CN101576993A - Digital watermark embedding and extraction method for GIS vector data based on data mask - Google Patents
Digital watermark embedding and extraction method for GIS vector data based on data mask Download PDFInfo
- Publication number
- CN101576993A CN101576993A CNA2009100329215A CN200910032921A CN101576993A CN 101576993 A CN101576993 A CN 101576993A CN A2009100329215 A CNA2009100329215 A CN A2009100329215A CN 200910032921 A CN200910032921 A CN 200910032921A CN 101576993 A CN101576993 A CN 101576993A
- Authority
- CN
- China
- Prior art keywords
- data
- line
- vector data
- information
- watermark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Abstract
The invention discloses a digital watermark embedding and extraction method for GIS vector data based on a data mask. The method ensures that element vertexes of carrier data above or below a strip reference line of a mask represent bit '1' or '0' by modifying the mask corresponding to the carrier data based on a watermark embedding principle of the relation, thereby obtaining corresponding watermark information according to the relation during the detection. The method modifies mask data, but not the carrier data so as not to cause any influence on the accuracy of the carrier data; moreover, the mask data can be synchronously transformed with the carrier data, so the method has better robustness on various operations such as projection operation, geometric transformation, data compression and the like.
Description
Technical field
The invention belongs to geography information copyright protection field, be specifically related to a kind of GIS vector data data waterprint embedded method and extracting method thereof that covers plate based on data.
Background technology
The GIS vector data is national important strategic information resources; be the basic data information of economy and national defense construction and social development; have characteristics such as high production cost and high precision; its copyright protection research concerns the construction of China's geography information digital product copyright protecting system; the socialization of sharing, exchanging and serve of geography information; the formation of copyright protection draft legislation, the sound development of construction of national information safety and geography information related industry.Copyright protection is that copyright authentication, the content on the copyright mark basis maintained secrecy and access control.In recent years, be that the copyright mark technology of representative becomes present copyright protection research and the emphasis of using day by day with the digital watermarking.Also less relatively at present at the research of the copyright mark of GIS vector data product, mainly contain method, based on the method for Laplce (Laplacian) spectrum domain of topological relation figure and based on the algorithm of spatial domain etc. based on the geometric data transform domain.The multiple attack method of Chu Xianing thereupon, exposed the following weakness of present algorithm: a) be embedded in the copyright mark---watermark information in the geographical spatial data product, easily handled software by it--operations such as the coordinate transform of GIS software, projective transformation are wiped, and the robustness of algorithm is difficult to satisfy the needs of copyright authentication; B) robustness of algorithm requires embed watermark information as much as possible, and the embedding meeting of watermark affects to the data precision, even has destroyed the topological consistance between expressed geographic element.
Summary of the invention
The objective of the invention is to deficiency at existing GIS vector data digital watermark technology, storage characteristics, use-pattern and attack etc. according to the GIS vector data, a kind of data waterprint embedded method and extracting method thereof that covers plate based on the GIS vector data proposed, requirement has robustness for all multioperations such as projection operation, the conversion of geometric transformation equiaffine and data compressions, and does not reduce the precision of initial carrier data.
Basic thought of the present invention is: based on the watermark embedding principle of relation, by revising the corresponding plate that covers of carrier data, make carrier data key element summit in covering plate the band reference line above or below represent bit " 1 " or " 0 ", thereby when detecting, just can obtain corresponding watermark information (shown in Figure 1) according to relation.This method is owing to be revise to cover the plate data, rather than carrier data, thereby can not have any impact to the carrier data precision.And, since cover the plate data can with the synchronous conversion of carrier data, this algorithm has robustness preferably for all multioperations such as projection operation, geometric transformation and data compressions.
The present invention is based on data and cover the GIS vector data data waterprint embedded method of plate, its step is as follows:
(1) according to generating watermark encoder w (scale-of-two is encrypted watermark information, is called for short watermark information, also claims the scale-of-two watermark encoder) with user-dependent copyright information m.If copyright information is a Chinese-character text information, then can change, ASCII character conversion, thresholding conversion, encryption be to the Chinese-character text information processing by Hanzi internal code, generate scale-of-two and encrypt watermark information; If copyright information is an English text information, then can change, thresholding conversion, encryption carry out information processing by ASCII character, generate scale-of-two and encrypt watermark information; If copyright information is a numerical information, then can change, encryption by thresholding, generate scale-of-two and encrypt watermark information; If copyright information is an image information, then can pass through compression of images, based on the chaos scramble of Logistic mapping, remove that dimension is handled, codomain transforms Image Information Processing, generate scale-of-two encryption watermark information;
(2) read the GIS vector data x of watermark to be loaded.The key element of GIS vector data all constitutes with summit (vertex), with in the reading vector data all the summit of key elements (point, line, surface) extract, and the vertex set (coordinate point set) of whole key elements (point, line, surface) is designated as v;
(3) set up corresponding with it digital watermarking based on vertex set v and cover plate figure layer mask.Concrete building process is as follows:
1) the precision limit difference τ according to original vector data (the GIS vector data x of watermark to be loaded) determines buffer zone scope buf (buf=τ/4);
2) from vertex set v, choose a coordinate points P at random,, be designated as P if P point other coordinate points among the no v in buf is the circle of radius then meets the demands
1, otherwise picked at random again;
3) determine P
1After, then in v, begin to search for second some P
2, criterion is based on P
2P
1The width of line is other coordinate points that whether contains in the wire buffer zone of 2*buf among the v.If there is not other point, then be designated as P
2If there is other point, then this point does not meet the demands.To one times of same direction search expanded range, continue in vertex set v, to search for;
4) circulation step 3), based on P
n, search P
N+1Concrete grammar is: judging point P
nWith P
N+1Whether comprise other point among the vertex set v in the line buffer zone.Because the hunting zone is to derive to same direction, when the hunting zone surpasses figure layer coordinate range (x1, y1; X2 stops search in the time of y2).Record line segment P
1, P
2... P
N+n, in vertex set v, get rid of a P
1, P
2..., P
n
5) the binary code sequence w of water intaking seal coding w
iIf, be encoded to " 1 ", then with line segment P1, P2 ... Pn+1 is to buf*2/5 coordinate unit of y positive dirction translation.If be encoded to " 0 ", then to buf*2/5 unit of y negative direction translation.So just formed the line of reference that to represent a watermark encoder;
6) line of reference that step 5) is generated writes the illiteracy plate figure layer of generation, and its FID value is pressed the sequence of natural numbers value;
7) at point set v, repeated execution of steps 2) to 6) step, finish every binary code sequence w in turn
iInformation storage, thereby the plate generation of (be called for short digital watermarking and cover plate) (the GIS vector data digital watermarking of covering plate based on data embeds) is covered in the GIS vector data digital watermarking of finishing whole moisture official seal breath.
Based on the GIS vector data digital watermarking extracting method of data illiteracy plate, step is:
(1) reads GIS vector data (generally being suspicious GIS vector data, copyright to be verified), and the key element vertex data is designated as vertex set v;
(2) read the line of reference that the plate file is covered in the corresponding digital watermarking of GIS vector data, cover the line of reference of plate with digital watermarking vertex set v is made buffer zone analysis.If in the buffer zone scope, the coordinate points major part of suspicious GIS vector data all then obtains bit value and is " 1 " above line of reference; If the coordinate points major part all below line of reference, obtains bit value and is " 0 ".If do not detect coordinate points or coordinate points be distributed in simultaneously line of reference above or below, then obtain " null ";
(3) cover the FID value of every line of reference in the plate according to digital watermarking, order reads every line of reference from small to large, circulation execution in step (2), obtain every binary coding after, be combined as extraction watermark encoder w sequentially.
The watermark encoder and the original watermark coding that extract are compared, differentiate its similarity.If can extract efficient watermark coding, and the two similarity is greater than threshold value ζ, then the copyright ownership of provable suspicious works.
The inventive method, owing to be to revise to cover the plate data, rather than carrier data, thereby can not have any impact to the carrier data precision.And, since cover the plate data can with the synchronous conversion of carrier data, this algorithm has robustness preferably for all multioperations such as projection operation, geometric transformation and data compressions.And do not reduce the precision of initial carrier data.
Description of drawings
Fig. 1 embeds synoptic diagram based on the watermark information of buffer zone band.Wherein, in the buffer zone band, mate among the figure a " 1 ", in the buffer zone band, mate among the figure b " 0 ".
Fig. 2 digital watermarking is covered plate and is generated stream signal journey figure.
Fig. 3 extracts the summit of original experiment data, and (a figure is: 1: 1 ten thousand topomap in the Purple Mountain, Nanjing; Figure b is the summit design sketch of 1: 1 ten thousand topomap in the Purple Mountain, Nanjing).
What Fig. 4 P1 was ordered chooses.
Fig. 5 is with reference to the formation condition of line segment, wherein: figure a is ineligible, and figure b is eligible.
Fig. 6 digital watermarking is covered plate and is generated certain line of reference.
Fig. 7 line of reference moves rule, wherein, and figure a representative " 1 ", figure b representative " 0 ".
Fig. 8 generates digital watermarking and covers plate.
Sectional drawing is extracted in Fig. 9 digital watermarking.
Sectional drawing is attacked in the cutting of Figure 10 data.
Embodiment
Below in conjunction with drawings and Examples technical scheme of the present invention is further described.In this example, read vector graphics file with arcgis desktop, test figure is 1: 1 ten thousand topomap in the Purple Mountain, Nanjing, and shp form, copyright information are " Nanjing Normal University "; Select figure layer JMD_M, DLSS_L is the lab diagram layer, Gauss projection, and the WGS84 coordinate system, the summit of extracting experimental data forms vertex set figure layer pointfeatureclass, shown in Fig. 3 .b; Buf=0.5 coordinate unit of buffer zone scope.Set up digital watermarking illiteracy plate figure layer name and be called Polyline.
Specific implementation process is as follows:
One, the GIS vector data covers plate generation and digital watermarking embedding
(1) watermark encoder generates.During GIS vector data program release, generate corresponding watermark encoder (claiming watermark information again) w according to the copyright information m that will embed.This sentences the copyright information that " Nanjing Normal University " Chinese-character text information is used for authentication, Hanzi internal code conversion, ASCII character conversion, thresholding conversion etc. generate following scale-of-two watermark information: 01,000,011,010,001,000,011,010,001,100,100,001,001,000,101,010,000,010,101 100101000011010000010100000100110110 to the Chinese-character text information processing
(2) read the GIS vector data x of watermark to be loaded, and generate vertex set v (shown in Fig. 3 .a);
(3) set up corresponding with it digital watermarking based on vertex set v and cover printed line figure layer mask.Concrete building process is as follows:
1) picked at random coordinate points P1 from vertex set v, its coordinate is (139.326.642,147816.487), its OBJECTID:1987.Do not have other coordinate points in the round buffer zone scope of 0.5 coordinate unit of this point, meet the demands, be designated as P1 (shown in Figure 4);
2) begin to seek P2, the basis, hunting zone is a 2*0.5=1 coordinate unit, in this hunting zone, select a coordinate points (139371.847,147618.509), and judge in the wire buffer zone of 0.5 coordinate unit of this point and P1 line whether contain other coordinate points, condition satisfies, and then this point is designated as P2 (139371.847,147618.509); If this point is not if satisfy, search (shown in Figure 5) once more after one times of same direction search expanded range stops search when the hunting zone surpasses watermark encoder embedded coordinate scope;
3) circulation step 3), based on Pn, search Pn+1.After stopping search, all satisfactory point coordinate are generated a line of reference (shown in Figure 6), and from vertex set v, get rid of the each point that searches in the generation line of reference process.This line segment except that the point that searches, will not have other coordinate points to exist in buffer zone buf scope like this;
4) read first binary coding of watermark encoder w; W1=0 is then line of reference 0.2 coordinate unit of translation that makes progress; Thus, the new line of reference of formation meets in 0.3 coordinate unit buffer zone scope on one side coordinate points, and does not have reference mark (shown in Figure 7) in the scope of another side 0.3;
5) line of reference that generates is write illiteracy plate figure layer, its FID value gets 1;
6) read the next bit binary coding of watermark encoder, repeating step 1) to 4).All generated the digital watermarking of forming with line of reference until all watermark encoder binary codings and covered plate, also just finished plate generation (shown in Figure 8) is covered in the digital watermarking of GIS vector data with this algorithm;
Two, digital watermarking is extracted
(1) when suspicious GIS vector data need authenticate, obtains the digital watermarking of this data correspondence and cover plate;
(2) according to the coordinate system and the projection of suspicious GIS vector data, the converting digital watermark is covered plate and is made it consistent with suspicious GIS vector data, and suspicious GIS vector data figure layer and digital watermarking are covered stacked adding of plate figure;
(3) read suspicious GIS vector data, and be organized as vertex set v;
(4) read the line of reference that the plate file is covered in digital watermarking, cover the line of reference of plate with digital watermarking vertex set v is made buffer zone analysis.If in the buffer zone scope, the coordinate points major part of suspect product data all then obtains bit value and is " 1 " above line of reference; If the coordinate points major part all below line of reference, obtains bit value and is " 0 ".If do not detect coordinate points or coordinate points be distributed in simultaneously line of reference above or below, then obtain " null ";
(5) circulation execution in step (4), FID value according to reference point, read digital watermarking from small to large successively and cover every line of reference in the plate, every binary coding that combination is obtained. should be with obtaining following scale-of-two watermark encoder in the example: 01,010,111,010,100,111,010,110,001,001,110,000,010,000,101,111,000,000,011 1000001100100111010110010110011001011011;
(6) the above-mentioned binary coding that obtains is reduced to original watermark information, utilize the Unicode coding, a Chinese character is to take 16 binary codings, therefore, Chinese character " south " is just represented in " 0101011101010011 " representative " 87; 83 " of binary file, by that analogy, can obtain the watermark information (shown in Figure 9) of " Nanjing Normal University ";
(7) similarity that the shared ratio of utilization value null is carried out between original watermark information and the extraction watermark information is calculated.In this example, because the data attack operation is carried out at the end, similarity result of calculation is 100%.
Three, attack test and performance evaluation
(1) compression attack.Raw data is carried out compression attack based on the Generalize compress order of ARCGIS9.2.When ratio of compression reached 50%, the watermark information of " Nanjing Normal University " still can extract fully, when ratio of compression reaches 74%, occurred in the binary sequence of extraction " null ".By the algorithm principle analysis as can be known, guaranteeing that digital watermarking covers the reference mark of any line of reference in the plate and be not compressed fully under the condition that attack deletes, this method can be resisted data compression and be attacked.
(2) cutting is attacked.Raw data is carried out cutting, and effect as shown in figure 10.As seen, after this algorithm stood certain cutting attack, watermark information still can correctly extract.By the algorithm principle analysis as can be known, when only the coverage of any line of reference was sheared fully in covering plate, the watermark information of this line of reference just can be lost.In addition, the present invention can draw the similarity of suspicious GIS vector data and raw data by the probability of occurrence to " null " value, to such an extent as to still can provide strong copyright authentication evidence receiving under the situation of shearing attack in a big way.
(3) projective transformation, coordinate system transformation are attacked.These routine data can restore watermark information after operating through projective transformation, coordinate system transformation fully.By the algorithm principle analysis as can be known, the present invention can be by to covering the plate projection, and the projection of suspicious GIS vector data, influence that coordinate system transformation caused are eliminated in the synchronous conversion of coordinate system transformation.
Claims (2)
1, a kind of GIS vector data data waterprint embedded method based on data illiteracy plate, its step is as follows:
A, basis generate watermark encoder w with user-dependent copyright information m; If copyright information is a Chinese-character text information, then can change, ASCII character conversion, thresholding conversion, encryption be to the Chinese-character text information processing by Hanzi internal code, generate scale-of-two and encrypt watermark information; If copyright information is an English text information, then can change, thresholding conversion, encryption carry out information processing by ASCII character, generate scale-of-two and encrypt watermark information; If copyright information is a numerical information, then can change, encryption by thresholding, generate scale-of-two and encrypt watermark information; If copyright information is an image information, then can pass through compression of images, based on the chaos scramble of Logistic mapping, remove that dimension is handled, codomain transforms Image Information Processing, generate scale-of-two encryption watermark information;
B, read the GIS vector data x of watermark to be loaded; The key element of GIS vector data all constitutes with the summit, with in the reading vector data all the summit of key elements extract, and the vertex set of whole key elements is designated as v;
C, set up corresponding with it digital watermarking based on vertex set v and cover plate figure layer; Concrete building process is as follows:
A, determine buffer zone scope buf, buf=τ/4 according to the precision of original vector data limit difference τ;
B, from vertex set v, choose a coordinate points P at random,, be designated as P if P point other coordinate points among the no v in buf is the circle of radius then meets the demands
1, otherwise picked at random again;
C, determine P
1After, then in v, begin to search for second some P
2, criterion is based on P
2P
1The width of line is other coordinate points that whether contains in the wire buffer zone of 2*buf among the v; If there is not other point, then be designated as P
2If there is other point, then this point does not meet the demands; To one times of same direction search expanded range, continue in vertex set v, to search for;
D, circulation step c), based on P
n, search P
N+1Concrete grammar is: judging point P
nWith P
N+1Whether comprise other point among the vertex set v in the line buffer zone.Because the hunting zone is to derive to same direction, when the hunting zone surpasses figure layer coordinate range (x1, y1; X2 stops search in the time of y2); Record line segment P
1, P
2... P
N+1, in vertex set v, get rid of a P
1, P
2..., P
n
The binary code sequence w of e, water intaking seal coding w
iIf, be encoded to " 1 ", then with line segment P1, P2 ... Pn+1 is to buf*2/5 coordinate unit of y positive dirction translation; If be encoded to " 0 ", then to buf*2/5 unit of y negative direction translation; So just formed the line of reference that to represent a watermark encoder;
F, the line of reference that step e) is generated write the illiteracy plate figure layer of generation, and its FID value is pressed the sequence of natural numbers value;
G, at vertex set v, repeated execution of steps b) to f) step, finish every binary code sequence w in turn
iInformation storage, thereby finish the generation that plate is covered in the GIS vector data digital watermarking of whole moisture official seal breath.
2, a kind of claim 1 is described covers the extracting method of the GIS vector data digital watermarking of plate based on data, and step is:
A, read the GIS vector data, and the key element vertex data is designated as vertex set v;
B, read the line of reference that the plate file is covered in the corresponding digital watermarking of GIS vector data, cover the line of reference of plate with digital watermarking vertex set v is made buffer zone analysis:
If in the buffer zone scope, the coordinate points major part of suspicious GIS vector data all then obtains bit value and is " 1 " above line of reference; If the coordinate points major part all below line of reference, obtains bit value and is " 0 "; If do not detect coordinate points or coordinate points be distributed in simultaneously line of reference above or below, then obtain " null ";
C, according to the FID value that every line of reference in the plate is covered in digital watermarking, order reads every line of reference from small to large, circulation execution in step B, obtain every binary coding after, be combined as extraction watermark encoder w sequentially.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100329215A CN101576993B (en) | 2009-06-01 | 2009-06-01 | Digital watermark embedding and extraction method for GIS vector data based on data mask |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100329215A CN101576993B (en) | 2009-06-01 | 2009-06-01 | Digital watermark embedding and extraction method for GIS vector data based on data mask |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101576993A true CN101576993A (en) | 2009-11-11 |
CN101576993B CN101576993B (en) | 2011-11-16 |
Family
ID=41271926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009100329215A Expired - Fee Related CN101576993B (en) | 2009-06-01 | 2009-06-01 | Digital watermark embedding and extraction method for GIS vector data based on data mask |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101576993B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101968878A (en) * | 2010-11-18 | 2011-02-09 | 南京师范大学 | Multiple digital watermarking method for geographic information system (GIS) vector data |
CN102063694A (en) * | 2010-11-17 | 2011-05-18 | 安徽工业大学 | Digital image encryption method based on paper folding transformation |
CN102254296A (en) * | 2011-07-13 | 2011-11-23 | 南京师范大学 | Method for calculating similarity of Geographic Information System (GIS) vector data image watermarks |
CN102332079A (en) * | 2011-09-16 | 2012-01-25 | 南京师范大学 | GIS (geographic information system) vector data disguising and restoring method based on error random interference |
CN102456114A (en) * | 2010-10-25 | 2012-05-16 | 湖南大学 | Two-dimensional CAD (Computer Aided Design) engineering drawing content variable-strength encrypting method and device |
CN105550971A (en) * | 2015-12-15 | 2016-05-04 | 南京师范大学 | Vector geographic data confidentiality level identification method based on distance ratio modulation |
-
2009
- 2009-06-01 CN CN2009100329215A patent/CN101576993B/en not_active Expired - Fee Related
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102456114A (en) * | 2010-10-25 | 2012-05-16 | 湖南大学 | Two-dimensional CAD (Computer Aided Design) engineering drawing content variable-strength encrypting method and device |
CN102063694A (en) * | 2010-11-17 | 2011-05-18 | 安徽工业大学 | Digital image encryption method based on paper folding transformation |
CN102063694B (en) * | 2010-11-17 | 2013-04-24 | 安徽工业大学 | Digital image encryption method based on paper folding transformation |
CN101968878A (en) * | 2010-11-18 | 2011-02-09 | 南京师范大学 | Multiple digital watermarking method for geographic information system (GIS) vector data |
CN101968878B (en) * | 2010-11-18 | 2013-01-02 | 南京师范大学 | Multiple digital watermarking method for geographic information system (GIS) vector data |
CN102254296A (en) * | 2011-07-13 | 2011-11-23 | 南京师范大学 | Method for calculating similarity of Geographic Information System (GIS) vector data image watermarks |
CN102254296B (en) * | 2011-07-13 | 2012-10-24 | 南京师范大学 | Method for calculating similarity of Geographic Information System (GIS) vector data image watermarks |
CN102332079A (en) * | 2011-09-16 | 2012-01-25 | 南京师范大学 | GIS (geographic information system) vector data disguising and restoring method based on error random interference |
CN102332079B (en) * | 2011-09-16 | 2013-12-04 | 南京师范大学 | GIS (geographic information system) vector data disguising and restoring method based on error random interference |
CN105550971A (en) * | 2015-12-15 | 2016-05-04 | 南京师范大学 | Vector geographic data confidentiality level identification method based on distance ratio modulation |
CN105550971B (en) * | 2015-12-15 | 2018-07-20 | 南京师范大学 | A kind of vector geographic data security level identification method based on distance ratio modulation |
Also Published As
Publication number | Publication date |
---|---|
CN101576993B (en) | 2011-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101576993B (en) | Digital watermark embedding and extraction method for GIS vector data based on data mask | |
CN103310407B (en) | Based on the vectorial geographical spatial data total blindness water mark method of QR code | |
Wang et al. | Reversible fragile watermarking for locating tampered blocks in 2D vector maps | |
CN106204411B (en) | Vector settlement place Zero watermarking method based on not bending moment and Hilbert code | |
CN101246586A (en) | Vector map watermarking method based on curve segmentation | |
CN116385250B (en) | Track data double watermarking method based on robust watermarking and fragile watermarking | |
Ren et al. | Selective authentication algorithm based on semi-fragile watermarking for vector geographical data | |
CN104794671A (en) | Vector space data blind watermark method resistant to projection attack | |
CN103377457B (en) | A kind of vector geographic data Hard Authentication vulnerable watermark method | |
CN104794677A (en) | Vector map watermark method based on space geometric features | |
CN103955634A (en) | Copyright protecting method based on digital watermark technology and aiming at tile remote sensing data | |
Liu et al. | A zero-watermarking scheme with embedding timestamp in vector maps for Big Data computing | |
CN102800041A (en) | Method for protecting integrity of digital vector map | |
Li et al. | Study on copyright authentication of GIS vector data based on Zero-watermarking | |
CN116805069B (en) | Track data zero watermark generation method, track data zero watermark detection device and storage medium | |
Wang et al. | RST invariant fragile watermarking for 2D vector map authentication | |
CN101840473B (en) | Vector map copyright protection method based on non-linear transformation | |
CN111242825B (en) | Water depth feature-based ENC electronic nautical chart zero-watermarking method | |
KR100944488B1 (en) | Watermark Inserting Method to Vector data for using Azimuth Information and Watermark Detecting Method to the same | |
CN105023235A (en) | Electronic chart watermarking method based on space redundancy relation | |
CN104103031A (en) | Normalization-based vector spatial data blind watermark method | |
Wang et al. | 2D vector map fragile watermarking with region location | |
CN111339238B (en) | Vector geographic data digital watermarking method for resisting projective transformation | |
CN104091304A (en) | Vector spatial data blind watermarking method based on feature point | |
CN104866737B (en) | A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20111116 Termination date: 20140601 |