and can tolerate the disorder of primitives and reverse order attacks of vertices; On the one hand, in the stage of watermark authentication, after removing the mark and extracting the authentication watermark, the algorithm restores the original data of the vector map losslessly, which can effectively ensure the accurate use of the vector map data.
Description
技术领域technical field
本发明涉及地理信息科学、信息隐藏领域,具体讲是一种基于标记的矢量地图完整性认证方法。The invention relates to the fields of geographic information science and information hiding, in particular to a marker-based vector map integrity authentication method.
背景技术Background technique
现今,二维矢量地图作为地理信息系统(Geographical Information System,GIS)的基础数据,在城市规划、邮电通讯、交通运输、导航、测绘等领域得到了广泛的应用。获取矢量数据需高额费用。然而,借助信息处理工具和公共网络,可以方便快捷地复制、修改并发布这些矢量数据,这使得二维矢量地图的完整性认证和真伪鉴别问题日益突出。Nowadays, as the basic data of Geographical Information System (GIS), two-dimensional vector maps are widely used in urban planning, post and telecommunications, transportation, navigation, surveying and mapping and other fields. Obtaining vector data is expensive. However, with the help of information processing tools and public networks, these vector data can be copied, modified and published conveniently and quickly, which makes the integrity authentication and authenticity identification of two-dimensional vector maps increasingly prominent.
为满足数据完整性认证和真伪鉴别的需求,人们提出了数字签名技术。但这种技术仅能识别数据是否发生篡改,而不能定位篡改位置。一旦发现数据发生改变,不管发生篡改的数据是所需数据还是非所需数据,都会认为数据遭到篡改不能使用,需要重新获取数据,增加了数据获取的时间与费用,给一些需要及时获取数据的应用场合造成不必要的延误。为弥补数字签名技术的缺陷,脆弱水印技术作为一种完整性认证的有效手段应运而生,成为近年来地理信息产品完整性认证领域研究的一个热点。In order to meet the requirements of data integrity authentication and authenticity identification, digital signature technology has been proposed. However, this technology can only identify whether the data has been tampered with, but cannot locate the tampered location. Once it is found that the data has changed, no matter whether the tampered data is required data or unnecessary data, it will be considered that the data has been tampered with and cannot be used, and it is necessary to obtain the data again, which increases the time and cost of data acquisition, and gives some people who need to obtain data in a timely manner. applications causing unnecessary delays. In order to make up for the shortcomings of digital signature technology, fragile watermark technology emerged as an effective means of integrity authentication, and has become a hot spot in the field of integrity authentication of geographic information products in recent years.
另外,专利申请号CN201210566500,名称为“一种针对shp线面图层完整性的多级认证方法”;专利申请号CN201210189469,名称为“一种数字矢量地图完整性保护方法”;专利申请号CN201210142896,名称为“一种基于混沌映射的shp线面图层易碎水印技术”的中国专利文件中也涉及矢量地图完整性认证问题,但与本专利申请采用方法不同,都不能同时具有精确定位篡改、认证后恢复矢量地图原始数据且容忍图元乱序和顶点逆序攻击的特性。In addition, the patent application number CN201210566500, titled "a multi-level authentication method for the integrity of shp line surface layer"; the patent application number CN201210189469, titled "a digital vector map integrity protection method"; the patent application number CN201210142896 , the Chinese patent document titled "A Fragile Watermarking Technology for Shp Line and Plane Layer Based on Chaotic Mapping" also involves the integrity authentication of vector maps, but it is different from the method used in this patent application, and neither can have accurate positioning and tampering at the same time , After authentication, restore the original data of the vector map and tolerate the disorder of the primitives and the reverse order of the vertices.
美国专利库中的“Alternate game-like multi-level authentication”和“Authentication method and system”与本专利申请针对内容不同,具体方法也不同。"Alternate game-like multi-level authentication" and "Authentication method and system" in the U.S. Patent Library are different from the content of this patent application, and the specific methods are also different.
发明内容Contents of the invention
提出一种基于标记的矢量地图完整性认证方法,一方面该方法将矢量地图图元自适应地划分为不同的组,考虑矢量地图的精度误差容限的前提下,采用可逆信息隐藏方法实现认证水印的嵌入,并基于插入顶点的方法,在每个图元中添加标记以指示其所属图元组,保证水印认证阶段图元组的正确划分,精确定位篡改图元的同时,具有较好不可见性,且能够容忍图元乱序和顶点逆序攻击;另一方面该算法在水印认证阶段,去除标记并提取认证水印后,无损还原矢量地图原始数据,能够有效确保矢量地图数据的精确使用。实验结果表明该方案精确定位篡改数据,是一种用于矢量地图完整性认证、定位篡改的实用算法。A mark-based vector map integrity authentication method is proposed. On the one hand, the method adaptively divides the vector map primitives into different groups. On the premise of considering the accuracy error tolerance of the vector map, the reversible information hiding method is used to realize the authentication. Watermark embedding, and based on the method of inserting vertices, adding a mark to each primitive to indicate the group of primitives it belongs to, ensuring the correct division of the primitive group in the watermark authentication stage, and accurately locating the tampered primitive, while having better invisibility On the other hand, in the watermark authentication stage, after removing the mark and extracting the authentication watermark, the algorithm restores the original data of the vector map losslessly, which can effectively ensure the accurate use of the vector map data. Experimental results show that the scheme accurately locates tampered data, and it is a practical algorithm for vector map integrity authentication and tampered location.
矢量地图图元(点图元、线图元和面图元)是由大量密集的顶点按照特定的顺序排列而成的,地图数据就是这些顶点的2维坐标序列。矢量地图脆弱水印技术是一种解决矢量地图完整性认证、定位篡改问题的重要手段。人们当前提出的矢量地图脆弱水印策略能够达到认证数据完整性和真实性的目标,但这些策略在精确定位篡改方面还存在不足。针对上述问题,本发明提出一种基于标记的矢量地图完整性认证方法,包括如下步骤:Vector map primitives (point primitives, line primitives, and surface primitives) are formed by a large number of dense vertices arranged in a specific order, and the map data is the 2-dimensional coordinate sequence of these vertices. Vector map fragile watermarking technology is an important means to solve the problem of vector map integrity authentication and location tampering. The currently proposed vector map fragile watermarking strategies can achieve the goal of authenticating data integrity and authenticity, but these strategies are still insufficient in accurately locating tampering. In view of the problems referred to above, the present invention proposes a kind of mark-based vector map integrity authentication method, comprising the following steps:
(1)识别可嵌入水印顶点坐标;(1) Identify the vertex coordinates that can be embedded in the watermark;
依据矢量地图的精度误差容限,识别可嵌入水印顶点坐标;假设矢量地图M包含N个线图元,记为P1,P2,…,PN,Pj表示第j(j=1,2,…,N)个线图元,Pj中可嵌入水印坐标的数目为 According to the accuracy error tolerance of the vector map, identify the vertex coordinates that can be embedded in the watermark; assuming that the vector map M contains N line primitives, denoted as P 1 , P 2 ,...,P N , P j represents the jth (j=1, 2,...,N) line primitives, the number of watermark coordinates that can be embedded in P j is
(2)自适应划分图元组;(2) Adaptively divide the graph element group;
依据图元中可嵌入水印顶点坐标的数目,将矢量地图图元自适应地划分为互不重叠的组;本发明中每组的认证水印长度为L比特,每个可嵌入水印顶点坐标嵌入的水印长度为c(c=1,2,…)比特,每组所需的可嵌入水印顶点坐标数目为假设图元组的数目为Ng(1≤Ng≤N),第i(i=0,1,…,Ng–1)个图元组为Gi,Gi所含的可嵌入水印顶点坐标数目为若在图元组Gi中完全嵌入其对应的L比特的认证水印,和Nr需满足如下关系,将图元组Gi所含的线图元记为 According to the number of vertex coordinates that can embed watermarks in the primitives, the vector map primitives are adaptively divided into non-overlapping groups; the authentication watermark length of each group in the present invention is L bits, and the vertex coordinates of each embeddable watermark can be embedded The length of the watermark is c(c=1,2,…) bits, and the number of embeddable watermark vertex coordinates required by each group is Suppose the number of tuple groups is N g (1≤N g ≤N), and the i (i=0,1,…,N g –1) tuple group is G i , and the embeddable watermark contained in G i The number of vertex coordinates is If the corresponding L-bit authentication watermark is completely embedded in the tuple group G i , and N r need to satisfy the following relationship, Record the line primitives contained in the primitive group G i as
(3)生成认证水印;(3) Generate an authentication watermark;
利用散列算法,生成步骤(2)中每个图元组的认证水印;将图元组Gi(i=0,1,…,Ng–1)的认证水印记为Hi,Hi={hi,j∈{0,1},j=0,1,...,L-1},其中,L表示Hi中比特的数目,hi,j(j=0,1,…,L–1)表示Hi的第j个比特;将Hi转换为待嵌入水印序列Wi={wi,j|wi,j=0,1,…,2c–1,j=0,1,…,Nr–1},wi,j=hi,j×c×2c-1+hi,j×c+1×2c-2+…+hi,(j+1)×c-1×20;Use the hash algorithm to generate the authentication watermark of each graph element group in step (2); mark the authentication watermark of the graph element group G i (i=0,1,...,N g –1) as H i , H i ={h i,j ∈{0,1},j=0,1,...,L-1}, where L represents the number of bits in H i , h i,j (j=0,1, ...,L–1) represents the jth bit of H i ; convert H i into the watermark sequence to be embedded W i ={w i,j |w i,j =0,1,…,2 c –1,j =0,1,…,N r –1}, w i,j =h i,j×c ×2 c-1 +h i,j×c+1 ×2 c-2 +…+h i,( j+1)×c-1 ×2 0 ;
(4)嵌入认证水印;(4) Embed authentication watermark;
利用基于间隔的状态值的可逆信息隐藏方法,将步骤(3)中生成的待嵌入水印序列Wi(i=0,1,…,Ng–1)嵌入到图元组Gi的前Nr个可嵌入水印顶点坐标中,在图元组Gi中嵌入其对应的认证水印记Hi后,得到含水印图元组Gi w;Using the reversible information hiding method based on interval state values, the embedded watermark sequence W i (i=0,1,…,N g –1) generated in step (3) is embedded in the first N of the primitive group G i r can be embedded in the watermark vertex coordinates, after embedding its corresponding authentication watermark H i in the primitive group G i , get the watermarked primitive group G i w ;
(5)标记图元;(5) mark the graphic element;
利用插入顶点的方法,在每个含水印图元中嵌入指示其所在图元组的标记,将插入的顶点称作位置顶点,在含水印图元中嵌入标记后,得到其对应的含标记图元,按照含标记图元的特征,能够正确识别其位置顶点,并获得其所在的图元组,在每个图元中插入标记后,得到含标记矢量地图;Use the method of inserting vertices to embed a mark indicating the group of primitives in each watermarked primitive. The inserted vertex is called a position vertex. After embedding the mark in the watermarked primitive, the corresponding marked graph is obtained. According to the characteristics of the marked primitive, it can correctly identify its position vertex, and obtain the primitive group where it is located. After inserting the mark in each primitive, a marked vector map is obtained;
(6)水印认证及原始数据恢复;(6) Watermark authentication and original data recovery;
依据图元标记及可逆信息隐藏方法,恢复矢量地图数据并定位篡改,具体步骤如下:According to the primitive labeling and reversible information hiding method, the vector map data is restored and the tampering is located. The specific steps are as follows:
(6.1)识别原始图元组;(6.1) Identify the original group of primitives;
依据步骤(5)的中含标记图元的特征,识别每个图元组的原始图元,并删除插入的位置顶点;According to the feature of the marked primitive in the step (5), identify the original primitive of each primitive group, and delete the inserted position vertex;
(6.2)水印提取及原始数据恢复;(6.2) Watermark extraction and original data recovery;
利用步骤(1)的可嵌入水印顶点坐标判定方法,识别图元组的含水印可嵌入水印顶点坐标,提取水印并恢复矢量地图原始数据,将恢复数据后的含水印图元组Gi w(i=0,1,…,Ng–1)记为Gi',从Gi w中提取出的水印序列记为Wi'={wi,j'|wi,j'=0,1,…,2c–1,j=0,1,…,Nr–1},利用以下公式,将Wi'转化为二进制序列Hi'={hi,j'|hi,j'∈{0,1},j=0,1,…,L–1}, Using the embeddable watermark vertex coordinate determination method in step (1), identify the vertex coordinates of the embeddable watermark of the graph element group, extract the watermark and restore the original data of the vector map, and restore the watermarked graph element group G i w ( i=0,1,...,N g –1) is denoted as G i ', and the watermark sequence extracted from G i w is denoted as W i '={w i,j '|w i,j '=0, 1,...,2 c –1,j=0,1,...,N r –1}, use the following formula to convert W i ' into a binary sequence H i '={h i,j '|h i,j '∈{0,1},j=0,1,...,L–1},
(6.3)生成认证水印;(6.3) Generate an authentication watermark;
利用步骤(3)的方法,生成每个恢复数据后的图元组的认证水印,假设为图元组Gi'(i=0,1,…,Ng–1)生成的认证水印为Hi”={hi,j”|hi,j”∈{0,1},j=0,1,…,L–1};Use the method of step (3) to generate the authentication watermark of each tuple group after recovering data, assuming that the authentication watermark generated for the tuple group G i '(i=0,1,...,N g –1) is H i ”={h i,j ”|h i,j ”∈{0,1},j=0,1,…,L–1};
(6.4)水印认证;(6.4) Watermark authentication;
依据图元组Gi'(i=0,1,…,Ng–1)中提取出的水印Hi'和生成的水印Hi”,判定该图元组是否发生篡改,若Hi'=Hi”,则该组未发生篡改;否则,该组发生了篡改;验证完每个图元组的完整性后,显示所有被篡改的图元。According to the extracted watermark H i ' and the generated watermark H i ” in the primitive group G i ' (i=0,1,…,N g –1), determine whether the primitive group has been tampered with, if H i ' =H i ”, then the group has not been tampered with; otherwise, the group has been tampered with; after verifying the integrity of each graph element group, display all the tampered graph elements.
假设Pj包含u个顶点V1(x1,y1),V2(x2,y2),…,Vu(xu,yu),Vm(xm,ym)(m=1,2,…,u)表示Pj的第m个顶点,xm和ym分别为顶点Vm的x坐标和y坐标,和分别为线图元Pj中x坐标的最大值和最小值,所述的判定顶点Vm的x坐标xm是否是可嵌入水印顶点坐标的方法的具体步骤如下:Suppose P j contains u vertices V 1 (x 1 ,y 1 ), V 2 (x 2 ,y 2 ),…,V u (x u ,y u ), V m (x m ,y m )(m =1,2,...,u) means the mth vertex of P j , x m and y m are the x coordinate and y coordinate of the vertex V m respectively, and are respectively the maximum value and the minimum value of the x coordinates in the line primitive Pj , and the specific steps of the method for determining whether the x coordinate x m of the vertex V m is the vertex coordinates of the embeddable watermark are as follows:
(1.1)将和之间的距离平均分为段,(1.1) will and The average distance between part,
其中,表示每段的长度,的取值需满足以下条件,in, Indicates the length of each segment, The value of must meet the following conditions,
式中,τ为矢量地图M的精度误差容限;In the formula, τ is the precision error tolerance of the vector map M;
(1.2)依据每段的长度计算坐标xm所在段的边界端点,(1.2) According to the length of each segment Compute the boundary endpoints of the segment whose coordinates x m are located,
式中,表示坐标xm所在段的索引值,和分别表示限定坐标xm所在段范围的边界左端点和边界右端点,将xm和视为一个间隔 In the formula, Indicates the index value of the segment where the coordinate x m is located, and represent the left end point and the right end point of the boundary that limit the range of the segment where the coordinate x m is located respectively. x m and as an interval
(1.3)若xm满足以下条件,(1.3) If x m satisfies the following conditions,
称xm为可嵌入水印顶点坐标;Call x m the vertex coordinates of the embeddable watermark;
所述的划分图元组的方法的具体步骤如下:The specific steps of the method for dividing the graph element group are as follows:
(2.1)将条线图元划分到图元组G0中,为满足如下关系的最小正整数,(2.1) will The bar line primitives are divided into the primitive group G 0 , is the smallest positive integer that satisfies the following relation,
(2.2)依据步骤(2.1)的方法,顺次将余下的图元划分为若干组,即对于任意图元组Gi(i>0),从余下的图元中选择条线图元作为其成员,为满足如下关系的最小正整数,(2.2) According to the method of step (2.1), divide the remaining primitives into several groups in turn, that is, for any primitive group G i (i>0), select from the remaining primitives bar line primitive as its member, is the smallest positive integer that satisfies the following relation,
δ为图元组G0至图元组Gi-1中所有图元的数目,即δ is the number of all primitives in the primitive group G 0 to the primitive group G i-1 , namely
(2.3)由于顺次将图元划分为组,最后一组的图元可能无法提供足够嵌入空间,此时,将最后一组的图元划分至倒数第二组中。(2.3) Since the primitives are divided into groups sequentially, the primitives of the last group may not provide enough embedding space. In this case, the primitives of the last group are divided into the penultimate group.
所述的生成认证水印Hi的方法如下:The method for generating the authentication watermark H i is as follows:
Hi=grouphash(hash(I(Gi),k,i,Vi,Min),L,K)H i =grouphash(hash(I(G i ),k,i,V i ,M in ),L,K)
其中,I(·)表示获取空间数据和属性数据的方法,k表示生成hash(·)输入参数的私钥,Vi图元组Gi顶点的数目,Min表示该矢量地图的索引值,hash(·)表示一个已有的加密哈希算法,grouphash(Hi a,L,K)表示在私钥K的控制下从比特序列Hi a中选择L比特的方法;方法I(·)获取图元组Gi的空间数据时,按照如下方法扫描该组的图元顶点:依据图元的存储顺序,顺次扫描Gi的线图元,即从扫描至在每条线图元中,从第一个顶点扫描至最后一个顶点。所述的间隔Qm的状态值的定义如下:假定可嵌入水印顶点坐标xm对应的间隔为将Qm平均分为P(P≥2)个子间隔,xm所在子间隔的索引值即为间隔Qm的状态值。Among them, I(·) represents the method for obtaining spatial data and attribute data, k represents the private key for generating hash(·) input parameters, the number of vertices of the V i graph tuple G i , and Min represents the index value of the vector map, hash(·) represents an existing cryptographic hash algorithm, grouphash(H ia ,L,K) represents the method of selecting L bits from the bit sequence H i a under the control of the private key K ; method I(·) When obtaining the spatial data of the primitive group G i , scan the primitive vertices of the group as follows: According to the storage order of the primitives, scan the line primitives of G i sequentially, that is, from scan to In each line primitive, scan from the first vertex to the last vertex. The definition of the state value of the interval Q m is as follows: Assume that the interval corresponding to the vertex coordinate x m of the embeddable watermark is Divide Q m into P (P≥2) sub-intervals on average, and the index value of the sub-interval where x m is located is the state value of the interval Q m .
假设在可嵌入水印顶点坐标xm中嵌入的水印为wi,j,水印嵌入的具体步骤如下:Assuming that the watermark embedded in the embeddable watermark vertex coordinate x m is w i,j , the specific steps of watermark embedding are as follows:
(4.1)计算间隔Qm的r状态,(4.1) Compute the r-states for the interval Qm ,
(4.2)将Qm平均分为2c+1个子间隔,计算间隔Qm对应的含水印间隔的状态值s,即xm'所在的子间隔的索引值,(4.2) Divide Q m into 2 c+1 sub-intervals on average, and calculate the watermarked interval corresponding to the interval Q m The state value s of , that is, the index value of the subinterval where x m ' is located,
s=2c×r+wi,j s=2 c ×r+w i,j
(4.3)计算含水印坐标xm',(4.3) Calculate the watermark coordinate x m ',
其中,in,
假设图元组Gi w的线图元包含f个顶 点,记为表示的 第t个顶点,和分别为顶点Vt w的x坐标和y坐标,待插入的顶点为Vg(xg,yg),xg和yg分别 为顶点Vg的x坐标和y坐标,所述的在中标记其所在图元组Gi w的具体步骤如下: Assume that the line primitives of the primitive group G i w Contains f vertices, denoted as The tth vertex represented by , and are the x-coordinate and y-coordinate of vertex V t w respectively, the vertex to be inserted is V g (x g , y g ), and x g and y g are the x-coordinate and y-coordinate of vertex V g respectively y coordinates, the specific steps of marking the graph element group G i w in which it is located are as follows:
(5.1)将顶点V1 w和V2 w之间的距离平均分为Nt(Nt=2×Ng)段,每段的长度为lt,(5.1) Divide the distance between vertices V 1 w and V 2 w into N t (N t =2×N g ) segments on average, and the length of each segment is l t ,
(5.2)在第i段的中点插入顶点Vg,并以此标记所在的图元组Gi w,(5.2) Insert the vertex V g at the midpoint of the i-th segment, and mark it as The tuple group G i w where it is located,
其中,in,
在中嵌入标记后,得到其对应的含标记图元具有如下特征:exist After embedding the mark in , get its corresponding marked primitive Has the following characteristics:
i)一端的三个连续顶点在同一条直线上,这一端为的起始端;假设从起始 端扫描获取的顶点为 Vt m(t=1, 2,…,f+1)表示的第t个顶点,和分别为顶点Vt m的x坐标和y坐标,则为插入的位 置顶点; i) The three consecutive vertices at one end are on the same straight line, and this end is the starting end of ; assuming that the vertex scanned from the starting end is The t-th vertex represented by V t m (t=1, 2,...,f+1), and the x-coordinate and y-coordinate of the vertex V t m respectively, are the vertex of the inserted position;
ii)按如下方法,计算得到所在图元组的索引值iii) According to the following method, calculate The index value i of the primitive group where it is located
从含水印图元组Gi w(i=0,1,…,Ng–1)的可嵌入水印坐标Xm′中提取水印信息的具体步骤如下:The specific steps for extracting watermark information from the embeddable watermark coordinates X m ′ of the watermarked primitive group G i w (i=0,1,…,N g –1) are as follows:
(6.2.1)依据步骤(4.1),计算xm'对应的含水印间隔的r状态;(6.2.1) According to step (4.1), calculate the watermark interval corresponding to x m ' the r state;
(6.2.2)将间隔Qm'平均分为2c+1个子间隔,计算每个子间隔的长度ls,(6.2.2) Divide the interval Q m ' into 2 c+1 sub-intervals on average, and calculate the length l s of each sub-interval,
(6.2.3)计算间隔Qm'的状态值s,(6.2.3) Calculate the state value s of the interval Q m ',
(6.2.4)提取水印wi,j',(6.2.4) Extract watermark w i,j ',
wi,j'=s-r×2c w i,j '=sr×2 c
(6.2.5)恢复xm'的原始数据,(6.2.5) restore the original data of x m ',
其中,in,
本发明提出了一种基于标记的矢量地图完整性认证方法,一方面该方法将矢量地图图元自适应地划分为不同的组,考虑矢量地图的精度误差容限的前提下,采用可逆信息隐藏方法实现认证水印的嵌入,并基于插入顶点的方法,在每个图元中添加标记以指示其所属图元组,保证水印认证阶段图元组的正确划分,精确定位篡改图元的同时,具有较好不可见性,且能够容忍图元乱序和顶点逆序攻击;另一方面该算法在水印认证阶段,去除标记并提取认证信息后,无损还原矢量地图原始数据,能够有效确保矢量地图数据的精确使用。与其他矢量地图完整性认证方法相比,本发明具有以下优点:The present invention proposes a mark-based vector map integrity authentication method. On the one hand, the method adaptively divides the vector map primitives into different groups, and adopts reversible information hiding under the premise of considering the precision error tolerance of the vector map The method implements the embedding of authentication watermarks, and based on the method of inserting vertices, adding a mark to each primitive to indicate the group of primitives it belongs to, ensuring the correct division of primitive groups in the watermark authentication stage, accurately locating tampered primitives, and having It has better invisibility, and can tolerate primitive disorder and vertex reverse order attacks; on the other hand, in the watermark authentication stage, after removing the mark and extracting the authentication information, the algorithm restores the original data of the vector map losslessly, which can effectively ensure the accuracy of the vector map data. use. Compared with other vector map integrity authentication methods, the present invention has the following advantages:
1、本发明自适应地划分图元组,并为每组标记其组别信息,具有更高的篡改定位精度,有效减少因无法准确检测篡改数据而导致的数据重传次数;1. The present invention adaptively divides graph tuple groups and marks its group information for each group, which has higher tampering positioning accuracy and effectively reduces the number of data retransmissions caused by the inability to accurately detect tampered data;
2、本发明依据矢量地图的精度误差容限,设置嵌入参数,能有效控制水印嵌入给矢量地图数据带来的扰动,能够保证含水印矢量地图质量;2. The present invention sets the embedding parameters according to the accuracy error tolerance of the vector map, which can effectively control the disturbance caused by the watermark embedding to the vector map data, and can ensure the quality of the watermarked vector map;
3、本发明利用可逆信息隐藏方法在每个图元组中嵌入认证水印,并基于插入顶点的方法在每个图元中添加标记,在认证阶段,去除标记并提取认证信息后,不仅能够实现完整性认证,而且能够恢复矢量地图原始数据,确保矢量地图的精确使用。3. The present invention uses the reversible information hiding method to embed the authentication watermark in each graph element group, and adds a mark to each graph element based on the method of inserting vertices. In the authentication stage, after removing the mark and extracting the authentication information, not only can realize Integrity authentication, and the ability to restore the original data of the vector map to ensure the accurate use of the vector map.
4、本发明采用的标记方法,在遭到图元乱序和顶点逆序这些保持内容操作的攻击后,仍能正确指示图元所在组别和顶点扫描顺序,对图元乱序和顶点逆序攻击鲁棒。4. The marking method adopted by the present invention can still correctly indicate the group of the primitive and the scanning order of the vertices after being attacked by the content-keeping operations of the disordered order of the primitives and the reversed order of the vertices, and attack the disordered sequence of the primitives and the reversed order of the vertices robust.
附图说明Description of drawings
图1基于标记的矢量地图完整性认证方法流程图;Fig. 1 is a flow chart of the vector map integrity authentication method based on markers;
图2嵌入认证水印前的矢量地图(高斯山雪块地图);Figure 2 is the vector map (Gaussian snow block map) before embedding the authentication watermark;
图3嵌入认证水印后的矢量地图(高斯山雪块地图);Figure 3 is the vector map (Gaussian snow block map) after embedding the authentication watermark;
图4发生篡改的含水印矢量地图(高斯山雪块地图);Fig. 4 The tampered watermarked vector map (Gaussian snow block map);
图5定位篡改的矢量地图(高斯山雪块地图)。Figure 5. The vector map for locating tampering (Gaussian snow block map).
具体实施方式Detailed ways
下面结合附图和实例对本发明技术方案做进一步的描述:Below in conjunction with accompanying drawing and example technical solution of the present invention is described further:
如图1所示,本发明基于标记的矢量地图完整性认证方法流程图,该方法总体分为两个方面:A、矢量地图水印嵌入算法;B、矢量地图水印认证算法。As shown in Figure 1, the flow chart of the mark-based vector map integrity authentication method of the present invention is generally divided into two aspects: A, vector map watermark embedding algorithm; B, vector map watermark authentication algorithm.
A、矢量地图水印嵌入算法,步骤如下:A. Vector map watermark embedding algorithm, the steps are as follows:
B、(1)识别可嵌入水印顶点坐标;B. (1) Identify the vertex coordinates that can be embedded in the watermark;
C、依据矢量地图的精度误差容限,识别可嵌入水印顶点坐标。判定图元顶点的x坐标和y坐标是否是可嵌入水印顶点坐标的方法一样,本发明以x坐标为例,说明可嵌入水印顶点坐标的判定方法。C. According to the precision error tolerance of the vector map, identify the vertex coordinates that can be embedded in the watermark. The method for judging whether the x-coordinate and y-coordinate of the vertex of the graphic element are the vertex coordinates that can be embedded in the watermark is the same. The present invention uses the x-coordinate as an example to illustrate the method for judging the vertex coordinates that can be embedded in the watermark.
假设矢量地图M包含N个线图元,记为P1,P2,…,PN,Pj表示第j(j=1,2,…,N)个线图元,Pj包含u个顶点V1(x1,y1),V2(x2,y2),…,Vu(xu,yu),Vm(xm,ym)(m=1,2,…,u)表示Pj的第m个顶点,xm和ym分别为顶点Vm的x坐标和y坐标,和分别为线图元Pj中x坐标的最大值和最小值。判定顶点Vm的x坐标xm是否是可嵌入水印顶点坐标的具体方法如下:Suppose the vector map M contains N line primitives, denoted as P 1 , P 2 ,...,P N , P j represents the jth (j=1,2,...,N) line primitives, and P j contains u Vertices V 1 (x 1 ,y 1 ), V 2 (x 2 ,y 2 ),…,V u (x u ,y u ), V m (x m ,y m )(m=1,2,… , u) represents the mth vertex of P j , x m and y m are the x coordinates and y coordinates of the vertex V m respectively, and are the maximum and minimum values of the x-coordinates in the line primitive P j , respectively. The specific method for judging whether the x-coordinate x m of the vertex V m is the vertex coordinate that can embed the watermark is as follows:
a.将和之间的距离平均分为段,a. Will and The average distance between part,
其中,表示每段的长度,的取值需满足以下条件,in, Indicates the length of each segment, The value of must meet the following conditions,
式中,τ为矢量地图M的精度误差容限。In the formula, τ is the precision error tolerance of the vector map M.
b.依据每段的长度计算坐标xm所在段的边界端点,b. According to the length of each segment Compute the boundary endpoints of the segment whose coordinates x m are located,
式中,表示坐标xm所在段的索引值,和分别表示限定坐标xm所在段范围的边界左端点和边界右端点。将xm和视为一个间隔 In the formula, Indicates the index value of the segment where the coordinate x m is located, and Respectively represent the boundary left endpoint and the boundary right endpoint that limit the range of the segment where the coordinate x m is located. Will x m and as an interval
c.若xm满足以下条件,c. If x m satisfies the following conditions,
称xm为可嵌入水印顶点坐标。将线图元Pj中可嵌入水印顶点坐标的数目记为 Call x m the vertex coordinates of the embeddable watermark. The number of embeddable watermark vertex coordinates in the line primitive P j is recorded as
(2)自适应划分图元组;(2) Adaptively divide the graph element group;
依据图元中可嵌入水印顶点坐标的数目,将矢量地图图元自适应地划分为互不重叠的组。本发明中每组的认证水印长度为L比特,每个可嵌入水印顶点坐标嵌入的水印长度为c(c=1,2,…)比特。因此,每组所需的可嵌入水印顶点坐标数目为假设图元组的数目为Ng(1≤Ng≤N),第i(i=0,1,…,Ng–1)个图元组为Gi,Gi所含的可嵌入水印顶点坐标数目为若在图元组Gi中完全嵌入其对应的L比特的认证水印,和Nr需满足如下关系,According to the number of vertex coordinates that can embed the watermark in the primitive, the vector map primitives are adaptively divided into non-overlapping groups. In the present invention, the authentication watermark length of each group is L bits, and the watermark length embedded in the vertex coordinates of each embeddable watermark is c (c=1, 2, . . . ) bits. Therefore, the number of embeddable watermark vertex coordinates required for each group is Suppose the number of tuple groups is N g (1≤N g ≤N), and the i (i=0,1,…,N g –1) tuple group is G i , and the embeddable watermark contained in G i The number of vertex coordinates is If the corresponding L-bit authentication watermark is completely embedded in the tuple group G i , and N r need to satisfy the following relationship,
利用以下方法划分图元组:Groups of primitives are divided using the following methods:
a.将条线图元划分到图元组G0中,为满足如下关系的最小正整数,a. Will The bar line primitives are divided into the primitive group G 0 , is the smallest positive integer that satisfies the following relation,
b.依据步骤(a)的方法,顺次将余下的图元划分为若干组。即对于任意图元组Gi(i>0),从余下的图元中选择条线图元作为其成员,b. According to the method of step (a), divide the remaining graphic elements into several groups in sequence. That is, for any group of primitives G i (i>0), select from the remaining primitives bar line primitive as its member,
为满足如下关系的最小正整数, is the smallest positive integer that satisfies the following relation,
δ为图元组G0至图元组Gi-1中所有图元的数目,即δ is the number of all primitives in the primitive group G 0 to the primitive group G i-1 , namely
c.由于顺次将图元划分为组,最后一组的图元可能无法提供足够嵌入空间,此时,将最后一组的图元划分至倒数第二组中。c. Since the primitives are divided into groups sequentially, the primitives of the last group may not provide enough embedding space. At this time, the primitives of the last group are divided into the penultimate group.
将图元组Gi所含的线图元记为 Record the line primitives contained in the primitive group G i as
(3)生成认证水印;(3) Generate an authentication watermark;
利用散列算法,生成步骤(2)中每个图元组的认证水印。将图元组Gi(i=0,1,…,Ng–1)的认证水印记为Hi,Using a hash algorithm, generate an authentication watermark for each tuple group in step (2). Mark the authentication watermark of the tuple group G i (i=0,1,...,N g -1) as H i ,
Hi={hi,j∈{0,1},j=0,1,...,L-1}H i ={h i,j ∈{0,1},j=0,1,...,L-1}
其中,L表示Hi中比特的数目,hi,j(j=0,1,…,L–1)表示Hi的第j个比特。Wherein, L represents the number of bits in H i , and h i,j (j=0,1,...,L–1) represents the jth bit of H i .
生成认证水印Hi的方法如下:The method of generating authentication watermark H i is as follows:
Hi=grouphash(hash(I(Gi),k,i,Vi,Min),L,K)H i =grouphash(hash(I(G i ),k,i,V i ,M in ),L,K)
其中,I(·)表示获取空间数据和属性数据的方法,k表示生成hash(·)输入参数的私钥,Vi图元组Gi顶点的数目,Min表示该矢量地图的索引值,hash(·)表示一个已有的加密哈希算法,grouphash(Hi a,L,K)表示在私钥K的控制下从比特序列Hi a中选择L比特的方法。Among them, I(·) represents the method for obtaining spatial data and attribute data, k represents the private key for generating hash(·) input parameters, the number of vertices of the V i graph tuple G i , and Min represents the index value of the vector map, hash( ) represents an existing cryptographic hash algorithm, and grouphash(H ia ,L,K) represents a method of selecting L bits from the bit sequence H ia under the control of the private key K.
方法I(·)获取图元组Gi的空间数据时,按照如下方法扫描该组的图元顶点:依据图元的存储顺序,顺次扫描Gi的线图元,即从扫描至在每条线图元中,从第一个顶点扫描至最后一个顶点。Method I(·) When obtaining the spatial data of the primitive group G i , scan the vertices of the primitives in this group as follows: According to the storage order of the primitives, scan the line primitives of G i sequentially, that is, from scan to In each line primitive, scan from the first vertex to the last vertex.
将Hi转换为待嵌入水印序列Wi={wi,j|wi,j=0,1,…,2c–1,j=0,1,…,Nr–1},Convert H i to the watermark sequence to be embedded W i ={w i,j |w i,j =0,1,…,2 c –1,j=0,1,…,N r –1},
wi,j=hi,j×c×2c-1+hi,j×c+1×2c-2+…+hi,(j+1)×c-1×20 w i,j =h i,j×c ×2 c-1 +h i,j×c+1 ×2 c-2 +…+h i,(j+1)×c-1 ×2 0
(4)嵌入认证水印;(4) Embed authentication watermark;
利用基于间隔的状态值的可逆信息隐藏方法,将步骤(3)中生成的待嵌入水印序列Wi(i=0,1,…,Ng–1)嵌入到图元组Gi的前Nr个可嵌入水印顶点坐标中。假定可嵌入水印顶点坐标xm对应的间隔为间隔Qm的状态值的定义如下:Using the reversible information hiding method based on interval state values, the embedded watermark sequence W i (i=0,1,…,N g –1) generated in step (3) is embedded in the first N of the primitive group G i r can be embedded in the watermark vertex coordinates. Assume that the interval corresponding to the embeddable watermark vertex coordinate x m is The definition of the state value for the interval Qm is as follows:
将Qm平均分为P(P≥2)个子间隔,xm所在子间隔的索引值即为间隔Qm的状态值。Divide Q m into P (P≥2) sub-intervals on average, and the index value of the sub-interval where x m is located is the state value of the interval Q m .
由于本发明通过改变间隔的状态值嵌入水印,xm对应的含水印顶点坐标xm'依旧位于区间中。Since the present invention embeds the watermark by changing the state value of the interval, the watermarked vertex coordinate x m ' corresponding to x m is still located in the interval middle.
假设在可嵌入水印顶点坐标xm中嵌入的水印为wi,j,具体步骤如下:Suppose the watermark embedded in the embeddable watermark vertex coordinate x m is w i,j , the specific steps are as follows:
a.计算间隔Qm的r状态,a. Compute the r-states for the interval Q m ,
b.将Qm平均分为2c+1个子间隔,计算间隔Qm对应的含水印间隔的状态值s,即xm'所在的子间隔的索引值,b. Divide Q m into 2 c+1 sub-intervals on average, and calculate the watermark interval corresponding to the interval Q m The state value s of , that is, the index value of the subinterval where x m ' is located,
s=2c×r+wi,j s=2 c ×r+w i,j
c.计算含水印坐标xm',c. Calculate the watermark coordinate x m ',
其中,in,
在图元组Gi中嵌入其对应的认证水印记Hi后,得到含水印图元组Gi w。将Gi w的含水印线图元记为 After embedding its corresponding authentication watermark H i in the primitive group G i , the watermarked primitive group G i w is obtained. Denote the watermarked line primitive of G i w as
(5)标记图元;(5) mark the graphic element;
利用插入顶点的方法,在每个含水印图元中嵌入指示其所在的图元组的标记。假 设图元组Gi w的线图元包含f个顶点,记为 表示的第t个顶 点,和分别为顶点Vt w的x坐标和y坐标,待插入的顶点为Vg(xg,yg),xg和yg分别为顶点 Vg的x坐标和y坐标。在中标记其所在图元组Gi w的具体步骤如下: Using the method of inserting vertices, a mark indicating the group of primitives it is in is embedded in each watermarked primitive. Assume that the line primitives of the primitive group G i w Contains f vertices, denoted as The tth vertex represented by , and are the x-coordinate and y-coordinate of vertex V t w respectively, the vertex to be inserted is V g (x g , y g ), and x g and y g are the x-coordinate and y-coordinate of vertex V g respectively y-coordinate. The specific steps to mark the graph element group G i w where it is located in are as follows:
a.将顶点V1 w和之间的距离平均分为Nt(Nt=2×Ng)段,每段的长度为lt,a. The vertices V 1 w and The distance between is divided into N t (N t =2×N g ) sections on average, and the length of each section is l t ,
b.在第i段的中点插入顶点Vg,并以此标记所在的图元组Gi w,b. Insert the vertex V g at the midpoint of the i-th segment, and mark it as The tuple group G i w where it is located,
其中,in,
将插入的顶点称作位置顶点。在中嵌入标记后,得到其对应的含标记图元具有如下特征:The inserted vertex is called a position vertex. exist After embedding the mark in , get its corresponding marked primitive Has the following characteristics:
i)一端的三个连续顶点在同一条直线上,这一端为的起始端。假设从起始端扫描获取的顶点为 Vt m(t=1,2,…,f+1)表示的第t个顶点,和分别为顶点Vt m的x坐标和y坐标,则为插入的位置顶点;i) Three consecutive vertices at one end are on the same straight line, this end is the starting end of . Assuming that the scan obtained from the start Vertex is V t m (t=1,2,…,f+1) means the tth vertex of and are the x-coordinates and y-coordinates of the vertex V t m respectively, then is the inserted position vertex;
ii)按如下方法,计算得到所在图元组的索引值i,ii) According to the following method, calculate The index value i of the tuple group where it is located,
按照含标记图元的特征,能够正确识别其位置顶点,并获得其所在的图元组。According to the feature of the marked primitive, it can correctly identify its position vertex, and obtain its primitive group.
在每个图元中插入标记后,得到含标记矢量地图。如图2-3所示,为认证水印嵌入前后矢量地图对比情况,其中图2为原始高斯山雪块地图,图3为嵌入认证水印后的情况。After inserting markers in each primitive, a vector map with markers is obtained. As shown in Figure 2-3, it is the comparison of the vector map before and after the authentication watermark is embedded, in which Figure 2 is the original Gaussian snow block map, and Figure 3 is the situation after the authentication watermark is embedded.
B、矢量地图水印认证算法B. Vector map watermark authentication algorithm
(6)水印认证及原始数据恢复;(6) Watermark authentication and original data recovery;
依据图元标记及可逆信息隐藏方法,恢复矢量地图数据并定位篡改,具体步骤如下:According to the primitive labeling and reversible information hiding method, the vector map data is restored and the tampering is located. The specific steps are as follows:
a.识别原始图元组;a. Identify the original primitive group;
依据步骤(5)中含标记图元的特征,识别每个图元组的原始图元,并删除插入的位置顶点。According to the feature of the marked primitive in step (5), identify the original primitive of each primitive group, and delete the inserted position vertex.
b.水印提取及原始数据恢复;b. Watermark extraction and original data recovery;
利用步骤(1)的可嵌入水印顶点坐标判定方法,识别图元组的含水印可嵌入水印顶点坐标,提取水印并恢复矢量地图原始数据。从含水印图元组Gi w(i=0,1,…,Ng–1)的可嵌入水印坐标xm'中提取水印信息的具体步骤如下:Using the embeddable watermark vertex coordinate judgment method in step (1), the vertex coordinates of the watermark-containing embeddable watermark in the primitive group are identified, the watermark is extracted and the original data of the vector map is restored. The specific steps for extracting watermark information from the embeddable watermark coordinates x m ' of the watermarked primitive group G i w (i=0,1,...,N g –1) are as follows:
p1.依据步骤(4)的子步骤(a),计算xm'对应的含水印间隔的r状态;p1. According to sub-step (a) of step (4), calculate the watermark interval corresponding to x m ' the r state;
p2.将间隔Qm'平均分为2c+1个子间隔,计算每个子间隔的长度ls,p2. Divide the interval Q m 'on average into 2 c+1 sub-intervals, calculate the length l s of each sub-interval,
p3.计算间隔Qm'的状态值s,p3. Calculate the state value s of the interval Q m ',
p4.提取水印wi,j',p4. Extract watermark w i,j ',
wi,j'=s-r×2c w i,j '=sr×2 c
p5.恢复xm'的原始数据,p5. restore the original data of x m ',
其中,in,
将恢复数据后的含水印图元组Gi w记为Gi',从Gi w中提取出的水印序列记为Wi'={wi,j'|wi,j'=0,1,…,2c–1,j=0,1,…,Nr–1}。利用以下公式,将Wi'转化为二进制序列Hi'={hi,j'|hi,j'∈{0,1},j=0,1,…,L–1},Denote the watermarked tuple group G i w after recovering data as G i ', and the watermark sequence extracted from G i w as W i '={w i,j '|w i,j '=0, 1,...,2 c -1,j=0,1,...,N r -1}. Using the following formula, convert W i ' into a binary sequence H i '={h i,j '|h i,j '∈{0,1},j=0,1,...,L–1},
c.生成认证水印;c. Generate authentication watermark;
利用步骤(3)的方法,生成每个恢复数据后的图元组的认证水印。假设为图元组Gi'(i=0,1,…,Ng–1)生成的认证水印为Hi”={hi,j”|hi,j”∈{0,1},j=0,1,…,L–1}。Using the method in step (3), an authentication watermark of each tuple group after the data recovery is generated. Assume that the authentication watermark generated for the tuple group G i '(i=0,1,...,N g –1) is H i ”={h i,j ”|h i,j ”∈{0,1}, j=0,1,...,L–1}.
d.水印认证;d. Watermark authentication;
依据图元组Gi'(i=0,1,…,Ng–1)中提取出的水印Hi'和生成的水印Hi”,判定该图元组是否发生篡改。若Hi'=Hi”,则该组未发生篡改;否则该组发生了篡改。Based on the extracted watermark H i ' and the generated watermark H i ” in the primitive group G i ' (i=0,1,...,N g –1), determine whether the primitive group has been tampered with. If H i ' =H i ”, then no tampering has occurred in this group; otherwise, tampering has occurred in this group.
验证完每个图元组的完整性后,显示所有被篡改的图元。图4所示为图3的含水印高斯山雪块地图发生篡改后的矢量地图,在区域A、B、C中发生了篡改。图5中,检测完每个图元组的完整性后,发生篡改的图元组的图元显示为深灰色。可以看出,本发明能够准确定位篡改。After verifying the integrity of each primitive group, display all tampered primitives. Figure 4 shows the tampered vector map of the watermarked Gaussian Mountain snow block map in Figure 3, where tampering occurred in areas A, B, and C. In Figure 5, after the integrity of each primitive group is detected, the primitives of the tampered primitive group are displayed in dark gray. It can be seen that the present invention can accurately locate tampering.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510883547.5A CN105488434B (en) | 2015-12-03 | 2015-12-03 | A kind of map vector completeness certification method based on label |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510883547.5A CN105488434B (en) | 2015-12-03 | 2015-12-03 | A kind of map vector completeness certification method based on label |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105488434A CN105488434A (en) | 2016-04-13 |
CN105488434B true CN105488434B (en) | 2018-11-02 |
Family
ID=55675406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510883547.5A Active CN105488434B (en) | 2015-12-03 | 2015-12-03 | A kind of map vector completeness certification method based on label |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105488434B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106056528A (en) * | 2016-05-31 | 2016-10-26 | 华中科技大学 | Engineering drawing copyright protection and modification positioning method |
CN106599727B (en) * | 2016-12-02 | 2019-01-25 | 江苏师范大学 | A Vector Map Integrity Authentication Method |
CN106886973B (en) * | 2017-03-21 | 2020-06-02 | 江苏师范大学 | A vector map integrity authentication method for locating tampered areas |
CN107154011B (en) * | 2017-03-21 | 2020-09-15 | 江苏师范大学 | A Vector Map Integrity Authentication Method for Positioning Tampered Graph Tuples |
CN111510672A (en) * | 2020-03-19 | 2020-08-07 | 西安电子科技大学 | Video tampering recovery processing method, system, storage medium and encoder |
CN113051357B (en) * | 2021-03-08 | 2022-09-30 | 中国地质大学(武汉) | A local desensitization method for vector map optimization based on game theory |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103903217A (en) * | 2014-03-28 | 2014-07-02 | 哈尔滨工程大学 | Vector map integrity authentication method based on vertex insertion |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0119629D0 (en) * | 2001-08-10 | 2001-10-03 | Cryptomathic As | Data certification method and apparatus |
-
2015
- 2015-12-03 CN CN201510883547.5A patent/CN105488434B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103903217A (en) * | 2014-03-28 | 2014-07-02 | 哈尔滨工程大学 | Vector map integrity authentication method based on vertex insertion |
Non-Patent Citations (2)
Title |
---|
A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates;王娜娜等;《Computer-Aided Design》;20141231;第108-117页 * |
Reversible fragile watermarking for locating tampered blocks in 2D vector maps;王娜娜等;《Multimed Tools Appl》;20130119;第709-739页 * |
Also Published As
Publication number | Publication date |
---|---|
CN105488434A (en) | 2016-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105488434B (en) | A kind of map vector completeness certification method based on label | |
Wang et al. | Reversible fragile watermarking for 2-D vector map authentication with localization | |
Wang et al. | Reversible fragile watermarking for locating tampered blocks in 2D vector maps | |
CN106204411A (en) | Vector settlement place Zero watermarking method based on not bending moment and Hilbert code | |
CN101458810A (en) | Vector map watermark method based on object property characteristic | |
CN103377457B (en) | A kind of vector geographic data Hard Authentication vulnerable watermark method | |
US11983789B1 (en) | Generation method, detection method, generation device, and detection device of zero watermarking for trajectory data, and storage medium | |
CN101576993B (en) | Digital watermark embedding and extraction method for GIS vector data based on data mask | |
CN102800041A (en) | Method for protecting integrity of digital vector map | |
CN108470318B (en) | Three-dimensional grid double watermarking method based on grouping strategy and neighborhood relation positioning | |
CN102184244A (en) | High-robustness geographical database watermark method suitable for polygon type | |
Li et al. | Study on copyright authentication of GIS vector data based on Zero-watermarking | |
Liu et al. | Image authentication using QR code watermarking approach based on image segmentation | |
CN103903217A (en) | Vector map integrity authentication method based on vertex insertion | |
CN102073978A (en) | Method and system for identifying and recovering digital images by utilizing irregular region segmentation | |
CN106599727B (en) | A Vector Map Integrity Authentication Method | |
Zheng et al. | A fragile digital watermark used to verify the integrity of vector map | |
CN103886536A (en) | Digital-watermark realization method for positioning of digital-image tampering | |
Zhou et al. | Storage feature-based watermarking algorithm with coordinate values preservation for vector line data | |
CN110288505B (en) | Space vector geographic space data digital watermarking method for resisting geometric transformation attack | |
CN102663673B (en) | A Fragile Watermarking Method Based on Chaotic Mapping for Shp Line-Surface Layer | |
CN110415156B (en) | Lossless watermarking method and lossless watermarking detection method | |
CN107358072A (en) | Map vector digital finger-print copy-right protection method based on I codes and CFF codes | |
CN102682246B (en) | Vector geographic data digital watermark method based on data point positioning | |
CN105426710B (en) | A kind of vector geographic data Hard Authentication method based on spatial domain sequence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20200424 Address after: 221416 e-commerce Incubation Park, ban Shenshan village, Beigou street, Xinyi City, Xuzhou City, Jiangsu Province Patentee after: Xuzhou Shenshan Intelligent Technology Co., Ltd Address before: 221000 Shanghai Road, Copper Mt. District, Jiangsu, No. 101, No. Patentee before: Jiangsu Normal UNIVERSITY |
|
TR01 | Transfer of patent right |