CN103810407B - A kind of GIS vector data line face figure layer copyright authentication method - Google Patents
A kind of GIS vector data line face figure layer copyright authentication method Download PDFInfo
- Publication number
- CN103810407B CN103810407B CN201410063386.0A CN201410063386A CN103810407B CN 103810407 B CN103810407 B CN 103810407B CN 201410063386 A CN201410063386 A CN 201410063386A CN 103810407 B CN103810407 B CN 103810407B
- Authority
- CN
- China
- Prior art keywords
- angle
- key
- array
- rsqb
- lsqb
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012795 verification Methods 0.000 claims abstract description 18
- 239000000284 extract Substances 0.000 claims abstract description 4
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000009826 distribution Methods 0.000 claims description 3
- 238000012946 outsourcing Methods 0.000 claims description 3
- 238000010276 construction Methods 0.000 abstract description 4
- 230000009466 transformation Effects 0.000 abstract description 3
- 239000010410 layer Substances 0.000 description 20
- 238000012545 processing Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000002372 labelling Methods 0.000 description 2
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 239000002344 surface layer Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
Abstract
The invention discloses a kind of GIS vector data line face figure layer copyright authentication method, generate process including copyright mark and copyright mark extracts and verification process.Present invention is generally directed to geographic element in GIS vector data and move towards the feature that feature is stablized and do not subjected to attack, and zero watermarking utilizes the key character of original artwork to construct original watermark signal, rather than revise the advantage of these features, move towards the feature construction zero watermarking for GIS vector data copyright authentication by geographic element, preferably solve the not contradiction between sentience and robustness of GIS vector data watermark.The copyright authentication method of the present invention is highly resistant to the various attacks such as data edition, data cutting, geometric transformation, has higher robustness, and will not have any impact the quality of data.
Description
Technical field
The invention belongs to field of geographic information safety, be specifically related to one and move towards feature construction zero water according to geographic element in the figure layer of line face
Print, and the method carrying out GIS vector data copyright authentication on this basis.
Background technology
Have pointed out the many algorithms realizing GIS vector data product copyright authentication at present, also have certain copyright protecting system to occur,
But the various copyright mark attack methods occurred therewith, expose the weakness of current algorithm.Though single copyright mark technology can be used for
GIS vector data distort the copyright authentications such as prompting, manufacturer's identity and traitor tracing scheme, but there are following two aspects not
Foot: 1) it is embedded in the copyright mark in GIS vector data product, easily handled software--the coordinate transform of GIS software, throwing by it
Shadow converts, rotate, amplify, the operation such as reduce is wiped, and the robustness of algorithm is difficult to meet the needs of copyright protection;2) copyright
GIS vector data data can be caused certain distortion by the embedding of labelling.
Towards magnanimity feature and the high-fidelity requirement of GIS vector data, copyright authentication based on conventional copyright labeling algorithm increasingly without
Can be power.Zero watermarking is as a kind of novel digital watermarking system, owing to being that the key character utilizing original artwork is to construct initial condition
Official seal number rather than revise these features, can solve the not contradiction between sentience and robustness of digital watermarking well,
And be a kind of natural blind watermatking system.To this end, present invention is primarily based on geographic element in the figure layer of line face to move towards feature construction zero watermarking,
And the copyright authentication of GIS vector data is carried out based on zero watermarking copyright and authentication principles.
Summary of the invention
It is an object of the invention to: move towards feature construction zero watermarking based on geographic element, and former based on zero watermarking copyright and certification
Reason, proposes a kind of have undistorted, the GIS vector data line face figure layer copyright authentication method of high robust feature.
To achieve these goals, one GIS vector data line face of the present invention figure layer copyright authentication method, the technical scheme taked
Mainly include procedure below:
(1) copyright mark generates process
Step one: open a GIS vector data line chart layer file or face figure layer file;
Step 2: packet number in azimuth is set, is designated as N(for guaranteeing to divide exactly, the common divisor of 360 need to be selected), then by 0-360
This space, azimuth be divided into s={ (360*i/N, 360* (i+1)/N] | i=0,1 ..., N number of interval such as N};
Step 3: arrange the integer array Angle of an a length of N, array element initial value is assigned to 0, is used for storing key element and moves towards distribution
Key element number in each interval;
Step 4: carry out key element and move towards to calculate: if line chart layer, be then successively read first node and the tail node of each key element, point
It is not designated as P1 (x1,y1)、P2(x2,y2);If face figure layer, then it is successively read first node and the intermediate node of each key element, point
It is not designated as P1 (x1,y1)、P2(x2,y2);Then, P1 (x is calculated according to following formula (1) and (2)1,y1) and P2 (x2,y2) this 2 point
Line formed section and the positive between centers of X anticlockwise angle a(a ∈ (0,360]);
Step 5: move towards for each key element, i.e. angle a, circulation performs:
Calculate, according to formula (3), the ordinal number k (k ∈ [1, N]) that angle a place is interval, and the value of Angle [k] is set;
Step 6: traversal array Angle, finds maximum occurrences Max therein, and the figure place of Max is designated as m;
Step 7: be successively read the value of each element in array Angle, and be uniformly processed as m position by mending " 0 " on the left side;
Step 8: by the numeral of N number of m position, be arranged in order together by the ordinal number in array Angle, forms feature verification letter
Breath Wr;
Step 9: plus after 8 current date character strings before feature verification information Wr, according to user setup key information Key,
Being encrypted authentication information W based on RSA cryptographic algorithms, the copyright generating band timestamp adds confidential information We;Information We,
Key information Key, figure place m and azimuth packet number N need to achieve, in case copyright authentication uses;
(2) copyright mark extracts and verification process
Step one: when finding suspect product, it is provided that We information, key information Key, figure place m, azimuth packet number N
With suspicious GIS vector data file F for copyright authentication;
Step 2: be grouped number N according to azimuth, during generating according to aforementioned copyright mark, step one is to step 5, calculates number
Each element value in group Angle;
Step 3: according to key information Key, the copyright achieved is added confidential information We and is decrypted, generates 8 bit time stamps
Information and feature verification information Wr;
Step 4: according to figure place w, feature verification information Wr is reverted in array OriginAngle;
Step 5: the following n times that operate of circulation execution:
D () calculates array Angle and the distance of array OriginAngle according to following formula (4);
E each element circular in array Angle is moved to right one by () (5) as the following formula, it may be assumed that
F (), according to formula (4), recalculates distance D of each element in Angle and array OriginAngle;
Step 6: ask for repeatedly the minima of result of calculation D, and take array Angle during minima and array according to D
OriginAngle, calculates similarity S according to formula (6);
Step 7: t is that user specifies threshold value, if S >=t, then proves that suspect product is for infringement works;Otherwise, it not the most infringement
Works.
Wherein, in copyright mark generates the step 4 of process, for improving computational efficiency, only with the head and the tail node of line chart layer key element or
The head of face figure layer key element, intermediate node, the substantially trend of computational element.In addition it is also possible to take the diagonal of key element outsourcing rectangle
Other methods such as the line segment trend between trend, key element head node and key element geometric center point carry out key element and move towards to calculate.
The present invention moves towards characteristic distributions according to the space of geographic element in GIS vector data line surface layer, based on zero watermarking principle, proposes
A kind of copyright mark for GIS vector data and copyright authentication method.This copyright authentication method be highly resistant to data edition,
The various attacks such as data cutting, geometric transformation, have higher robustness, and will not the quality of data have any impact.
Accompanying drawing explanation
Fig. 1 is the experimental data that the embodiment of the present invention is chosen.
Fig. 2 is the data generated after experimental data suffers rotation attack.
Fig. 3 is the copyright mark product process figure of the inventive method.
Fig. 4 is the copyright authentication flow chart of the inventive method.
Detailed description of the invention
It is described in further details with embodiment below in conjunction with the accompanying drawings.
This example selects a typical shp face figure layer data, generate for the reading of data, copyright mark, copyright mark extraction and
The whole process of certification, further describes the present invention.The present embodiment selects the water system line graph layer data of U.S. 1:400 ten thousand
(such as Fig. 1) is as experimental data.Key Key value is " 10010101 ", and certification threshold value takes 0.85.
(1) copyright mark generates process.
Step one: open U.S. 1:400 ten thousand drainage map layer data file, data form is wire data, and key Key value is
“10010101”。
Step 2: arranging azimuth packet number is 24, then this space, azimuth of 0-360 is divided into s={ (15*i, 15*
(i+1)] | i=0,1 ..., 24) } etc. 24 intervals.
Step 3: arrange the integer array Angle of a length of 24, array element initial value is assigned to 0, is used for storing key element trend point
Cloth key element number in each interval.
Step 4: what the present embodiment was opened is line chart layer, then be successively read first node and the tail node of each key element, be designated as respectively
P1(x1,y1)、P2(x2,y2), and calculate its diagonal and the positive between centers of X anticlockwise angle a according to formula (1), (2).
In the present embodiment, the first node of first key element and tail node be respectively as follows: p1 (-84.182975360289,
34.5842502161334), p2 (-87.950763043048,30.6717202546792), its a value is: 219 degree.
Step 5: move towards a for each key element, circulation performs: calculates according to formula (3) and moves towards the ordinal number k that a place is interval,
And the value of Angle [k] is set.In the present embodiment, the trend of first key element is 219 degree, and its interval, place ordinal number is: 13, then
The value of Angle [13] adds 1.
Step 6: traversal array Angle, finding maximum occurrences Max therein is 6, and determines that figure place m of Max is 1.
Step 7: be successively read the value of each element in array Angle, and be uniformly processed as m position by mending " 0 " on the left side.
Step 8: by the numeral of 24 1, be arranged in order together by ordinal number size, forms feature verification information Wr.This reality
Executing in example, feature verification information Wr of formation is: 226212422434023210232313.
Step 9: plus after 8 current date character strings " 20131227 " before feature verification information Wr, character string is:
20131227226212422434023210232313.According to data manufacturer's user setup key information " 10010101 ", based on
Authentication information W is encrypted by RSA cryptographic algorithms, and the copyright generating band timestamp adds confidential information We.This We information, close
Key information Key, figure place m and azimuth packet number N need to achieve, in case copyright authentication uses.
(2) copyright mark extracts and verification process.
Step one: when finding suspect product, it is provided that key " 10010101 ", figure place " 1 ", azimuth packet number 24 and U.S.
State's drainage map layer data is used for copyright authentication.
Step 2: Third Party Authentication mechanism to step 5, calculates array Angle according to step one during the generation of aforementioned copyright mark
In each element value.In this example, element value is: 226212422434023210232313.
Step 3: according to key information Key, the copyright achieved is added confidential information We and is decrypted, generates 8 bit time stamps
Information and feature verification information Wr.In the present embodiment, it is respectively as follows: " 20131227 ", " 226212422434023210232313 ".
Step 4: according to figure place 1, feature verification information Wr is reverted in array OriginAngle.
Step 5: the following n times that operate of circulation execution:
A () calculates distance D of each element in array Angle and array OriginAngle according to formula (4).
B each element circular in array Angle is moved to right one according to formula (5) by (), i.e. Angle [0]=Angle [23],
Angle [23]=Angle [22] ..., Angle [2]=Angle [1], Angle [1]=Angle [0].
C (), according to formula (4), recalculates distance D of each element in Angle and array OriginAngle.
Step 6: ask for the minima of D, and take array Angle during minima and array OriginAngle, foundation according to D
Following formula calculates similarity S.In the present embodiment, the minima of D is: D=0, calculates similarity according to formula (6), and its value is 1.
Step 7: owing to similarity S is 1, more than certification threshold value 0.85, then prove that suspect product is for infringement works.
In the embodiment of the present invention, for improving computational efficiency, only with the head and the tail node of line chart layer data, the substantially trend of computational element,
Other sides such as the diagonal that can also take key element outsourcing rectangle moves towards, line segment trend between key element head node and key element geometric center point
Method calculates.
Only carrying out copyright mark generation and authentication processing with line chart layer data in the embodiment of the present invention, the method is readily adaptable for use in face figure
The copyright mark of layer data generates and certification.
In the embodiment of the present invention, only GIS vector data with shp form carries out copyright mark generation and authentication processing, and the method is also fitted
Copyright mark for other form GIS vector data such as GML, E00, MIF generates and authentication processing.
(3) test analysis.
From above-described embodiment: initial data, after certain rotation attack processes, remains to correctly carry out copyright authentication.This calculation is described
Method, for projective transformation, has higher robustness.Additionally, this method to data rotation, amplify, reduce etc. and to attack, have equally
There is higher robustness.
To sum up analyzing, the method applied in the present invention can be applied successfully to the copyright authentication of GIS line of vector face figure layer data.
Claims (2)
1. a GIS vector data line face figure layer copyright authentication method, specifically includes following steps:
(1) copyright mark generates process
Step one: open a GIS vector data line chart layer file or face figure layer file;
Step 2: arranging azimuth packet number, be designated as N, for guaranteeing to divide exactly, N need to select the common divisor of 360, then by 0-360
This space, azimuth be divided into s={ (360*i/N, 360* (i+1)/N] | i=0,1 ..., N number of interval of N-1};
Step 3: arrange the integer array Angle of an a length of N, array element initial value is assigned to 0, is used for storing key element and moves towards distribution
Key element number in each interval;
Step 4: carry out key element and move towards to calculate: if line chart layer, be then successively read first node and the tail node of each key element, point
It is not designated as P1 (x1,y1)、P2(x2,y2);If face figure layer, then it is successively read first node and the intermediate node of each key element, point
It is not designated as P1 (x1,y1)、P2(x2,y2);Then, P1 (x is calculated according to following formula (1) and (2)1,y1) and P2 (x2,y2) this 2 point
Line formed section and the positive between centers of X anticlockwise angle a, a ∈ (0,360];
Step 5: move towards for each key element, i.e. angle a, circulation performs:
Calculate, according to formula (3), the ordinal number k, k ∈ [1, N] that angle a place is interval, and the value of Angle [k] is set;
Step 6: traversal array Angle, finds maximum occurrences Max therein, and the figure place of Max is designated as m;
Step 7: be successively read the value of each element in array Angle, and be uniformly processed as m position by mending " 0 " on the left side;
Step 8: by the numeral of N number of m position, be arranged in order together by the ordinal number in array Angle, forms feature verification letter
Breath Wr;
Step 9: plus after 8 current date character strings before feature verification information Wr, according to user setup key information Key,
Being encrypted feature verification information Wr based on RSA cryptographic algorithms, the copyright generating band timestamp adds confidential information We;Copyright
Mark adds confidential information We, key information Key, figure place m and azimuth packet number N to be needed to achieve, in case copyright authentication uses;
(2) copyright mark extracts and verification process
Step one: when finding suspect product, it is provided that copyright adds confidential information We, key information Key, figure place m, azimuth
Packet number N and suspicious GIS vector data file are for copyright authentication;
Step 2: be grouped number N according to azimuth, during generating according to aforementioned copyright mark, step one is to step 5, calculates number
Each element value in group Angle;
Step 3: according to key information Key, the copyright achieved is added confidential information We and is decrypted, generates 8 bit time stamps
Information and feature verification information Wr;
Step 4: according to figure place m, feature verification information Wr is reverted in array OriginAngle;
Step 5: the following n times that operate of circulation execution:
A () calculates array Angle and the distance of array OriginAngle according to following formula (4);
B each element circular in array Angle is moved to right one by () (5) as the following formula, it may be assumed that
C (), according to formula (4), recalculates distance D of each element in Angle and array OriginAngle;
Step 6: ask for repeatedly the minima of result of calculation D, and take array Angle during minima and array according to D
OriginAngle, calculates similarity S according to formula (6);
Step 7: t is that user specifies threshold value, if S >=t, then proves that suspect product is for infringement works;Otherwise, it not the most infringement
Works.
A kind of GIS vector data line face the most according to claim 1 figure layer copyright authentication method, it is characterised in that (one)
Copyright mark generates in the step 4 of process, and key element is moved towards to calculate and taked the diagonal of key element outsourcing rectangle to move towards method or key element head
Line segment between node and key element geometric center point moves towards method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410063386.0A CN103810407B (en) | 2014-02-20 | 2014-02-20 | A kind of GIS vector data line face figure layer copyright authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410063386.0A CN103810407B (en) | 2014-02-20 | 2014-02-20 | A kind of GIS vector data line face figure layer copyright authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103810407A CN103810407A (en) | 2014-05-21 |
CN103810407B true CN103810407B (en) | 2016-08-17 |
Family
ID=50707166
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410063386.0A Active CN103810407B (en) | 2014-02-20 | 2014-02-20 | A kind of GIS vector data line face figure layer copyright authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103810407B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105303076B (en) * | 2015-10-23 | 2017-12-15 | 南京师范大学 | GIS vector data copyright authentication method based on closest index |
CN105678122B (en) * | 2016-01-11 | 2018-04-24 | 南京师范大学 | A kind of GIS vector data copyright authentication method based on topology information entropy |
CN113129198B (en) * | 2021-04-29 | 2024-01-12 | 南京师范大学 | Zero watermark generation method and system and copyright infringement comparison method and system |
CN114897659B (en) * | 2022-05-09 | 2023-12-29 | 南京师范大学 | Vector geographic data zero watermark generation method and zero watermark information detection method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101556578A (en) * | 2009-05-12 | 2009-10-14 | 南京师范大学 | Method for controlling file access of GIS vector data |
CN102110281A (en) * | 2011-02-18 | 2011-06-29 | 南京师范大学 | Method for embedding and extracting watermarks by adopting difference expansion aiming at shape point map layer data |
KR20130039605A (en) * | 2011-10-12 | 2013-04-22 | (주) 한양지에스티 | Surveying system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7197160B2 (en) * | 2001-03-05 | 2007-03-27 | Digimarc Corporation | Geographic information systems using digital watermarks |
-
2014
- 2014-02-20 CN CN201410063386.0A patent/CN103810407B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101556578A (en) * | 2009-05-12 | 2009-10-14 | 南京师范大学 | Method for controlling file access of GIS vector data |
CN102110281A (en) * | 2011-02-18 | 2011-06-29 | 南京师范大学 | Method for embedding and extracting watermarks by adopting difference expansion aiming at shape point map layer data |
KR20130039605A (en) * | 2011-10-12 | 2013-04-22 | (주) 한양지에스티 | Surveying system |
Non-Patent Citations (1)
Title |
---|
GIS矢量数据的自适应水印研究;张丽娟等;《地球信息科学》;20081231;第10卷(第6期);文献第724-729页 * |
Also Published As
Publication number | Publication date |
---|---|
CN103810407A (en) | 2014-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chang et al. | A novel turtle shell based scheme for data hiding | |
Zhang | Reversible data hiding in encrypted image | |
CN103810407B (en) | A kind of GIS vector data line face figure layer copyright authentication method | |
CN104486073B (en) | A kind of encryption and decryption method of character type data | |
CN105634732B (en) | A kind of more bit reversible information hidden methods of ciphertext domain | |
CN109803142B (en) | Encrypted domain image reversible data hiding method based on neighborhood prediction | |
EP2290872A1 (en) | Device for generating a message authentication code for authenticating a message | |
CN105303075B (en) | Adaptive Text Watermarking method based on PDF format | |
JP2006244496A5 (en) | ||
CN106951943A (en) | Believable electronic contract is printed as paper contract and restores the method for electronic contract again | |
CN106709853B (en) | Image retrieval method and system | |
CN102117476B (en) | Signature watermark system used for CAD (Computer-Aided Design) documents | |
CN103902925A (en) | Method and equipment for digital document signature | |
CN109600620B (en) | Video file protection method | |
CN104063731A (en) | Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology | |
CN102800041A (en) | Method for protecting integrity of digital vector map | |
CN103853946B (en) | A kind of GIS vector data copyright authentication method based on FCM cluster feature | |
CN102142129B (en) | Visual secret sharing-based image content tampering detection method | |
CN103377320B (en) | A kind of vector geographic data selectivity certification semi-fragile watermarking method | |
CN108564520A (en) | GIS vector data copyright authentication method based on not blue index | |
CN111866547B (en) | Novel video tamper-proofing method | |
CN104036448B (en) | Digital watermark algorithm for three-dimensional model | |
Huang et al. | A spherical coordinate based fragile watermarking scheme for 3D models | |
CN102663673B (en) | Chaotic mapping based shp line-surface layer fragile watermark technology | |
Dadkhah et al. | An efficient image self-recovery and tamper detection using fragile watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190311 Address after: 210023 No. 18 Lingshan North Road, Qixia District, Nanjing City, Jiangsu Province, 4 Blocks 102 Patentee after: Nanjing Panzhi Geographic Information Industry Research Institute Co., Ltd. Address before: 210046 No. 1 Wenyuan Road, Yadong New District, Nanjing, Jiangsu Province Patentee before: Nanjing Normal University |
|
TR01 | Transfer of patent right |