CN103377458A - Geographic space data watermarking method based on byte streams - Google Patents
Geographic space data watermarking method based on byte streams Download PDFInfo
- Publication number
- CN103377458A CN103377458A CN2012101199136A CN201210119913A CN103377458A CN 103377458 A CN103377458 A CN 103377458A CN 2012101199136 A CN2012101199136 A CN 2012101199136A CN 201210119913 A CN201210119913 A CN 201210119913A CN 103377458 A CN103377458 A CN 103377458A
- Authority
- CN
- China
- Prior art keywords
- watermark information
- byte
- watermark
- data
- geographical spatial
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention relates to a geographic space data watermarking method based on byte streams. The geographic space data watermarking method is based on the characteristic that geographic space data are organized with the byte streams as units in the computer carrier access and circulation processes, the data encryption thought is introduced into the design of the watermarking algorithm, the mathematic mapping thought is adopted, a watermarking mapping function is built, namely the function for locating watermarking information bits according to bytes is built, a several-for-one mapping relation is kept between the bytes and the watermarking information bits, the embedded positions of the watermarking information bits are determined through the built mapping relation, and then watermarking information is embedded into the data bytes in a quantized mode. When watermarking detection is carried out, the optimal watermarking information is restored according to the maximum membership degree principle. According to the geographic space data watermarking method based on the byte streams, the quality and the accuracy of the geographic space data can be effectively controlled, the availability of the geographic space data is reduced, the copyright of the geographic space data in the circulation process can be effectively protected, and the function of tracing a data outflow source is achieved.
Description
Technical field
The present invention relates to the technical field of geography information copyright protection, particularly a kind of geographical spatial data water mark method based on byte stream.
Background technology
Geographical spatial data is strategic resource indispensable in national economy and the national defense construction, is the supportive achievement of national basis Facilities Construction and geoscience research.In recent years, along with digitizing and the networking process of geographical spatial data are accelerated day by day, so that propagate in its strange land, circulation is more and more convenient, thereby also cause the phenomenons such as illegal use, copyright dispute of geographical spatial data day by day serious.Therefore, how effectively to manage the rights of using of geographical spatial data in the process of circulation, protect its copyright even follow the tracks of the problems such as its operating position, become current geospatial information and be badly in need of safely the major issue that solves.As emerging in recent years Technology On Data Encryption, digital watermarking demonstrates huge potentiality in this respect.
Digital watermark technology is as a kind of brand-new information security technology, for the safeguard protection of geographical spatial data provides a kind of practicable solution route.Digital watermarking refers to embed watermark information in digitalized data, and watermark information and source data are combined together, becomes the inseparable part of source data.Come thus to determine the authentication of copyright owner, entitlement, follow the tracks of abuse, the authenticity in authenticated digital content source, identification buyer, provide about other additional informations of digital content etc.Simultaneously for strengthen sense of responsibility, fright illegal act, having good grounds to look into soon etc. has vital role.Digital watermark technology has been subject to the great attention of national government office in the effect of performance aspect military security guarantee, the national security.
Digital watermarking is obtaining many application aspect the safeguard protection in the fields such as image, figure, video, audio frequency, has also obtained important application in the mapping association area in recent years.
At present about the existing more research of the digital watermark technology of geographical spatial data, these researchs have obtained some achievements, but mainly be for digital watermark technology in the copyright protection of geographical spatial data, use the aspects such as tracking, content authentication.The solution that these research institutes propose all is based on conventional digital watermark thought, a kind of data copyright management, use follow-up mechanism of passive character, the rights of using of uncontrollable geographical spatial data in the process of circulation, can not reach the ACTIVE CONTROL user to the purpose of correct geographical spatial data access rights, do not consider the diversity in geographical spatial data source, watermark embedding method is to the complicacy relevance grade of different characteristic data.
The present invention with regard to the rights of using control of geographical spatial data in the process of circulation, flow to the problem such as tracking and solve, has better protected the safety of geographical spatial data on the basis that current geographical spatial data data waterprint embedded method is analyzed.
Summary of the invention
The object of the invention is to: for the flow characteristics of geographical spatial data; data encryption thought is incorporated in the design of watermark embedding method; the method can effectively be controlled quality and the precision of geographical spatial data; reduce the availability of geographical spatial data; can effectively protect the geographical spatial data copyright that is in the process of circulation again, and play the effect that trace data flows out the source.Preferably resolve the rights of using of geographical spatial data in the process of circulation and control, flow to the problems such as tracking.
In order to realize the foregoing invention purpose, the technical solution used in the present invention is: all be the characteristic of organizing take byte stream as unit in the access of computing machine carrier and the process of circulation based on geographical spatial data, data encryption thought is incorporated in the design of water mark method, adopt mathematics mapping thought, make up the watermark mapping function, namely set up the function according to watermark information position, byte location itself, so that byte and watermark information position keep the many-one mapping relations, determine the embedded location of watermark information position by the mapping relations of setting up, then with in the mode embedding data byte of watermark information by quantification.In order to realize the foregoing invention purpose, the technical solution used in the present invention is:
A kind of geographical spatial data water mark method based on byte stream is characterized in that, may further comprise the steps:
(1) watermark information generates
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as the relevant informations such as data entitlement, circulating direction are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing.
(2) watermark embed process
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out the processing such as a negate, scramble;
Step 3: determine the embedded location of watermark information position in byte stream; Suppose that watermark information length is
, the thought that adopts many-one to shine upon is mapped to according to the corresponding numerical value of byte
On, form the relation of corresponding certain the watermark information position of a plurality of bytes, make mapping function be
,
Be the corresponding numerical value of byte itself, watermark information is
, i.e. requirement
For setting up many-to-one mapping relations, the watermark information position adopt repeat to embed byte the mode of corresponding numerical value carry out; Consider the watermark robustness of method,
The uniformly handle of should trying one's best
Be mapped to
On;
Caused variation can not significantly impact the corresponding byte number in watermark information position behind the embed watermark, thereby guarantees can not have influence on the corresponding watermark information of byte numerical value position after watermark embeds.Based on this, the mapping function of structure is as follows:
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position was-1, its corresponding byte quantizing rule was:
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to following quantizing rule:
Step 6: the geographical spatial data behind the preservation embed watermark information.
(3) watermark information detects and removes
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the processing such as inversion negate, inverted unrest;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, the extraction reference quantization rule of watermark information is carried out the judgement of watermark information position, and concrete decision rule is:
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated definition watermark detection sequence according to the maximum membership grade principle of Fuzzy Pattern Recognition
, wherein
,
,
Be watermark information length,
The number of times that extracts for single watermark information position.Be that unit takes out and be converted to its corresponding numerical value to containing the watermark geographical spatial data according to byte
, order:
Wherein
The detection rule of expression watermark information,
, therefore
Then obtain watermark information according to maximum membership grade principle
Definition the
The position watermark information
Spatially to 1 degree of membership be:
; The
The position watermark information
Spatially p-1 degree of membership is:
, according to maximum membership grade principle, determine
The position watermark information
Be
Still
, then the watermark information that extracts is handled as follows:
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain the relevant informations such as data flow, copyright according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
The characteristics of this method and technical advantage are:
(1) the most key in this method is the determining of byte corresponding relation in watermark information position and the byte stream, method by the structure mapping function, determined the embedded location of watermark information position by byte itself, namely so that byte itself and its embedded watermark information position keep synchronized relation, could provide possibility for realizing embedding grammar Blind detection information like this.
(2) this method can effectively reduce geographical spatial data quality and data precision, can resist preferably again geographical spatial data common attacks such as byte loss, byte shift and byte additions and deletions in the process of circulation, preferably resolve the rights of using control of geographical spatial data in the process of circulation, flow to the problem such as tracking.
Description of drawings
Fig. 1 is that the watermark information of the inventive method embeds process flow diagram.
Fig. 2 is the watermark information overhaul flow chart of the inventive method.
Fig. 3 is a width of cloth original figure grating map of the prior art.
Fig. 4 is through the containing watermark word grating map after relevant the correction.
Embodiment
Below in conjunction with Figure of description the invention is described in further detail.
Embodiment one
It is experimental data that embodiments of the invention are selected digital raster map, the whole process that removes according to preservation, watermark detection, testing result output, watermark for the reading of data, pre-service, watermark information generation, watermark embedding, containing watermark, provide one embodiment of the present of invention, further describe the present invention.
As shown in Figure 3 and Figure 4, select in the present embodiment take the digital raster map of a width of cloth size as 698 * 654 as experimental data.For these width of cloth data, mapping step-length N is made as 8.
1. watermark information of the present invention generates:
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as the relevant informations such as data entitlement, circulating direction are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing.
2. watermark information of the present invention embeds:
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out the processing such as a negate, scramble;
Step 3: determine the embedded location of watermark information position in byte stream; Here say that the watermark information length of using is
, determine the corresponding watermark information of byte position according to mapping function;
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position is-1, then according to quantizing rule:
Carry out the embedding of watermark information, it is 4 that quantization step is set here;
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to quantizing rule;
Step 6: the geographical spatial data behind the preservation embed watermark information.
Watermark detection of the present invention with remove:
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the processing such as inversion negate, inverted unrest;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, carry out the extraction of watermark according to the watermark information extracting rule, concrete decision rule is:
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated according to the maximum membership grade principle of Fuzzy Pattern Recognition, according to maximum membership grade principle, determined the
The position watermark information
Be
Still
, then the watermark information that extracts is handled as follows:
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain the relevant informations such as data flow, copyright according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
4. the characteristics of this method and technical advantage:
(1) the most key in this method is the determining of byte corresponding relation in watermark information position and the byte stream, method by the structure mapping function, determined the embedded location of watermark information position by byte itself, namely so that byte itself and its embedded watermark information position keep synchronized relation, could provide possibility for realizing embedding grammar Blind detection information like this.
(2) this method can effectively reduce geographical spatial data quality and data precision, can resist preferably again geographical spatial data common attacks such as byte loss, byte shift and byte additions and deletions in the process of circulation, preferably resolve the rights of using control of geographical spatial data in the process of circulation, flow to the problem such as tracking.
5. test of the present invention and analysis:
Method proposed by the invention is special water mark method for geographical spatial data, adopts the method can effectively protect the rights of using of original vectorial geographical data.
Geographical spatial data is disabled after using this method embed watermark information, and the user is the usage data file normally.Consider that the disabled user can be by analyzing to carry out relevant treatment to containing the watermark geodata, as inverted disorderly, correct related data parameter etc. by force, in order to can access the data message that it comprises.
To the grating map behind the embed watermark carry out inverted disorderly, header file association attributes parameter corrects to open data, as shown in Figure 4, there are 50% above data to change, and larger change occurs in the quality of data and precision, have influence on the user and from geographical spatial data, obtained relevant geography information, thereby the control user is to the access rights of correct data, but validated user can operate to use correct geodata by removing watermark, and it is 100% that watermark removes rear data and former data symbols right.
The attacks such as byte loss, byte shift and byte additions and deletions that in data circulations, access procedure, often are subjected to for geographical spatial data; method has preferably robustness; thereby can effectively protect the geographical spatial data copyright that is in the process of circulation, and play the effect that trace data flows out the source.
Embodiment two
As depicted in figs. 1 and 2, the object of the invention is to: the solution of at present digital watermark research institute proposition all is based on conventional digital watermark thought, a kind of data copyright management, use follow-up mechanism of passive character, the rights of using of uncontrollable geographical spatial data in the process of circulation, can not reach the ACTIVE CONTROL user to the purpose of correct geographical spatial data access rights, do not consider the diversity in geographical spatial data source, watermark embedding method is to the complicacy relevance grade of different characteristic data.For this problem, invent a kind of novel geographical spatial data water mark method based on byte stream, this water mark method has preferably robustness, can effectively reduce simultaneously the availability of geographical spatial data, preferably resolve the rights of using of geographical spatial data in the process of circulation and control, flow to the problems such as tracking.
In order to realize the foregoing invention purpose, the technical solution used in the present invention is:
A kind of geographical spatial data water mark method based on byte stream is characterized in that, may further comprise the steps:
(1) watermark information generates
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as the relevant informations such as data entitlement, circulating direction are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing.
(2) watermark embed process
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out the processing such as a negate, scramble;
Step 3: determine the embedded location of watermark information position in byte stream; Suppose that watermark information length is
, the thought that adopts many-one to shine upon is mapped to according to the corresponding numerical value of byte
On, form the relation of corresponding certain the watermark information position of a plurality of bytes, make mapping function be
,
Be the corresponding numerical value of byte itself, watermark information is
, i.e. requirement
For setting up many-to-one mapping relations, the watermark information position adopt repeat to embed byte the mode of corresponding numerical value carry out; Consider the watermark robustness of this method,
The uniformly handle of should trying one's best
Be mapped to
On;
Caused variation can not significantly impact the corresponding byte number in watermark information position behind the embed watermark, thereby guarantees can not have influence on the corresponding watermark information of byte numerical value position after watermark embeds.Based on this, the mapping function of structure is as follows:
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position was-1, its corresponding byte quantizing rule was:
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to following quantizing rule:
Step 6: the geographical spatial data behind the preservation embed watermark information.
(3) watermark information detects and removes
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the processing such as inversion negate, inverted unrest;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, the extraction reference quantization rule of watermark information is carried out the judgement of watermark information position, and concrete decision rule is:
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated definition watermark detection sequence according to the maximum membership grade principle of Fuzzy Pattern Recognition
, wherein
,
,
Be watermark information length,
The number of times that extracts for single watermark information position.Be that unit takes out and be converted to its corresponding numerical value to containing the watermark geographical spatial data according to byte
, order:
Wherein
The detection rule of expression watermark information,
, therefore
Then obtain watermark information according to maximum membership grade principle
Definition the
The position watermark information
Spatially to 1 degree of membership be:
; The
The position watermark information
Spatially p-1 degree of membership is:
, according to maximum membership grade principle, determine
The position watermark information
Be
Still
, then the watermark information that extracts is handled as follows:
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain the relevant informations such as data flow, copyright according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
Claims (5)
1. the geographical spatial data water mark method based on byte stream is characterized in that: comprise the steps:
(1), watermark information generates;
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as data entitlement, circulating direction relevant information are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing;
(2), watermark embed process;
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out a negate, scramble processing;
Step 3: determine the embedded location of watermark information position in byte stream; Suppose that watermark information length is
, the thought that adopts many-one to shine upon is mapped to according to the corresponding numerical value of byte
On, form the relation of corresponding certain the watermark information position of a plurality of bytes, make mapping function be
,
Be the corresponding numerical value of byte itself, watermark information is
, i.e. requirement
For setting up many-to-one mapping relations, the watermark information position adopt repeat to embed byte the mode of corresponding numerical value carry out; Consider the robustness of this water mark method,
The uniformly handle of should trying one's best
Be mapped to
On;
Caused variation can not significantly impact the corresponding byte number in watermark information position behind the embed watermark, thereby guarantees can not have influence on the corresponding watermark information of byte numerical value position after watermark embeds, and based on this, the mapping function of structure is as follows:
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position was-1, its corresponding byte quantizing rule was:
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to following quantizing rule:
Step 6: the geographical spatial data behind the preservation embed watermark information;
(3), watermark information detects and removes;
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the disorderly processing of inversion negate, inverted;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, the extraction reference quantization rule of watermark information is carried out the judgement of watermark information position, and concrete decision rule is:
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated definition watermark detection sequence according to the maximum membership grade principle of Fuzzy Pattern Recognition
, wherein
,
,
Be watermark information length,
The number of times that extracts for single watermark information position; Be that unit takes out and be converted to its corresponding numerical value to containing the watermark geographical spatial data according to byte
, order:
Wherein
The detection rule of expression watermark information,
, therefore
, then obtain watermark information according to maximum membership grade principle
, definition the
The position watermark information
Spatially to 1 degree of membership be:
; The
The position watermark information
Spatially p-1 degree of membership is:
, according to maximum membership grade principle, determine
The position watermark information
Be
Still
, then the watermark information that extracts is handled as follows:
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain data flow, copyright relevant information according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
2. a kind of geographical spatial data water mark method based on byte stream according to claim 1, it is characterized in that: based on the flow characteristics of geographical spatial data, data encryption thought is incorporated in the design of water mark method, by mapping thought watermark information is embedded in the data byte with quantification manner.
3. geographical spatial data water mark method based on byte stream is characterized in that:
Watermark information generates;
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as data entitlement, circulating direction relevant information are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing.
4. geographical spatial data water mark method based on byte stream is characterized in that:
Watermark embed process;
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out a negate, scramble processing;
Step 3: determine the embedded location of watermark information position in byte stream; Suppose that watermark information length is
, the thought that adopts many-one to shine upon is mapped to according to the corresponding numerical value of byte
On, form the relation of corresponding certain the watermark information position of a plurality of bytes, make mapping function be
,
Be the corresponding numerical value of byte itself, watermark information is
, i.e. requirement
For setting up many-to-one mapping relations, the watermark information position adopt repeat to embed byte the mode of corresponding numerical value carry out; Consider the watermark robustness of this method,
The uniformly handle of should trying one's best
Be mapped to
On;
Caused variation can not significantly impact the corresponding byte number in watermark information position behind the embed watermark, thereby guarantees can not have influence on the corresponding watermark information of byte numerical value position after watermark embeds, and based on this, the mapping function of structure is as follows:
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position was-1, its corresponding byte quantizing rule was:
Wherein
The expression byte value,
Expression mapping step-length;
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to following quantizing rule:
Step 6: the geographical spatial data behind the preservation embed watermark information.
5. geographical spatial data water mark method based on byte stream is characterized in that:
Watermark information detects and removes;
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the disorderly processing of inversion negate, inverted;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, the extraction reference quantization rule of watermark information is carried out the judgement of watermark information position, and concrete decision rule is:
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated definition watermark detection sequence according to the maximum membership grade principle of Fuzzy Pattern Recognition
, wherein
,
,
Be watermark information length,
For the number of times that extract single watermark information position, be that unit takes out and be converted to its corresponding numerical value to containing the watermark geographical spatial data according to byte
, order:
Wherein
The detection rule of expression watermark information,
, therefore
, then obtain watermark information according to maximum membership grade principle
, definition the
The position watermark information
Spatially to 1 degree of membership be:
; The
The position watermark information
Spatially p-1 degree of membership is:
, according to maximum membership grade principle, determine
The position watermark information
Be
Still
, then the watermark information that extracts is handled as follows:
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain data flow, copyright relevant information according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210119913.6A CN103377458B (en) | 2012-04-23 | 2012-04-23 | A kind of geographical spatial data water mark method based on byte stream |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210119913.6A CN103377458B (en) | 2012-04-23 | 2012-04-23 | A kind of geographical spatial data water mark method based on byte stream |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103377458A true CN103377458A (en) | 2013-10-30 |
CN103377458B CN103377458B (en) | 2017-12-01 |
Family
ID=49462528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210119913.6A Active CN103377458B (en) | 2012-04-23 | 2012-04-23 | A kind of geographical spatial data water mark method based on byte stream |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103377458B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793634A (en) * | 2014-03-03 | 2014-05-14 | 武汉大学 | Track-oriented online streaming data watermarking method |
CN105976304A (en) * | 2016-05-30 | 2016-09-28 | 北京奇艺世纪科技有限公司 | Image watermark embedding detecting method and image watermark embedding detecting device |
CN108173862A (en) * | 2017-12-29 | 2018-06-15 | 中国地质大学(武汉) | Big data image access control method, equipment and storage device are learned a kind ofly |
CN110414195A (en) * | 2019-07-09 | 2019-11-05 | 恩亿科(北京)数据科技有限公司 | A kind of data are anti-fake and source tracing method, system, medium and computer equipment |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101093574A (en) * | 2007-07-23 | 2007-12-26 | 中国人民解放军信息工程大学 | Watermark method of vectorial geographical spatial data based on integral wavelet transforms |
US20090172404A1 (en) * | 2006-05-02 | 2009-07-02 | Electronics And Telecommunications Research Institute | Method and Apparatus for Hybrid Watermarking |
-
2012
- 2012-04-23 CN CN201210119913.6A patent/CN103377458B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090172404A1 (en) * | 2006-05-02 | 2009-07-02 | Electronics And Telecommunications Research Institute | Method and Apparatus for Hybrid Watermarking |
CN101093574A (en) * | 2007-07-23 | 2007-12-26 | 中国人民解放军信息工程大学 | Watermark method of vectorial geographical spatial data based on integral wavelet transforms |
Non-Patent Citations (3)
Title |
---|
朱长青 等: "基于整数小波变换的栅格数字地图数字水印算法", 《武汉大学学报—信息科学版》, vol. 34, no. 5, 31 May 2009 (2009-05-31), pages 619 - 621 * |
杨成松 等: "基于坐标映射的矢量地理数据全盲水印算法", 《中国图象图形学报》, vol. 15, no. 4, 30 April 2010 (2010-04-30), pages 684 - 688 * |
杨成松 等: "基于常函数的抗几何变换的矢量地理数据水印算法", 《测绘学报》, vol. 40, no. 2, 30 April 2011 (2011-04-30), pages 256 - 261 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793634A (en) * | 2014-03-03 | 2014-05-14 | 武汉大学 | Track-oriented online streaming data watermarking method |
CN103793634B (en) * | 2014-03-03 | 2016-08-10 | 武汉大学 | A kind of online flow data water mark method of oriented locus |
CN105976304A (en) * | 2016-05-30 | 2016-09-28 | 北京奇艺世纪科技有限公司 | Image watermark embedding detecting method and image watermark embedding detecting device |
CN105976304B (en) * | 2016-05-30 | 2019-05-10 | 北京奇艺世纪科技有限公司 | A kind of insertion of image watermark, detection method and device |
CN108173862A (en) * | 2017-12-29 | 2018-06-15 | 中国地质大学(武汉) | Big data image access control method, equipment and storage device are learned a kind ofly |
CN108173862B (en) * | 2017-12-29 | 2021-04-20 | 中国地质大学(武汉) | Method and device for controlling geoscience big data image access and storage device |
CN110414195A (en) * | 2019-07-09 | 2019-11-05 | 恩亿科(北京)数据科技有限公司 | A kind of data are anti-fake and source tracing method, system, medium and computer equipment |
Also Published As
Publication number | Publication date |
---|---|
CN103377458B (en) | 2017-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zong et al. | Robust histogram shape-based method for image watermarking | |
Li et al. | Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain | |
Tao et al. | Robust image watermarking theories and techniques: A review | |
Liu et al. | Robust blind image watermarking based on chaotic mixtures | |
CN109191361A (en) | Image Watermarking, extracting method and correlation technique | |
CN103955634A (en) | Copyright protecting method based on digital watermark technology and aiming at tile remote sensing data | |
CN103377458A (en) | Geographic space data watermarking method based on byte streams | |
CN103377457A (en) | Vector geographic data accurate authentication fragile watermarking method | |
Sharifara et al. | A novel approach to enhance robustness in digital image watermarking using multiple bit-planes of intermediate significant bits | |
Su | Color image watermarking: algorithms and technologies | |
Furon | A survey of watermarking security | |
Wei et al. | Image watermarking based on genetic algorithm | |
Yang et al. | A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security | |
Liu et al. | A robust image hashing algorithm resistant against geometrical attacks | |
CN102682239A (en) | Digital watermark technology based copyright protection method orienting to remote sensing tile data | |
Zhang et al. | An improved secure semi-fragile watermarking based on LBP and Arnold transform | |
Yang et al. | A novel dual watermarking algorithm for digital audio | |
Avila-Domenech et al. | Dual watermarking for handwritten document image authentication and copyright protection for JPEG compression attacks | |
Patil et al. | Digital audio watermarking: techniques, applications, and challenges | |
Zhao et al. | Proactive image manipulation detection via deep semi-fragile watermark | |
Erlangga et al. | Increasing Secret Data Hiding Capacity in QR Code Using Subcells | |
Hatoum | Digital watermarking for PDF documents and images: security, robustness and AI-based attack | |
Chen et al. | Data Hiding Based on Redundant Space of WeChat Mini Program Codes | |
CN106373080B (en) | A kind of multiple digital watermarking of vector geographic data is dynamically embedded into method | |
Yu et al. | A fragile document watermarking technique based on wet paper code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201222 Address after: No.3 building, No.88 Xianshi Road, Changshu high tech Industrial Development Zone, Suzhou City, Jiangsu Province Patentee after: Changshu Zijin Intellectual Property Service Co.,Ltd. Address before: 215500 No.8, Jindu Road, Changshu Southeast Economic Development Zone, Changshu City, Suzhou City, Jiangsu Province Patentee before: CHANGSHU NANJING NORMAL UNIVERSITY DEVELOPMENT RESEARCH INSTITUTE Co.,Ltd. |