CN103377458A - Geographic space data watermarking method based on byte streams - Google Patents

Geographic space data watermarking method based on byte streams Download PDF

Info

Publication number
CN103377458A
CN103377458A CN2012101199136A CN201210119913A CN103377458A CN 103377458 A CN103377458 A CN 103377458A CN 2012101199136 A CN2012101199136 A CN 2012101199136A CN 201210119913 A CN201210119913 A CN 201210119913A CN 103377458 A CN103377458 A CN 103377458A
Authority
CN
China
Prior art keywords
watermark information
byte
watermark
data
geographical spatial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012101199136A
Other languages
Chinese (zh)
Other versions
CN103377458B (en
Inventor
朱长青
符浩军
曹曲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changshu Zijin Intellectual Property Service Co.,Ltd.
Original Assignee
Changshu Nanjing Normal University Development Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changshu Nanjing Normal University Development Research Institute Co Ltd filed Critical Changshu Nanjing Normal University Development Research Institute Co Ltd
Priority to CN201210119913.6A priority Critical patent/CN103377458B/en
Publication of CN103377458A publication Critical patent/CN103377458A/en
Application granted granted Critical
Publication of CN103377458B publication Critical patent/CN103377458B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention relates to a geographic space data watermarking method based on byte streams. The geographic space data watermarking method is based on the characteristic that geographic space data are organized with the byte streams as units in the computer carrier access and circulation processes, the data encryption thought is introduced into the design of the watermarking algorithm, the mathematic mapping thought is adopted, a watermarking mapping function is built, namely the function for locating watermarking information bits according to bytes is built, a several-for-one mapping relation is kept between the bytes and the watermarking information bits, the embedded positions of the watermarking information bits are determined through the built mapping relation, and then watermarking information is embedded into the data bytes in a quantized mode. When watermarking detection is carried out, the optimal watermarking information is restored according to the maximum membership degree principle. According to the geographic space data watermarking method based on the byte streams, the quality and the accuracy of the geographic space data can be effectively controlled, the availability of the geographic space data is reduced, the copyright of the geographic space data in the circulation process can be effectively protected, and the function of tracing a data outflow source is achieved.

Description

A kind of geographical spatial data water mark method based on byte stream
Technical field
The present invention relates to the technical field of geography information copyright protection, particularly a kind of geographical spatial data water mark method based on byte stream.
Background technology
Geographical spatial data is strategic resource indispensable in national economy and the national defense construction, is the supportive achievement of national basis Facilities Construction and geoscience research.In recent years, along with digitizing and the networking process of geographical spatial data are accelerated day by day, so that propagate in its strange land, circulation is more and more convenient, thereby also cause the phenomenons such as illegal use, copyright dispute of geographical spatial data day by day serious.Therefore, how effectively to manage the rights of using of geographical spatial data in the process of circulation, protect its copyright even follow the tracks of the problems such as its operating position, become current geospatial information and be badly in need of safely the major issue that solves.As emerging in recent years Technology On Data Encryption, digital watermarking demonstrates huge potentiality in this respect.
Digital watermark technology is as a kind of brand-new information security technology, for the safeguard protection of geographical spatial data provides a kind of practicable solution route.Digital watermarking refers to embed watermark information in digitalized data, and watermark information and source data are combined together, becomes the inseparable part of source data.Come thus to determine the authentication of copyright owner, entitlement, follow the tracks of abuse, the authenticity in authenticated digital content source, identification buyer, provide about other additional informations of digital content etc.Simultaneously for strengthen sense of responsibility, fright illegal act, having good grounds to look into soon etc. has vital role.Digital watermark technology has been subject to the great attention of national government office in the effect of performance aspect military security guarantee, the national security.
Digital watermarking is obtaining many application aspect the safeguard protection in the fields such as image, figure, video, audio frequency, has also obtained important application in the mapping association area in recent years.
At present about the existing more research of the digital watermark technology of geographical spatial data, these researchs have obtained some achievements, but mainly be for digital watermark technology in the copyright protection of geographical spatial data, use the aspects such as tracking, content authentication.The solution that these research institutes propose all is based on conventional digital watermark thought, a kind of data copyright management, use follow-up mechanism of passive character, the rights of using of uncontrollable geographical spatial data in the process of circulation, can not reach the ACTIVE CONTROL user to the purpose of correct geographical spatial data access rights, do not consider the diversity in geographical spatial data source, watermark embedding method is to the complicacy relevance grade of different characteristic data.
The present invention with regard to the rights of using control of geographical spatial data in the process of circulation, flow to the problem such as tracking and solve, has better protected the safety of geographical spatial data on the basis that current geographical spatial data data waterprint embedded method is analyzed.
Summary of the invention
The object of the invention is to: for the flow characteristics of geographical spatial data; data encryption thought is incorporated in the design of watermark embedding method; the method can effectively be controlled quality and the precision of geographical spatial data; reduce the availability of geographical spatial data; can effectively protect the geographical spatial data copyright that is in the process of circulation again, and play the effect that trace data flows out the source.Preferably resolve the rights of using of geographical spatial data in the process of circulation and control, flow to the problems such as tracking.
In order to realize the foregoing invention purpose, the technical solution used in the present invention is: all be the characteristic of organizing take byte stream as unit in the access of computing machine carrier and the process of circulation based on geographical spatial data, data encryption thought is incorporated in the design of water mark method, adopt mathematics mapping thought, make up the watermark mapping function, namely set up the function according to watermark information position, byte location itself, so that byte and watermark information position keep the many-one mapping relations, determine the embedded location of watermark information position by the mapping relations of setting up, then with in the mode embedding data byte of watermark information by quantification.In order to realize the foregoing invention purpose, the technical solution used in the present invention is:
A kind of geographical spatial data water mark method based on byte stream is characterized in that, may further comprise the steps:
(1) watermark information generates
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as the relevant informations such as data entitlement, circulating direction are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing.
(2) watermark embed process
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out the processing such as a negate, scramble;
Step 3: determine the embedded location of watermark information position in byte stream; Suppose that watermark information length is
Figure 2012101199136100002DEST_PATH_IMAGE002
, the thought that adopts many-one to shine upon is mapped to according to the corresponding numerical value of byte
Figure 2012101199136100002DEST_PATH_IMAGE004
On, form the relation of corresponding certain the watermark information position of a plurality of bytes, make mapping function be
Figure DEST_PATH_IMAGE006
,
Figure DEST_PATH_IMAGE008
Be the corresponding numerical value of byte itself, watermark information is
Figure DEST_PATH_IMAGE010
, i.e. requirement
Figure DEST_PATH_IMAGE012
For setting up many-to-one mapping relations, the watermark information position adopt repeat to embed byte the mode of corresponding numerical value carry out; Consider the watermark robustness of method,
Figure 460552DEST_PATH_IMAGE006
The uniformly handle of should trying one's best
Figure 377693DEST_PATH_IMAGE008
Be mapped to
Figure 626272DEST_PATH_IMAGE004
On; Caused variation can not significantly impact the corresponding byte number in watermark information position behind the embed watermark, thereby guarantees can not have influence on the corresponding watermark information of byte numerical value position after watermark embeds.Based on this, the mapping function of structure is as follows:
Figure DEST_PATH_IMAGE014
Wherein
Figure DEST_PATH_IMAGE016
,
Figure DEST_PATH_IMAGE018
Be maximal value, the minimum value of byte,
Figure DEST_PATH_IMAGE020
Be the mapping step-length;
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position was-1, its corresponding byte quantizing rule was:
Figure DEST_PATH_IMAGE022
Wherein The expression byte value,
Figure 209754DEST_PATH_IMAGE020
Expression mapping step-length;
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to following quantizing rule:
Figure DEST_PATH_IMAGE026
Wherein
Figure 969900DEST_PATH_IMAGE024
The expression byte value,
Figure 236933DEST_PATH_IMAGE020
Expression mapping step-length;
Step 6: the geographical spatial data behind the preservation embed watermark information.
(3) watermark information detects and removes
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the processing such as inversion negate, inverted unrest;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, the extraction reference quantization rule of watermark information is carried out the judgement of watermark information position, and concrete decision rule is:
Figure DEST_PATH_IMAGE028
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated definition watermark detection sequence according to the maximum membership grade principle of Fuzzy Pattern Recognition , wherein
Figure DEST_PATH_IMAGE032
,
Figure DEST_PATH_IMAGE034
,
Figure 842358DEST_PATH_IMAGE002
Be watermark information length,
Figure DEST_PATH_IMAGE036
The number of times that extracts for single watermark information position.Be that unit takes out and be converted to its corresponding numerical value to containing the watermark geographical spatial data according to byte , order:
Figure DEST_PATH_IMAGE038
Wherein
Figure DEST_PATH_IMAGE040
The detection rule of expression watermark information,
Figure DEST_PATH_IMAGE042
, therefore
Figure DEST_PATH_IMAGE044
Then obtain watermark information according to maximum membership grade principle
Figure DEST_PATH_IMAGE046
Definition the
Figure DEST_PATH_IMAGE048
The position watermark information Spatially to 1 degree of membership be:
Figure DEST_PATH_IMAGE052
; The
Figure 296745DEST_PATH_IMAGE048
The position watermark information
Figure 519916DEST_PATH_IMAGE050
Spatially p-1 degree of membership is:
Figure DEST_PATH_IMAGE054
, according to maximum membership grade principle, determine
Figure 725770DEST_PATH_IMAGE048
The position watermark information
Figure 249155DEST_PATH_IMAGE050
Be
Figure DEST_PATH_IMAGE056
Still
Figure DEST_PATH_IMAGE058
, then the watermark information that extracts is handled as follows:
Figure DEST_PATH_IMAGE060
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain the relevant informations such as data flow, copyright according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
The characteristics of this method and technical advantage are:
(1) the most key in this method is the determining of byte corresponding relation in watermark information position and the byte stream, method by the structure mapping function, determined the embedded location of watermark information position by byte itself, namely so that byte itself and its embedded watermark information position keep synchronized relation, could provide possibility for realizing embedding grammar Blind detection information like this.
(2) this method can effectively reduce geographical spatial data quality and data precision, can resist preferably again geographical spatial data common attacks such as byte loss, byte shift and byte additions and deletions in the process of circulation, preferably resolve the rights of using control of geographical spatial data in the process of circulation, flow to the problem such as tracking.
Description of drawings
Fig. 1 is that the watermark information of the inventive method embeds process flow diagram.
Fig. 2 is the watermark information overhaul flow chart of the inventive method.
Fig. 3 is a width of cloth original figure grating map of the prior art.
Fig. 4 is through the containing watermark word grating map after relevant the correction.
Embodiment
Below in conjunction with Figure of description the invention is described in further detail.
Embodiment one
It is experimental data that embodiments of the invention are selected digital raster map, the whole process that removes according to preservation, watermark detection, testing result output, watermark for the reading of data, pre-service, watermark information generation, watermark embedding, containing watermark, provide one embodiment of the present of invention, further describe the present invention.
As shown in Figure 3 and Figure 4, select in the present embodiment take the digital raster map of a width of cloth size as 698 * 654 as experimental data.For these width of cloth data, mapping step-length N is made as 8.
1. watermark information of the present invention generates:
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as the relevant informations such as data entitlement, circulating direction are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing.
2. watermark information of the present invention embeds:
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out the processing such as a negate, scramble;
Step 3: determine the embedded location of watermark information position in byte stream; Here say that the watermark information length of using is
Figure DEST_PATH_IMAGE062
, determine the corresponding watermark information of byte position according to mapping function;
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position is-1, then according to quantizing rule:
Figure 52901DEST_PATH_IMAGE022
Carry out the embedding of watermark information, it is 4 that quantization step is set here;
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to quantizing rule;
Figure 294526DEST_PATH_IMAGE026
Step 6: the geographical spatial data behind the preservation embed watermark information.
Watermark detection of the present invention with remove:
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the processing such as inversion negate, inverted unrest;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, carry out the extraction of watermark according to the watermark information extracting rule, concrete decision rule is:
Figure 38491DEST_PATH_IMAGE028
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated according to the maximum membership grade principle of Fuzzy Pattern Recognition, according to maximum membership grade principle, determined the
Figure 150804DEST_PATH_IMAGE048
The position watermark information
Figure 485970DEST_PATH_IMAGE050
Be
Figure 683733DEST_PATH_IMAGE056
Still
Figure 231389DEST_PATH_IMAGE058
, then the watermark information that extracts is handled as follows:
Figure 729367DEST_PATH_IMAGE060
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain the relevant informations such as data flow, copyright according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
4. the characteristics of this method and technical advantage:
(1) the most key in this method is the determining of byte corresponding relation in watermark information position and the byte stream, method by the structure mapping function, determined the embedded location of watermark information position by byte itself, namely so that byte itself and its embedded watermark information position keep synchronized relation, could provide possibility for realizing embedding grammar Blind detection information like this.
(2) this method can effectively reduce geographical spatial data quality and data precision, can resist preferably again geographical spatial data common attacks such as byte loss, byte shift and byte additions and deletions in the process of circulation, preferably resolve the rights of using control of geographical spatial data in the process of circulation, flow to the problem such as tracking.
5. test of the present invention and analysis:
Method proposed by the invention is special water mark method for geographical spatial data, adopts the method can effectively protect the rights of using of original vectorial geographical data.
Geographical spatial data is disabled after using this method embed watermark information, and the user is the usage data file normally.Consider that the disabled user can be by analyzing to carry out relevant treatment to containing the watermark geodata, as inverted disorderly, correct related data parameter etc. by force, in order to can access the data message that it comprises.
To the grating map behind the embed watermark carry out inverted disorderly, header file association attributes parameter corrects to open data, as shown in Figure 4, there are 50% above data to change, and larger change occurs in the quality of data and precision, have influence on the user and from geographical spatial data, obtained relevant geography information, thereby the control user is to the access rights of correct data, but validated user can operate to use correct geodata by removing watermark, and it is 100% that watermark removes rear data and former data symbols right.
The attacks such as byte loss, byte shift and byte additions and deletions that in data circulations, access procedure, often are subjected to for geographical spatial data; method has preferably robustness; thereby can effectively protect the geographical spatial data copyright that is in the process of circulation, and play the effect that trace data flows out the source.
Embodiment two
As depicted in figs. 1 and 2, the object of the invention is to: the solution of at present digital watermark research institute proposition all is based on conventional digital watermark thought, a kind of data copyright management, use follow-up mechanism of passive character, the rights of using of uncontrollable geographical spatial data in the process of circulation, can not reach the ACTIVE CONTROL user to the purpose of correct geographical spatial data access rights, do not consider the diversity in geographical spatial data source, watermark embedding method is to the complicacy relevance grade of different characteristic data.For this problem, invent a kind of novel geographical spatial data water mark method based on byte stream, this water mark method has preferably robustness, can effectively reduce simultaneously the availability of geographical spatial data, preferably resolve the rights of using of geographical spatial data in the process of circulation and control, flow to the problems such as tracking.
In order to realize the foregoing invention purpose, the technical solution used in the present invention is:
A kind of geographical spatial data water mark method based on byte stream is characterized in that, may further comprise the steps:
(1) watermark information generates
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as the relevant informations such as data entitlement, circulating direction are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing.
(2) watermark embed process
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out the processing such as a negate, scramble;
Step 3: determine the embedded location of watermark information position in byte stream; Suppose that watermark information length is
Figure 969855DEST_PATH_IMAGE002
, the thought that adopts many-one to shine upon is mapped to according to the corresponding numerical value of byte
Figure 920494DEST_PATH_IMAGE004
On, form the relation of corresponding certain the watermark information position of a plurality of bytes, make mapping function be
Figure 770376DEST_PATH_IMAGE006
,
Figure 591701DEST_PATH_IMAGE008
Be the corresponding numerical value of byte itself, watermark information is
Figure 534249DEST_PATH_IMAGE010
, i.e. requirement
Figure 441026DEST_PATH_IMAGE012
For setting up many-to-one mapping relations, the watermark information position adopt repeat to embed byte the mode of corresponding numerical value carry out; Consider the watermark robustness of this method,
Figure 861643DEST_PATH_IMAGE006
The uniformly handle of should trying one's best
Figure 803054DEST_PATH_IMAGE008
Be mapped to
Figure 385345DEST_PATH_IMAGE004
On;
Figure 310576DEST_PATH_IMAGE008
Caused variation can not significantly impact the corresponding byte number in watermark information position behind the embed watermark, thereby guarantees can not have influence on the corresponding watermark information of byte numerical value position after watermark embeds.Based on this, the mapping function of structure is as follows:
Figure 3725DEST_PATH_IMAGE014
Wherein
Figure 534064DEST_PATH_IMAGE016
,
Figure 818414DEST_PATH_IMAGE018
Be maximal value, the minimum value of byte,
Figure 699783DEST_PATH_IMAGE020
Be the mapping step-length;
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position was-1, its corresponding byte quantizing rule was:
Wherein
Figure 876741DEST_PATH_IMAGE024
The expression byte value, Expression mapping step-length;
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to following quantizing rule:
Figure 435078DEST_PATH_IMAGE026
Wherein
Figure 470030DEST_PATH_IMAGE024
The expression byte value,
Figure 771699DEST_PATH_IMAGE020
Expression mapping step-length;
Step 6: the geographical spatial data behind the preservation embed watermark information.
(3) watermark information detects and removes
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the processing such as inversion negate, inverted unrest;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, the extraction reference quantization rule of watermark information is carried out the judgement of watermark information position, and concrete decision rule is:
Figure 601114DEST_PATH_IMAGE028
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated definition watermark detection sequence according to the maximum membership grade principle of Fuzzy Pattern Recognition
Figure 457075DEST_PATH_IMAGE030
, wherein , , Be watermark information length,
Figure 61046DEST_PATH_IMAGE036
The number of times that extracts for single watermark information position.Be that unit takes out and be converted to its corresponding numerical value to containing the watermark geographical spatial data according to byte
Figure 234538DEST_PATH_IMAGE008
, order:
Figure 714061DEST_PATH_IMAGE038
Wherein
Figure 649394DEST_PATH_IMAGE040
The detection rule of expression watermark information, , therefore
Figure 925971DEST_PATH_IMAGE044
Then obtain watermark information according to maximum membership grade principle
Figure 791159DEST_PATH_IMAGE046
Definition the
Figure 398858DEST_PATH_IMAGE048
The position watermark information
Figure 451128DEST_PATH_IMAGE050
Spatially to 1 degree of membership be:
Figure 700843DEST_PATH_IMAGE052
; The
Figure 154958DEST_PATH_IMAGE048
The position watermark information
Figure 464717DEST_PATH_IMAGE050
Spatially p-1 degree of membership is:
Figure 4283DEST_PATH_IMAGE054
, according to maximum membership grade principle, determine The position watermark information
Figure 366311DEST_PATH_IMAGE050
Be
Figure 315812DEST_PATH_IMAGE056
Still
Figure 608254DEST_PATH_IMAGE058
, then the watermark information that extracts is handled as follows:
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain the relevant informations such as data flow, copyright according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.

Claims (5)

1. the geographical spatial data water mark method based on byte stream is characterized in that: comprise the steps:
(1), watermark information generates;
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as data entitlement, circulating direction relevant information are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing;
(2), watermark embed process;
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out a negate, scramble processing;
Step 3: determine the embedded location of watermark information position in byte stream; Suppose that watermark information length is
Figure 2012101199136100001DEST_PATH_IMAGE001
, the thought that adopts many-one to shine upon is mapped to according to the corresponding numerical value of byte
Figure 384274DEST_PATH_IMAGE002
On, form the relation of corresponding certain the watermark information position of a plurality of bytes, make mapping function be
Figure 2012101199136100001DEST_PATH_IMAGE003
, Be the corresponding numerical value of byte itself, watermark information is , i.e. requirement
Figure 143468DEST_PATH_IMAGE006
For setting up many-to-one mapping relations, the watermark information position adopt repeat to embed byte the mode of corresponding numerical value carry out; Consider the robustness of this water mark method,
Figure 538677DEST_PATH_IMAGE003
The uniformly handle of should trying one's best Be mapped to
Figure 768988DEST_PATH_IMAGE002
On;
Figure 504862DEST_PATH_IMAGE004
Caused variation can not significantly impact the corresponding byte number in watermark information position behind the embed watermark, thereby guarantees can not have influence on the corresponding watermark information of byte numerical value position after watermark embeds, and based on this, the mapping function of structure is as follows:
Wherein
Figure 798703DEST_PATH_IMAGE008
, Be maximal value, the minimum value of byte,
Figure 936423DEST_PATH_IMAGE010
Be the mapping step-length;
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position was-1, its corresponding byte quantizing rule was:
Figure DEST_PATH_IMAGE011
Wherein
Figure 523262DEST_PATH_IMAGE012
The expression byte value,
Figure 277592DEST_PATH_IMAGE010
Expression mapping step-length;
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to following quantizing rule:
Figure DEST_PATH_IMAGE013
Wherein
Figure 483445DEST_PATH_IMAGE012
The expression byte value,
Figure 600305DEST_PATH_IMAGE010
Expression mapping step-length;
Step 6: the geographical spatial data behind the preservation embed watermark information;
(3), watermark information detects and removes;
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the disorderly processing of inversion negate, inverted;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, the extraction reference quantization rule of watermark information is carried out the judgement of watermark information position, and concrete decision rule is:
Figure 30150DEST_PATH_IMAGE014
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated definition watermark detection sequence according to the maximum membership grade principle of Fuzzy Pattern Recognition
Figure DEST_PATH_IMAGE015
, wherein
Figure 740617DEST_PATH_IMAGE016
,
Figure DEST_PATH_IMAGE017
,
Figure 609216DEST_PATH_IMAGE001
Be watermark information length,
Figure 252687DEST_PATH_IMAGE018
The number of times that extracts for single watermark information position; Be that unit takes out and be converted to its corresponding numerical value to containing the watermark geographical spatial data according to byte
Figure 56695DEST_PATH_IMAGE004
, order:
Figure DEST_PATH_IMAGE019
Wherein
Figure 877627DEST_PATH_IMAGE020
The detection rule of expression watermark information,
Figure DEST_PATH_IMAGE021
, therefore
Figure 425283DEST_PATH_IMAGE022
, then obtain watermark information according to maximum membership grade principle
Figure DEST_PATH_IMAGE023
, definition the
Figure DEST_PATH_IMAGE025
The position watermark information
Figure 516735DEST_PATH_IMAGE026
Spatially to 1 degree of membership be:
Figure DEST_PATH_IMAGE027
; The
Figure 757224DEST_PATH_IMAGE025
The position watermark information
Figure 301338DEST_PATH_IMAGE026
Spatially p-1 degree of membership is:
Figure 183843DEST_PATH_IMAGE028
, according to maximum membership grade principle, determine
Figure 5169DEST_PATH_IMAGE025
The position watermark information
Figure 947717DEST_PATH_IMAGE026
Be
Figure 979127DEST_PATH_IMAGE030
Still
Figure DEST_PATH_IMAGE031
, then the watermark information that extracts is handled as follows:
Figure 868585DEST_PATH_IMAGE032
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain data flow, copyright relevant information according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
2. a kind of geographical spatial data water mark method based on byte stream according to claim 1, it is characterized in that: based on the flow characteristics of geographical spatial data, data encryption thought is incorporated in the design of water mark method, by mapping thought watermark information is embedded in the data byte with quantification manner.
3. geographical spatial data water mark method based on byte stream is characterized in that:
Watermark information generates;
Step 1: generate a random number, this random number has uniqueness, forms man-to-man relation with each user;
Step 2: based on this random number, use random sequence generator to generate a pseudorandom binary sequence, this pseudorandom binary sequence is changed into the watermark information to be embedded that forms by-1 and 1;
Step 3: this random number and significant copyright information such as data entitlement, circulating direction relevant information are associated, set up the watermark relation mapping table, for the watermark detection with watermark information is legal when removing.
4. geographical spatial data water mark method based on byte stream is characterized in that:
Watermark embed process;
Step 1: the reading of data; The form of geographical spatial data according to byte stream read, all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: pre-service; Byte in the byte stream is carried out a negate, scramble processing;
Step 3: determine the embedded location of watermark information position in byte stream; Suppose that watermark information length is , the thought that adopts many-one to shine upon is mapped to according to the corresponding numerical value of byte On, form the relation of corresponding certain the watermark information position of a plurality of bytes, make mapping function be
Figure 474775DEST_PATH_IMAGE003
,
Figure 167925DEST_PATH_IMAGE004
Be the corresponding numerical value of byte itself, watermark information is
Figure 229422DEST_PATH_IMAGE005
, i.e. requirement
Figure 107248DEST_PATH_IMAGE006
For setting up many-to-one mapping relations, the watermark information position adopt repeat to embed byte the mode of corresponding numerical value carry out; Consider the watermark robustness of this method,
Figure 519775DEST_PATH_IMAGE003
The uniformly handle of should trying one's best Be mapped to On;
Figure 981346DEST_PATH_IMAGE004
Caused variation can not significantly impact the corresponding byte number in watermark information position behind the embed watermark, thereby guarantees can not have influence on the corresponding watermark information of byte numerical value position after watermark embeds, and based on this, the mapping function of structure is as follows:
Wherein
Figure 916121DEST_PATH_IMAGE008
, Be maximal value, the minimum value of byte,
Figure 171839DEST_PATH_IMAGE010
Be the mapping step-length;
Step 4: the determining of watermark information embedding method; Based on spatial domain, adopt the additivity rule, watermark information is embedded in the byte stream in the mode that quantizes, when the watermark information position was-1, its corresponding byte quantizing rule was:
Wherein The expression byte value, Expression mapping step-length;
Step 5: when the watermark information position is 1, carry out the embedding of watermark information according to following quantizing rule:
Figure 85251DEST_PATH_IMAGE013
Wherein
Figure 786098DEST_PATH_IMAGE012
The expression byte value,
Figure 959590DEST_PATH_IMAGE010
Expression mapping step-length;
Step 6: the geographical spatial data behind the preservation embed watermark information.
5. geographical spatial data water mark method based on byte stream is characterized in that:
Watermark information detects and removes;
Step 1: the reading of data; Form according to byte stream reads geographical spatial data with watermarked information, and all bytes in the geographical spatial data byte stream are converted into corresponding numerical value;
Step 2: data pre-service; To the byte in the byte stream being carried out the disorderly processing of inversion negate, inverted;
Step 3: the extraction of watermark information; Find the corresponding watermark information of each byte position according to mapping function, the extraction reference quantization rule of watermark information is carried out the judgement of watermark information position, and concrete decision rule is:
Figure 439113DEST_PATH_IMAGE014
Because many-to-one mapping relations are adopted in the embedding of watermark information, therefore there is repeatedly extraction same watermark information position;
Step 4: the differentiation of watermark information; The watermark information that extracts is differentiated definition watermark detection sequence according to the maximum membership grade principle of Fuzzy Pattern Recognition
Figure 407069DEST_PATH_IMAGE015
, wherein
Figure 96676DEST_PATH_IMAGE016
,
Figure 808280DEST_PATH_IMAGE017
, Be watermark information length, For the number of times that extract single watermark information position, be that unit takes out and be converted to its corresponding numerical value to containing the watermark geographical spatial data according to byte
Figure 458070DEST_PATH_IMAGE004
, order:
Figure 176628DEST_PATH_IMAGE019
Wherein
Figure 161901DEST_PATH_IMAGE020
The detection rule of expression watermark information,
Figure 65135DEST_PATH_IMAGE021
, therefore
Figure 135859DEST_PATH_IMAGE022
, then obtain watermark information according to maximum membership grade principle
Figure 658108DEST_PATH_IMAGE023
, definition the
Figure 497888DEST_PATH_IMAGE025
The position watermark information
Figure 978547DEST_PATH_IMAGE026
Spatially to 1 degree of membership be:
Figure 365929DEST_PATH_IMAGE027
; The
Figure 691868DEST_PATH_IMAGE025
The position watermark information
Figure 386154DEST_PATH_IMAGE026
Spatially p-1 degree of membership is:
Figure 631191DEST_PATH_IMAGE028
, according to maximum membership grade principle, determine
Figure 676507DEST_PATH_IMAGE025
The position watermark information
Figure 540558DEST_PATH_IMAGE026
Be
Figure 89351DEST_PATH_IMAGE030
Still
Figure 770868DEST_PATH_IMAGE031
, then the watermark information that extracts is handled as follows:
Figure 37901DEST_PATH_IMAGE032
So then extract watermark information;
Step 5: the detection of watermark information; The corresponding original binary watermarking information of random number of preserving in the binary watermarking information obtained and the watermark relation mapping table is carried out coherent detection, judge whether contain watermark information in the testing data according to related coefficient;
Step 6: when detecting geographical spatial data and contain watermark information, if data grant user, illustrate that the user has the right to use this geographical spatial data, then remove this watermark information, data are carried out restoring operation, the user obtains correct geographical spatial data, and the process that removes watermark information is the inverse process that watermark information embeds; Otherwise, illustrate that the user has illegally obtained this geographical spatial data, can't use correct geographical spatial data;
Step 7: obtain data flow, copyright relevant information according to the watermark information that extracts, thus the copyright of protected data, the illegal outflow source of trace data.
CN201210119913.6A 2012-04-23 2012-04-23 A kind of geographical spatial data water mark method based on byte stream Active CN103377458B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210119913.6A CN103377458B (en) 2012-04-23 2012-04-23 A kind of geographical spatial data water mark method based on byte stream

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210119913.6A CN103377458B (en) 2012-04-23 2012-04-23 A kind of geographical spatial data water mark method based on byte stream

Publications (2)

Publication Number Publication Date
CN103377458A true CN103377458A (en) 2013-10-30
CN103377458B CN103377458B (en) 2017-12-01

Family

ID=49462528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210119913.6A Active CN103377458B (en) 2012-04-23 2012-04-23 A kind of geographical spatial data water mark method based on byte stream

Country Status (1)

Country Link
CN (1) CN103377458B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793634A (en) * 2014-03-03 2014-05-14 武汉大学 Track-oriented online streaming data watermarking method
CN105976304A (en) * 2016-05-30 2016-09-28 北京奇艺世纪科技有限公司 Image watermark embedding detecting method and image watermark embedding detecting device
CN108173862A (en) * 2017-12-29 2018-06-15 中国地质大学(武汉) Big data image access control method, equipment and storage device are learned a kind ofly
CN110414195A (en) * 2019-07-09 2019-11-05 恩亿科(北京)数据科技有限公司 A kind of data are anti-fake and source tracing method, system, medium and computer equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093574A (en) * 2007-07-23 2007-12-26 中国人民解放军信息工程大学 Watermark method of vectorial geographical spatial data based on integral wavelet transforms
US20090172404A1 (en) * 2006-05-02 2009-07-02 Electronics And Telecommunications Research Institute Method and Apparatus for Hybrid Watermarking

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172404A1 (en) * 2006-05-02 2009-07-02 Electronics And Telecommunications Research Institute Method and Apparatus for Hybrid Watermarking
CN101093574A (en) * 2007-07-23 2007-12-26 中国人民解放军信息工程大学 Watermark method of vectorial geographical spatial data based on integral wavelet transforms

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
朱长青 等: "基于整数小波变换的栅格数字地图数字水印算法", 《武汉大学学报—信息科学版》, vol. 34, no. 5, 31 May 2009 (2009-05-31), pages 619 - 621 *
杨成松 等: "基于坐标映射的矢量地理数据全盲水印算法", 《中国图象图形学报》, vol. 15, no. 4, 30 April 2010 (2010-04-30), pages 684 - 688 *
杨成松 等: "基于常函数的抗几何变换的矢量地理数据水印算法", 《测绘学报》, vol. 40, no. 2, 30 April 2011 (2011-04-30), pages 256 - 261 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793634A (en) * 2014-03-03 2014-05-14 武汉大学 Track-oriented online streaming data watermarking method
CN103793634B (en) * 2014-03-03 2016-08-10 武汉大学 A kind of online flow data water mark method of oriented locus
CN105976304A (en) * 2016-05-30 2016-09-28 北京奇艺世纪科技有限公司 Image watermark embedding detecting method and image watermark embedding detecting device
CN105976304B (en) * 2016-05-30 2019-05-10 北京奇艺世纪科技有限公司 A kind of insertion of image watermark, detection method and device
CN108173862A (en) * 2017-12-29 2018-06-15 中国地质大学(武汉) Big data image access control method, equipment and storage device are learned a kind ofly
CN108173862B (en) * 2017-12-29 2021-04-20 中国地质大学(武汉) Method and device for controlling geoscience big data image access and storage device
CN110414195A (en) * 2019-07-09 2019-11-05 恩亿科(北京)数据科技有限公司 A kind of data are anti-fake and source tracing method, system, medium and computer equipment

Also Published As

Publication number Publication date
CN103377458B (en) 2017-12-01

Similar Documents

Publication Publication Date Title
Zong et al. Robust histogram shape-based method for image watermarking
Li et al. Double-encrypted watermarking algorithm based on cosine transform and fractional Fourier transform in invariant wavelet domain
Tao et al. Robust image watermarking theories and techniques: A review
Liu et al. Robust blind image watermarking based on chaotic mixtures
CN109191361A (en) Image Watermarking, extracting method and correlation technique
CN103955634A (en) Copyright protecting method based on digital watermark technology and aiming at tile remote sensing data
CN103377458A (en) Geographic space data watermarking method based on byte streams
CN103377457A (en) Vector geographic data accurate authentication fragile watermarking method
Sharifara et al. A novel approach to enhance robustness in digital image watermarking using multiple bit-planes of intermediate significant bits
Su Color image watermarking: algorithms and technologies
Furon A survey of watermarking security
Wei et al. Image watermarking based on genetic algorithm
Yang et al. A novel image steganography algorithm based on hybrid machine leaning and its application in cyberspace security
Liu et al. A robust image hashing algorithm resistant against geometrical attacks
CN102682239A (en) Digital watermark technology based copyright protection method orienting to remote sensing tile data
Zhang et al. An improved secure semi-fragile watermarking based on LBP and Arnold transform
Yang et al. A novel dual watermarking algorithm for digital audio
Avila-Domenech et al. Dual watermarking for handwritten document image authentication and copyright protection for JPEG compression attacks
Patil et al. Digital audio watermarking: techniques, applications, and challenges
Zhao et al. Proactive image manipulation detection via deep semi-fragile watermark
Erlangga et al. Increasing Secret Data Hiding Capacity in QR Code Using Subcells
Hatoum Digital watermarking for PDF documents and images: security, robustness and AI-based attack
Chen et al. Data Hiding Based on Redundant Space of WeChat Mini Program Codes
CN106373080B (en) A kind of multiple digital watermarking of vector geographic data is dynamically embedded into method
Yu et al. A fragile document watermarking technique based on wet paper code

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201222

Address after: No.3 building, No.88 Xianshi Road, Changshu high tech Industrial Development Zone, Suzhou City, Jiangsu Province

Patentee after: Changshu Zijin Intellectual Property Service Co.,Ltd.

Address before: 215500 No.8, Jindu Road, Changshu Southeast Economic Development Zone, Changshu City, Suzhou City, Jiangsu Province

Patentee before: CHANGSHU NANJING NORMAL UNIVERSITY DEVELOPMENT RESEARCH INSTITUTE Co.,Ltd.