CN101576993A - Digital watermark embedding and extraction method for GIS vector data based on data mask - Google Patents

Digital watermark embedding and extraction method for GIS vector data based on data mask Download PDF

Info

Publication number
CN101576993A
CN101576993A CNA2009100329215A CN200910032921A CN101576993A CN 101576993 A CN101576993 A CN 101576993A CN A2009100329215 A CNA2009100329215 A CN A2009100329215A CN 200910032921 A CN200910032921 A CN 200910032921A CN 101576993 A CN101576993 A CN 101576993A
Authority
CN
China
Prior art keywords
data
line
vector data
information
watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100329215A
Other languages
Chinese (zh)
Other versions
CN101576993B (en
Inventor
周卫
李安波
陈颖
张丽娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Normal University
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN2009100329215A priority Critical patent/CN101576993B/en
Publication of CN101576993A publication Critical patent/CN101576993A/en
Application granted granted Critical
Publication of CN101576993B publication Critical patent/CN101576993B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a digital watermark embedding and extraction method for GIS vector data based on a data mask. The method ensures that element vertexes of carrier data above or below a strip reference line of a mask represent bit '1' or '0' by modifying the mask corresponding to the carrier data based on a watermark embedding principle of the relation, thereby obtaining corresponding watermark information according to the relation during the detection. The method modifies mask data, but not the carrier data so as not to cause any influence on the accuracy of the carrier data; moreover, the mask data can be synchronously transformed with the carrier data, so the method has better robustness on various operations such as projection operation, geometric transformation, data compression and the like.

Description

A kind of digital watermarking embedding of GIS vector data and extracting method that covers plate based on data
Technical field
The invention belongs to geography information copyright protection field, be specifically related to a kind of GIS vector data data waterprint embedded method and extracting method thereof that covers plate based on data.
Background technology
The GIS vector data is national important strategic information resources; be the basic data information of economy and national defense construction and social development; have characteristics such as high production cost and high precision; its copyright protection research concerns the construction of China's geography information digital product copyright protecting system; the socialization of sharing, exchanging and serve of geography information; the formation of copyright protection draft legislation, the sound development of construction of national information safety and geography information related industry.Copyright protection is that copyright authentication, the content on the copyright mark basis maintained secrecy and access control.In recent years, be that the copyright mark technology of representative becomes present copyright protection research and the emphasis of using day by day with the digital watermarking.Also less relatively at present at the research of the copyright mark of GIS vector data product, mainly contain method, based on the method for Laplce (Laplacian) spectrum domain of topological relation figure and based on the algorithm of spatial domain etc. based on the geometric data transform domain.The multiple attack method of Chu Xianing thereupon, exposed the following weakness of present algorithm: a) be embedded in the copyright mark---watermark information in the geographical spatial data product, easily handled software by it--operations such as the coordinate transform of GIS software, projective transformation are wiped, and the robustness of algorithm is difficult to satisfy the needs of copyright authentication; B) robustness of algorithm requires embed watermark information as much as possible, and the embedding meeting of watermark affects to the data precision, even has destroyed the topological consistance between expressed geographic element.
Summary of the invention
The objective of the invention is to deficiency at existing GIS vector data digital watermark technology, storage characteristics, use-pattern and attack etc. according to the GIS vector data, a kind of data waterprint embedded method and extracting method thereof that covers plate based on the GIS vector data proposed, requirement has robustness for all multioperations such as projection operation, the conversion of geometric transformation equiaffine and data compressions, and does not reduce the precision of initial carrier data.
Basic thought of the present invention is: based on the watermark embedding principle of relation, by revising the corresponding plate that covers of carrier data, make carrier data key element summit in covering plate the band reference line above or below represent bit " 1 " or " 0 ", thereby when detecting, just can obtain corresponding watermark information (shown in Figure 1) according to relation.This method is owing to be revise to cover the plate data, rather than carrier data, thereby can not have any impact to the carrier data precision.And, since cover the plate data can with the synchronous conversion of carrier data, this algorithm has robustness preferably for all multioperations such as projection operation, geometric transformation and data compressions.
The present invention is based on data and cover the GIS vector data data waterprint embedded method of plate, its step is as follows:
(1) according to generating watermark encoder w (scale-of-two is encrypted watermark information, is called for short watermark information, also claims the scale-of-two watermark encoder) with user-dependent copyright information m.If copyright information is a Chinese-character text information, then can change, ASCII character conversion, thresholding conversion, encryption be to the Chinese-character text information processing by Hanzi internal code, generate scale-of-two and encrypt watermark information; If copyright information is an English text information, then can change, thresholding conversion, encryption carry out information processing by ASCII character, generate scale-of-two and encrypt watermark information; If copyright information is a numerical information, then can change, encryption by thresholding, generate scale-of-two and encrypt watermark information; If copyright information is an image information, then can pass through compression of images, based on the chaos scramble of Logistic mapping, remove that dimension is handled, codomain transforms Image Information Processing, generate scale-of-two encryption watermark information;
(2) read the GIS vector data x of watermark to be loaded.The key element of GIS vector data all constitutes with summit (vertex), with in the reading vector data all the summit of key elements (point, line, surface) extract, and the vertex set (coordinate point set) of whole key elements (point, line, surface) is designated as v;
(3) set up corresponding with it digital watermarking based on vertex set v and cover plate figure layer mask.Concrete building process is as follows:
1) the precision limit difference τ according to original vector data (the GIS vector data x of watermark to be loaded) determines buffer zone scope buf (buf=τ/4);
2) from vertex set v, choose a coordinate points P at random,, be designated as P if P point other coordinate points among the no v in buf is the circle of radius then meets the demands 1, otherwise picked at random again;
3) determine P 1After, then in v, begin to search for second some P 2, criterion is based on P 2P 1The width of line is other coordinate points that whether contains in the wire buffer zone of 2*buf among the v.If there is not other point, then be designated as P 2If there is other point, then this point does not meet the demands.To one times of same direction search expanded range, continue in vertex set v, to search for;
4) circulation step 3), based on P n, search P N+1Concrete grammar is: judging point P nWith P N+1Whether comprise other point among the vertex set v in the line buffer zone.Because the hunting zone is to derive to same direction, when the hunting zone surpasses figure layer coordinate range (x1, y1; X2 stops search in the time of y2).Record line segment P 1, P 2... P N+n, in vertex set v, get rid of a P 1, P 2..., P n
5) the binary code sequence w of water intaking seal coding w iIf, be encoded to " 1 ", then with line segment P1, P2 ... Pn+1 is to buf*2/5 coordinate unit of y positive dirction translation.If be encoded to " 0 ", then to buf*2/5 unit of y negative direction translation.So just formed the line of reference that to represent a watermark encoder;
6) line of reference that step 5) is generated writes the illiteracy plate figure layer of generation, and its FID value is pressed the sequence of natural numbers value;
7) at point set v, repeated execution of steps 2) to 6) step, finish every binary code sequence w in turn iInformation storage, thereby the plate generation of (be called for short digital watermarking and cover plate) (the GIS vector data digital watermarking of covering plate based on data embeds) is covered in the GIS vector data digital watermarking of finishing whole moisture official seal breath.
Based on the GIS vector data digital watermarking extracting method of data illiteracy plate, step is:
(1) reads GIS vector data (generally being suspicious GIS vector data, copyright to be verified), and the key element vertex data is designated as vertex set v;
(2) read the line of reference that the plate file is covered in the corresponding digital watermarking of GIS vector data, cover the line of reference of plate with digital watermarking vertex set v is made buffer zone analysis.If in the buffer zone scope, the coordinate points major part of suspicious GIS vector data all then obtains bit value and is " 1 " above line of reference; If the coordinate points major part all below line of reference, obtains bit value and is " 0 ".If do not detect coordinate points or coordinate points be distributed in simultaneously line of reference above or below, then obtain " null ";
(3) cover the FID value of every line of reference in the plate according to digital watermarking, order reads every line of reference from small to large, circulation execution in step (2), obtain every binary coding after, be combined as extraction watermark encoder w sequentially.
The watermark encoder and the original watermark coding that extract are compared, differentiate its similarity.If can extract efficient watermark coding, and the two similarity is greater than threshold value ζ, then the copyright ownership of provable suspicious works.
The inventive method, owing to be to revise to cover the plate data, rather than carrier data, thereby can not have any impact to the carrier data precision.And, since cover the plate data can with the synchronous conversion of carrier data, this algorithm has robustness preferably for all multioperations such as projection operation, geometric transformation and data compressions.And do not reduce the precision of initial carrier data.
Description of drawings
Fig. 1 embeds synoptic diagram based on the watermark information of buffer zone band.Wherein, in the buffer zone band, mate among the figure a " 1 ", in the buffer zone band, mate among the figure b " 0 ".
Fig. 2 digital watermarking is covered plate and is generated stream signal journey figure.
Fig. 3 extracts the summit of original experiment data, and (a figure is: 1: 1 ten thousand topomap in the Purple Mountain, Nanjing; Figure b is the summit design sketch of 1: 1 ten thousand topomap in the Purple Mountain, Nanjing).
What Fig. 4 P1 was ordered chooses.
Fig. 5 is with reference to the formation condition of line segment, wherein: figure a is ineligible, and figure b is eligible.
Fig. 6 digital watermarking is covered plate and is generated certain line of reference.
Fig. 7 line of reference moves rule, wherein, and figure a representative " 1 ", figure b representative " 0 ".
Fig. 8 generates digital watermarking and covers plate.
Sectional drawing is extracted in Fig. 9 digital watermarking.
Sectional drawing is attacked in the cutting of Figure 10 data.
Embodiment
Below in conjunction with drawings and Examples technical scheme of the present invention is further described.In this example, read vector graphics file with arcgis desktop, test figure is 1: 1 ten thousand topomap in the Purple Mountain, Nanjing, and shp form, copyright information are " Nanjing Normal University "; Select figure layer JMD_M, DLSS_L is the lab diagram layer, Gauss projection, and the WGS84 coordinate system, the summit of extracting experimental data forms vertex set figure layer pointfeatureclass, shown in Fig. 3 .b; Buf=0.5 coordinate unit of buffer zone scope.Set up digital watermarking illiteracy plate figure layer name and be called Polyline.
Specific implementation process is as follows:
One, the GIS vector data covers plate generation and digital watermarking embedding
(1) watermark encoder generates.During GIS vector data program release, generate corresponding watermark encoder (claiming watermark information again) w according to the copyright information m that will embed.This sentences the copyright information that " Nanjing Normal University " Chinese-character text information is used for authentication, Hanzi internal code conversion, ASCII character conversion, thresholding conversion etc. generate following scale-of-two watermark information: 01,000,011,010,001,000,011,010,001,100,100,001,001,000,101,010,000,010,101 100101000011010000010100000100110110 to the Chinese-character text information processing
(2) read the GIS vector data x of watermark to be loaded, and generate vertex set v (shown in Fig. 3 .a);
(3) set up corresponding with it digital watermarking based on vertex set v and cover printed line figure layer mask.Concrete building process is as follows:
1) picked at random coordinate points P1 from vertex set v, its coordinate is (139.326.642,147816.487), its OBJECTID:1987.Do not have other coordinate points in the round buffer zone scope of 0.5 coordinate unit of this point, meet the demands, be designated as P1 (shown in Figure 4);
2) begin to seek P2, the basis, hunting zone is a 2*0.5=1 coordinate unit, in this hunting zone, select a coordinate points (139371.847,147618.509), and judge in the wire buffer zone of 0.5 coordinate unit of this point and P1 line whether contain other coordinate points, condition satisfies, and then this point is designated as P2 (139371.847,147618.509); If this point is not if satisfy, search (shown in Figure 5) once more after one times of same direction search expanded range stops search when the hunting zone surpasses watermark encoder embedded coordinate scope;
3) circulation step 3), based on Pn, search Pn+1.After stopping search, all satisfactory point coordinate are generated a line of reference (shown in Figure 6), and from vertex set v, get rid of the each point that searches in the generation line of reference process.This line segment except that the point that searches, will not have other coordinate points to exist in buffer zone buf scope like this;
4) read first binary coding of watermark encoder w; W1=0 is then line of reference 0.2 coordinate unit of translation that makes progress; Thus, the new line of reference of formation meets in 0.3 coordinate unit buffer zone scope on one side coordinate points, and does not have reference mark (shown in Figure 7) in the scope of another side 0.3;
5) line of reference that generates is write illiteracy plate figure layer, its FID value gets 1;
6) read the next bit binary coding of watermark encoder, repeating step 1) to 4).All generated the digital watermarking of forming with line of reference until all watermark encoder binary codings and covered plate, also just finished plate generation (shown in Figure 8) is covered in the digital watermarking of GIS vector data with this algorithm;
Two, digital watermarking is extracted
(1) when suspicious GIS vector data need authenticate, obtains the digital watermarking of this data correspondence and cover plate;
(2) according to the coordinate system and the projection of suspicious GIS vector data, the converting digital watermark is covered plate and is made it consistent with suspicious GIS vector data, and suspicious GIS vector data figure layer and digital watermarking are covered stacked adding of plate figure;
(3) read suspicious GIS vector data, and be organized as vertex set v;
(4) read the line of reference that the plate file is covered in digital watermarking, cover the line of reference of plate with digital watermarking vertex set v is made buffer zone analysis.If in the buffer zone scope, the coordinate points major part of suspect product data all then obtains bit value and is " 1 " above line of reference; If the coordinate points major part all below line of reference, obtains bit value and is " 0 ".If do not detect coordinate points or coordinate points be distributed in simultaneously line of reference above or below, then obtain " null ";
(5) circulation execution in step (4), FID value according to reference point, read digital watermarking from small to large successively and cover every line of reference in the plate, every binary coding that combination is obtained. should be with obtaining following scale-of-two watermark encoder in the example: 01,010,111,010,100,111,010,110,001,001,110,000,010,000,101,111,000,000,011 1000001100100111010110010110011001011011;
(6) the above-mentioned binary coding that obtains is reduced to original watermark information, utilize the Unicode coding, a Chinese character is to take 16 binary codings, therefore, Chinese character " south " is just represented in " 0101011101010011 " representative " 87; 83 " of binary file, by that analogy, can obtain the watermark information (shown in Figure 9) of " Nanjing Normal University ";
(7) similarity that the shared ratio of utilization value null is carried out between original watermark information and the extraction watermark information is calculated.In this example, because the data attack operation is carried out at the end, similarity result of calculation is 100%.
Three, attack test and performance evaluation
(1) compression attack.Raw data is carried out compression attack based on the Generalize compress order of ARCGIS9.2.When ratio of compression reached 50%, the watermark information of " Nanjing Normal University " still can extract fully, when ratio of compression reaches 74%, occurred in the binary sequence of extraction " null ".By the algorithm principle analysis as can be known, guaranteeing that digital watermarking covers the reference mark of any line of reference in the plate and be not compressed fully under the condition that attack deletes, this method can be resisted data compression and be attacked.
(2) cutting is attacked.Raw data is carried out cutting, and effect as shown in figure 10.As seen, after this algorithm stood certain cutting attack, watermark information still can correctly extract.By the algorithm principle analysis as can be known, when only the coverage of any line of reference was sheared fully in covering plate, the watermark information of this line of reference just can be lost.In addition, the present invention can draw the similarity of suspicious GIS vector data and raw data by the probability of occurrence to " null " value, to such an extent as to still can provide strong copyright authentication evidence receiving under the situation of shearing attack in a big way.
(3) projective transformation, coordinate system transformation are attacked.These routine data can restore watermark information after operating through projective transformation, coordinate system transformation fully.By the algorithm principle analysis as can be known, the present invention can be by to covering the plate projection, and the projection of suspicious GIS vector data, influence that coordinate system transformation caused are eliminated in the synchronous conversion of coordinate system transformation.

Claims (2)

1, a kind of GIS vector data data waterprint embedded method based on data illiteracy plate, its step is as follows:
A, basis generate watermark encoder w with user-dependent copyright information m; If copyright information is a Chinese-character text information, then can change, ASCII character conversion, thresholding conversion, encryption be to the Chinese-character text information processing by Hanzi internal code, generate scale-of-two and encrypt watermark information; If copyright information is an English text information, then can change, thresholding conversion, encryption carry out information processing by ASCII character, generate scale-of-two and encrypt watermark information; If copyright information is a numerical information, then can change, encryption by thresholding, generate scale-of-two and encrypt watermark information; If copyright information is an image information, then can pass through compression of images, based on the chaos scramble of Logistic mapping, remove that dimension is handled, codomain transforms Image Information Processing, generate scale-of-two encryption watermark information;
B, read the GIS vector data x of watermark to be loaded; The key element of GIS vector data all constitutes with the summit, with in the reading vector data all the summit of key elements extract, and the vertex set of whole key elements is designated as v;
C, set up corresponding with it digital watermarking based on vertex set v and cover plate figure layer; Concrete building process is as follows:
A, determine buffer zone scope buf, buf=τ/4 according to the precision of original vector data limit difference τ;
B, from vertex set v, choose a coordinate points P at random,, be designated as P if P point other coordinate points among the no v in buf is the circle of radius then meets the demands 1, otherwise picked at random again;
C, determine P 1After, then in v, begin to search for second some P 2, criterion is based on P 2P 1The width of line is other coordinate points that whether contains in the wire buffer zone of 2*buf among the v; If there is not other point, then be designated as P 2If there is other point, then this point does not meet the demands; To one times of same direction search expanded range, continue in vertex set v, to search for;
D, circulation step c), based on P n, search P N+1Concrete grammar is: judging point P nWith P N+1Whether comprise other point among the vertex set v in the line buffer zone.Because the hunting zone is to derive to same direction, when the hunting zone surpasses figure layer coordinate range (x1, y1; X2 stops search in the time of y2); Record line segment P 1, P 2... P N+1, in vertex set v, get rid of a P 1, P 2..., P n
The binary code sequence w of e, water intaking seal coding w iIf, be encoded to " 1 ", then with line segment P1, P2 ... Pn+1 is to buf*2/5 coordinate unit of y positive dirction translation; If be encoded to " 0 ", then to buf*2/5 unit of y negative direction translation; So just formed the line of reference that to represent a watermark encoder;
F, the line of reference that step e) is generated write the illiteracy plate figure layer of generation, and its FID value is pressed the sequence of natural numbers value;
G, at vertex set v, repeated execution of steps b) to f) step, finish every binary code sequence w in turn iInformation storage, thereby finish the generation that plate is covered in the GIS vector data digital watermarking of whole moisture official seal breath.
2, a kind of claim 1 is described covers the extracting method of the GIS vector data digital watermarking of plate based on data, and step is:
A, read the GIS vector data, and the key element vertex data is designated as vertex set v;
B, read the line of reference that the plate file is covered in the corresponding digital watermarking of GIS vector data, cover the line of reference of plate with digital watermarking vertex set v is made buffer zone analysis:
If in the buffer zone scope, the coordinate points major part of suspicious GIS vector data all then obtains bit value and is " 1 " above line of reference; If the coordinate points major part all below line of reference, obtains bit value and is " 0 "; If do not detect coordinate points or coordinate points be distributed in simultaneously line of reference above or below, then obtain " null ";
C, according to the FID value that every line of reference in the plate is covered in digital watermarking, order reads every line of reference from small to large, circulation execution in step B, obtain every binary coding after, be combined as extraction watermark encoder w sequentially.
CN2009100329215A 2009-06-01 2009-06-01 Digital watermark embedding and extraction method for GIS vector data based on data mask Expired - Fee Related CN101576993B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009100329215A CN101576993B (en) 2009-06-01 2009-06-01 Digital watermark embedding and extraction method for GIS vector data based on data mask

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100329215A CN101576993B (en) 2009-06-01 2009-06-01 Digital watermark embedding and extraction method for GIS vector data based on data mask

Publications (2)

Publication Number Publication Date
CN101576993A true CN101576993A (en) 2009-11-11
CN101576993B CN101576993B (en) 2011-11-16

Family

ID=41271926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100329215A Expired - Fee Related CN101576993B (en) 2009-06-01 2009-06-01 Digital watermark embedding and extraction method for GIS vector data based on data mask

Country Status (1)

Country Link
CN (1) CN101576993B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101968878A (en) * 2010-11-18 2011-02-09 南京师范大学 Multiple digital watermarking method for geographic information system (GIS) vector data
CN102063694A (en) * 2010-11-17 2011-05-18 安徽工业大学 Digital image encryption method based on paper folding transformation
CN102254296A (en) * 2011-07-13 2011-11-23 南京师范大学 Method for calculating similarity of Geographic Information System (GIS) vector data image watermarks
CN102332079A (en) * 2011-09-16 2012-01-25 南京师范大学 GIS (geographic information system) vector data disguising and restoring method based on error random interference
CN102456114A (en) * 2010-10-25 2012-05-16 湖南大学 Two-dimensional CAD (Computer Aided Design) engineering drawing content variable-strength encrypting method and device
CN105550971A (en) * 2015-12-15 2016-05-04 南京师范大学 Vector geographic data confidentiality level identification method based on distance ratio modulation

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102456114A (en) * 2010-10-25 2012-05-16 湖南大学 Two-dimensional CAD (Computer Aided Design) engineering drawing content variable-strength encrypting method and device
CN102063694A (en) * 2010-11-17 2011-05-18 安徽工业大学 Digital image encryption method based on paper folding transformation
CN102063694B (en) * 2010-11-17 2013-04-24 安徽工业大学 Digital image encryption method based on paper folding transformation
CN101968878A (en) * 2010-11-18 2011-02-09 南京师范大学 Multiple digital watermarking method for geographic information system (GIS) vector data
CN101968878B (en) * 2010-11-18 2013-01-02 南京师范大学 Multiple digital watermarking method for geographic information system (GIS) vector data
CN102254296A (en) * 2011-07-13 2011-11-23 南京师范大学 Method for calculating similarity of Geographic Information System (GIS) vector data image watermarks
CN102254296B (en) * 2011-07-13 2012-10-24 南京师范大学 Method for calculating similarity of Geographic Information System (GIS) vector data image watermarks
CN102332079A (en) * 2011-09-16 2012-01-25 南京师范大学 GIS (geographic information system) vector data disguising and restoring method based on error random interference
CN102332079B (en) * 2011-09-16 2013-12-04 南京师范大学 GIS (geographic information system) vector data disguising and restoring method based on error random interference
CN105550971A (en) * 2015-12-15 2016-05-04 南京师范大学 Vector geographic data confidentiality level identification method based on distance ratio modulation
CN105550971B (en) * 2015-12-15 2018-07-20 南京师范大学 A kind of vector geographic data security level identification method based on distance ratio modulation

Also Published As

Publication number Publication date
CN101576993B (en) 2011-11-16

Similar Documents

Publication Publication Date Title
CN101576993B (en) Digital watermark embedding and extraction method for GIS vector data based on data mask
CN103310407B (en) Based on the vectorial geographical spatial data total blindness water mark method of QR code
Wang et al. Reversible fragile watermarking for locating tampered blocks in 2D vector maps
CN106204411B (en) Vector settlement place Zero watermarking method based on not bending moment and Hilbert code
CN101246586A (en) Vector map watermarking method based on curve segmentation
CN116385250B (en) Track data double watermarking method based on robust watermarking and fragile watermarking
Ren et al. Selective authentication algorithm based on semi-fragile watermarking for vector geographical data
CN104794671A (en) Vector space data blind watermark method resistant to projection attack
CN103377457B (en) A kind of vector geographic data Hard Authentication vulnerable watermark method
CN104794677A (en) Vector map watermark method based on space geometric features
CN103955634A (en) Copyright protecting method based on digital watermark technology and aiming at tile remote sensing data
Liu et al. A zero-watermarking scheme with embedding timestamp in vector maps for Big Data computing
CN102800041A (en) Method for protecting integrity of digital vector map
Li et al. Study on copyright authentication of GIS vector data based on Zero-watermarking
CN116805069B (en) Track data zero watermark generation method, track data zero watermark detection device and storage medium
Wang et al. RST invariant fragile watermarking for 2D vector map authentication
CN101840473B (en) Vector map copyright protection method based on non-linear transformation
CN111242825B (en) Water depth feature-based ENC electronic nautical chart zero-watermarking method
KR100944488B1 (en) Watermark Inserting Method to Vector data for using Azimuth Information and Watermark Detecting Method to the same
CN105023235A (en) Electronic chart watermarking method based on space redundancy relation
CN104103031A (en) Normalization-based vector spatial data blind watermark method
Wang et al. 2D vector map fragile watermarking with region location
CN111339238B (en) Vector geographic data digital watermarking method for resisting projective transformation
CN104091304A (en) Vector spatial data blind watermarking method based on feature point
CN104866737B (en) A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111116

Termination date: 20140601