CN103810407B - A kind of GIS vector data line face figure layer copyright authentication method - Google Patents

A kind of GIS vector data line face figure layer copyright authentication method Download PDF

Info

Publication number
CN103810407B
CN103810407B CN201410063386.0A CN201410063386A CN103810407B CN 103810407 B CN103810407 B CN 103810407B CN 201410063386 A CN201410063386 A CN 201410063386A CN 103810407 B CN103810407 B CN 103810407B
Authority
CN
China
Prior art keywords
angle
key
array
rsqb
lsqb
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410063386.0A
Other languages
Chinese (zh)
Other versions
CN103810407A (en
Inventor
李安波
闾国年
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Panzhi Geographic Information Industry Research Institute Co., Ltd.
Original Assignee
Nanjing Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Normal University filed Critical Nanjing Normal University
Priority to CN201410063386.0A priority Critical patent/CN103810407B/en
Publication of CN103810407A publication Critical patent/CN103810407A/en
Application granted granted Critical
Publication of CN103810407B publication Critical patent/CN103810407B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1063Personalisation

Abstract

The invention discloses a kind of GIS vector data line face figure layer copyright authentication method, generate process including copyright mark and copyright mark extracts and verification process.Present invention is generally directed to geographic element in GIS vector data and move towards the feature that feature is stablized and do not subjected to attack, and zero watermarking utilizes the key character of original artwork to construct original watermark signal, rather than revise the advantage of these features, move towards the feature construction zero watermarking for GIS vector data copyright authentication by geographic element, preferably solve the not contradiction between sentience and robustness of GIS vector data watermark.The copyright authentication method of the present invention is highly resistant to the various attacks such as data edition, data cutting, geometric transformation, has higher robustness, and will not have any impact the quality of data.

Description

A kind of GIS vector data line face figure layer copyright authentication method
Technical field
The invention belongs to field of geographic information safety, be specifically related to one and move towards feature construction zero water according to geographic element in the figure layer of line face Print, and the method carrying out GIS vector data copyright authentication on this basis.
Background technology
Have pointed out the many algorithms realizing GIS vector data product copyright authentication at present, also have certain copyright protecting system to occur, But the various copyright mark attack methods occurred therewith, expose the weakness of current algorithm.Though single copyright mark technology can be used for GIS vector data distort the copyright authentications such as prompting, manufacturer's identity and traitor tracing scheme, but there are following two aspects not Foot: 1) it is embedded in the copyright mark in GIS vector data product, easily handled software--the coordinate transform of GIS software, throwing by it Shadow converts, rotate, amplify, the operation such as reduce is wiped, and the robustness of algorithm is difficult to meet the needs of copyright protection;2) copyright GIS vector data data can be caused certain distortion by the embedding of labelling.
Towards magnanimity feature and the high-fidelity requirement of GIS vector data, copyright authentication based on conventional copyright labeling algorithm increasingly without Can be power.Zero watermarking is as a kind of novel digital watermarking system, owing to being that the key character utilizing original artwork is to construct initial condition Official seal number rather than revise these features, can solve the not contradiction between sentience and robustness of digital watermarking well, And be a kind of natural blind watermatking system.To this end, present invention is primarily based on geographic element in the figure layer of line face to move towards feature construction zero watermarking, And the copyright authentication of GIS vector data is carried out based on zero watermarking copyright and authentication principles.
Summary of the invention
It is an object of the invention to: move towards feature construction zero watermarking based on geographic element, and former based on zero watermarking copyright and certification Reason, proposes a kind of have undistorted, the GIS vector data line face figure layer copyright authentication method of high robust feature.
To achieve these goals, one GIS vector data line face of the present invention figure layer copyright authentication method, the technical scheme taked Mainly include procedure below:
(1) copyright mark generates process
Step one: open a GIS vector data line chart layer file or face figure layer file;
Step 2: packet number in azimuth is set, is designated as N(for guaranteeing to divide exactly, the common divisor of 360 need to be selected), then by 0-360 This space, azimuth be divided into s={ (360*i/N, 360* (i+1)/N] | i=0,1 ..., N number of interval such as N};
Step 3: arrange the integer array Angle of an a length of N, array element initial value is assigned to 0, is used for storing key element and moves towards distribution Key element number in each interval;
Step 4: carry out key element and move towards to calculate: if line chart layer, be then successively read first node and the tail node of each key element, point It is not designated as P1 (x1,y1)、P2(x2,y2);If face figure layer, then it is successively read first node and the intermediate node of each key element, point It is not designated as P1 (x1,y1)、P2(x2,y2);Then, P1 (x is calculated according to following formula (1) and (2)1,y1) and P2 (x2,y2) this 2 point Line formed section and the positive between centers of X anticlockwise angle a(a ∈ (0,360]);
&theta; = arctan ( y 2 - y 1 x 2 - x 1 ) ( x 2 - x 1 ) > 0 arctan ( y 2 - y 1 x 2 - x 1 ) + &pi; ( y 2 - y 1 ) &GreaterEqual; 0 , ( x 2 - x 1 ) < 0 arctan ( y 2 - y 1 x 2 - x 1 ) - &pi; ( y 2 - y 1 ) < 0 , ( x 2 - x 1 ) < 0 + &pi; 2 ( y 2 - y 1 ) > 0 , ( x 2 - x 1 ) = 0 - &pi; 2 ( y 2 - y 1 ) < 0 , ( x 2 - x 1 ) = 0 - - - ( 1 )
a = 180 * &theta; &pi; &theta; &Element; ( 0 , &pi; ] 180 * ( &theta; + 2 &pi; ) &pi; &theta; &Element; ( - &pi; , 0 ] - - - ( 2 )
Step 5: move towards for each key element, i.e. angle a, circulation performs:
Calculate, according to formula (3), the ordinal number k (k ∈ [1, N]) that angle a place is interval, and the value of Angle [k] is set;
Step 6: traversal array Angle, finds maximum occurrences Max therein, and the figure place of Max is designated as m;
Step 7: be successively read the value of each element in array Angle, and be uniformly processed as m position by mending " 0 " on the left side;
Step 8: by the numeral of N number of m position, be arranged in order together by the ordinal number in array Angle, forms feature verification letter Breath Wr;
Step 9: plus after 8 current date character strings before feature verification information Wr, according to user setup key information Key, Being encrypted authentication information W based on RSA cryptographic algorithms, the copyright generating band timestamp adds confidential information We;Information We, Key information Key, figure place m and azimuth packet number N need to achieve, in case copyright authentication uses;
(2) copyright mark extracts and verification process
Step one: when finding suspect product, it is provided that We information, key information Key, figure place m, azimuth packet number N With suspicious GIS vector data file F for copyright authentication;
Step 2: be grouped number N according to azimuth, during generating according to aforementioned copyright mark, step one is to step 5, calculates number Each element value in group Angle;
Step 3: according to key information Key, the copyright achieved is added confidential information We and is decrypted, generates 8 bit time stamps Information and feature verification information Wr;
Step 4: according to figure place w, feature verification information Wr is reverted in array OriginAngle;
Step 5: the following n times that operate of circulation execution:
D () calculates array Angle and the distance of array OriginAngle according to following formula (4);
D = &Sigma; i = 1 N ( Angle [ i ] - OriginAngle [ i ] ) 2 - - - ( 4 )
E each element circular in array Angle is moved to right one by () (5) as the following formula, it may be assumed that
Angle [ 0 ] = angle [ N - 1 ] Angle [ i + 1 ] = Angle [ i ] ( 0 &le; i < N - 1 ) - - - ( 5 )
F (), according to formula (4), recalculates distance D of each element in Angle and array OriginAngle;
Step 6: ask for repeatedly the minima of result of calculation D, and take array Angle during minima and array according to D OriginAngle, calculates similarity S according to formula (6);
S = &Sigma; i = 1 N Angle [ i ] &times; OriginAngle [ i ] &Sigma; i = 1 N Angle [ i ] 2 &times; OriginAngle [ i ] 2 - - - ( 6 )
Step 7: t is that user specifies threshold value, if S >=t, then proves that suspect product is for infringement works;Otherwise, it not the most infringement Works.
Wherein, in copyright mark generates the step 4 of process, for improving computational efficiency, only with the head and the tail node of line chart layer key element or The head of face figure layer key element, intermediate node, the substantially trend of computational element.In addition it is also possible to take the diagonal of key element outsourcing rectangle Other methods such as the line segment trend between trend, key element head node and key element geometric center point carry out key element and move towards to calculate.
The present invention moves towards characteristic distributions according to the space of geographic element in GIS vector data line surface layer, based on zero watermarking principle, proposes A kind of copyright mark for GIS vector data and copyright authentication method.This copyright authentication method be highly resistant to data edition, The various attacks such as data cutting, geometric transformation, have higher robustness, and will not the quality of data have any impact.
Accompanying drawing explanation
Fig. 1 is the experimental data that the embodiment of the present invention is chosen.
Fig. 2 is the data generated after experimental data suffers rotation attack.
Fig. 3 is the copyright mark product process figure of the inventive method.
Fig. 4 is the copyright authentication flow chart of the inventive method.
Detailed description of the invention
It is described in further details with embodiment below in conjunction with the accompanying drawings.
This example selects a typical shp face figure layer data, generate for the reading of data, copyright mark, copyright mark extraction and The whole process of certification, further describes the present invention.The present embodiment selects the water system line graph layer data of U.S. 1:400 ten thousand (such as Fig. 1) is as experimental data.Key Key value is " 10010101 ", and certification threshold value takes 0.85.
(1) copyright mark generates process.
Step one: open U.S. 1:400 ten thousand drainage map layer data file, data form is wire data, and key Key value is “10010101”。
Step 2: arranging azimuth packet number is 24, then this space, azimuth of 0-360 is divided into s={ (15*i, 15* (i+1)] | i=0,1 ..., 24) } etc. 24 intervals.
Step 3: arrange the integer array Angle of a length of 24, array element initial value is assigned to 0, is used for storing key element trend point Cloth key element number in each interval.
Step 4: what the present embodiment was opened is line chart layer, then be successively read first node and the tail node of each key element, be designated as respectively P1(x1,y1)、P2(x2,y2), and calculate its diagonal and the positive between centers of X anticlockwise angle a according to formula (1), (2). In the present embodiment, the first node of first key element and tail node be respectively as follows: p1 (-84.182975360289, 34.5842502161334), p2 (-87.950763043048,30.6717202546792), its a value is: 219 degree.
Step 5: move towards a for each key element, circulation performs: calculates according to formula (3) and moves towards the ordinal number k that a place is interval, And the value of Angle [k] is set.In the present embodiment, the trend of first key element is 219 degree, and its interval, place ordinal number is: 13, then The value of Angle [13] adds 1.
Step 6: traversal array Angle, finding maximum occurrences Max therein is 6, and determines that figure place m of Max is 1.
Step 7: be successively read the value of each element in array Angle, and be uniformly processed as m position by mending " 0 " on the left side.
Step 8: by the numeral of 24 1, be arranged in order together by ordinal number size, forms feature verification information Wr.This reality Executing in example, feature verification information Wr of formation is: 226212422434023210232313.
Step 9: plus after 8 current date character strings " 20131227 " before feature verification information Wr, character string is: 20131227226212422434023210232313.According to data manufacturer's user setup key information " 10010101 ", based on Authentication information W is encrypted by RSA cryptographic algorithms, and the copyright generating band timestamp adds confidential information We.This We information, close Key information Key, figure place m and azimuth packet number N need to achieve, in case copyright authentication uses.
(2) copyright mark extracts and verification process.
Step one: when finding suspect product, it is provided that key " 10010101 ", figure place " 1 ", azimuth packet number 24 and U.S. State's drainage map layer data is used for copyright authentication.
Step 2: Third Party Authentication mechanism to step 5, calculates array Angle according to step one during the generation of aforementioned copyright mark In each element value.In this example, element value is: 226212422434023210232313.
Step 3: according to key information Key, the copyright achieved is added confidential information We and is decrypted, generates 8 bit time stamps Information and feature verification information Wr.In the present embodiment, it is respectively as follows: " 20131227 ", " 226212422434023210232313 ".
Step 4: according to figure place 1, feature verification information Wr is reverted in array OriginAngle.
Step 5: the following n times that operate of circulation execution:
A () calculates distance D of each element in array Angle and array OriginAngle according to formula (4).
B each element circular in array Angle is moved to right one according to formula (5) by (), i.e. Angle [0]=Angle [23], Angle [23]=Angle [22] ..., Angle [2]=Angle [1], Angle [1]=Angle [0].
C (), according to formula (4), recalculates distance D of each element in Angle and array OriginAngle.
Step 6: ask for the minima of D, and take array Angle during minima and array OriginAngle, foundation according to D Following formula calculates similarity S.In the present embodiment, the minima of D is: D=0, calculates similarity according to formula (6), and its value is 1.
Step 7: owing to similarity S is 1, more than certification threshold value 0.85, then prove that suspect product is for infringement works.
In the embodiment of the present invention, for improving computational efficiency, only with the head and the tail node of line chart layer data, the substantially trend of computational element, Other sides such as the diagonal that can also take key element outsourcing rectangle moves towards, line segment trend between key element head node and key element geometric center point Method calculates.
Only carrying out copyright mark generation and authentication processing with line chart layer data in the embodiment of the present invention, the method is readily adaptable for use in face figure The copyright mark of layer data generates and certification.
In the embodiment of the present invention, only GIS vector data with shp form carries out copyright mark generation and authentication processing, and the method is also fitted Copyright mark for other form GIS vector data such as GML, E00, MIF generates and authentication processing.
(3) test analysis.
From above-described embodiment: initial data, after certain rotation attack processes, remains to correctly carry out copyright authentication.This calculation is described Method, for projective transformation, has higher robustness.Additionally, this method to data rotation, amplify, reduce etc. and to attack, have equally There is higher robustness.
To sum up analyzing, the method applied in the present invention can be applied successfully to the copyright authentication of GIS line of vector face figure layer data.

Claims (2)

1. a GIS vector data line face figure layer copyright authentication method, specifically includes following steps:
(1) copyright mark generates process
Step one: open a GIS vector data line chart layer file or face figure layer file;
Step 2: arranging azimuth packet number, be designated as N, for guaranteeing to divide exactly, N need to select the common divisor of 360, then by 0-360 This space, azimuth be divided into s={ (360*i/N, 360* (i+1)/N] | i=0,1 ..., N number of interval of N-1};
Step 3: arrange the integer array Angle of an a length of N, array element initial value is assigned to 0, is used for storing key element and moves towards distribution Key element number in each interval;
Step 4: carry out key element and move towards to calculate: if line chart layer, be then successively read first node and the tail node of each key element, point It is not designated as P1 (x1,y1)、P2(x2,y2);If face figure layer, then it is successively read first node and the intermediate node of each key element, point It is not designated as P1 (x1,y1)、P2(x2,y2);Then, P1 (x is calculated according to following formula (1) and (2)1,y1) and P2 (x2,y2) this 2 point Line formed section and the positive between centers of X anticlockwise angle a, a ∈ (0,360];
&theta; = a r c t a n ( y 2 - y 1 x 2 - x 1 ) ( x 2 - x 1 ) > 0 arctan ( y 2 - y 1 x 2 - x 1 ) + &pi; ( y 2 - y 1 ) &GreaterEqual; 0 , ( x 2 - x 1 ) < 0 arctan ( y 2 - y 1 x 2 - x 1 ) - &pi; ( y 2 - y 1 ) < 0 , ( x 2 - x 1 ) < 0 + &pi; 2 ( y 2 - y 1 ) > 0 , ( x 2 - x 1 ) = 0 - &pi; 2 ( y 2 - y 1 ) < 0 , ( x 2 - x 1 ) = 0 - - - ( 1 )
a = 180 * &theta; &pi; &theta; &Element; ( 0 , &pi; &rsqb; 180 * ( &theta; + 2 &pi; ) &pi; &theta; &Element; ( - &pi; , 0 &rsqb; - - - ( 2 )
Step 5: move towards for each key element, i.e. angle a, circulation performs:
Calculate, according to formula (3), the ordinal number k, k ∈ [1, N] that angle a place is interval, and the value of Angle [k] is set;
Step 6: traversal array Angle, finds maximum occurrences Max therein, and the figure place of Max is designated as m;
Step 7: be successively read the value of each element in array Angle, and be uniformly processed as m position by mending " 0 " on the left side;
Step 8: by the numeral of N number of m position, be arranged in order together by the ordinal number in array Angle, forms feature verification letter Breath Wr;
Step 9: plus after 8 current date character strings before feature verification information Wr, according to user setup key information Key, Being encrypted feature verification information Wr based on RSA cryptographic algorithms, the copyright generating band timestamp adds confidential information We;Copyright Mark adds confidential information We, key information Key, figure place m and azimuth packet number N to be needed to achieve, in case copyright authentication uses;
(2) copyright mark extracts and verification process
Step one: when finding suspect product, it is provided that copyright adds confidential information We, key information Key, figure place m, azimuth Packet number N and suspicious GIS vector data file are for copyright authentication;
Step 2: be grouped number N according to azimuth, during generating according to aforementioned copyright mark, step one is to step 5, calculates number Each element value in group Angle;
Step 3: according to key information Key, the copyright achieved is added confidential information We and is decrypted, generates 8 bit time stamps Information and feature verification information Wr;
Step 4: according to figure place m, feature verification information Wr is reverted in array OriginAngle;
Step 5: the following n times that operate of circulation execution:
A () calculates array Angle and the distance of array OriginAngle according to following formula (4);
D = &Sigma; i = 1 N ( A n g l e &lsqb; i &rsqb; - O r i g i n A n g l e &lsqb; i &rsqb; ) 2 - - - ( 4 )
B each element circular in array Angle is moved to right one by () (5) as the following formula, it may be assumed that
A n g l e &lsqb; 1 &rsqb; = A n g l e &lsqb; N &rsqb; A n g l e &lsqb; i + 1 &rsqb; = A n g l e &lsqb; i &rsqb; ( 0 < i < N ) - - - ( 5 )
C (), according to formula (4), recalculates distance D of each element in Angle and array OriginAngle;
Step 6: ask for repeatedly the minima of result of calculation D, and take array Angle during minima and array according to D OriginAngle, calculates similarity S according to formula (6);
S = &Sigma; i = 1 N A n g l e &lsqb; i &rsqb; &times; O r i g i n A n g l e &lsqb; i &rsqb; &Sigma; i = 1 N A n g l e &lsqb; i &rsqb; 2 &times; O r i g i n A n g l e &lsqb; i &rsqb; 2 - - - ( 6 )
Step 7: t is that user specifies threshold value, if S >=t, then proves that suspect product is for infringement works;Otherwise, it not the most infringement Works.
A kind of GIS vector data line face the most according to claim 1 figure layer copyright authentication method, it is characterised in that (one) Copyright mark generates in the step 4 of process, and key element is moved towards to calculate and taked the diagonal of key element outsourcing rectangle to move towards method or key element head Line segment between node and key element geometric center point moves towards method.
CN201410063386.0A 2014-02-20 2014-02-20 A kind of GIS vector data line face figure layer copyright authentication method Active CN103810407B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410063386.0A CN103810407B (en) 2014-02-20 2014-02-20 A kind of GIS vector data line face figure layer copyright authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410063386.0A CN103810407B (en) 2014-02-20 2014-02-20 A kind of GIS vector data line face figure layer copyright authentication method

Publications (2)

Publication Number Publication Date
CN103810407A CN103810407A (en) 2014-05-21
CN103810407B true CN103810407B (en) 2016-08-17

Family

ID=50707166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410063386.0A Active CN103810407B (en) 2014-02-20 2014-02-20 A kind of GIS vector data line face figure layer copyright authentication method

Country Status (1)

Country Link
CN (1) CN103810407B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105303076B (en) * 2015-10-23 2017-12-15 南京师范大学 GIS vector data copyright authentication method based on closest index
CN105678122B (en) * 2016-01-11 2018-04-24 南京师范大学 A kind of GIS vector data copyright authentication method based on topology information entropy
CN113129198B (en) * 2021-04-29 2024-01-12 南京师范大学 Zero watermark generation method and system and copyright infringement comparison method and system
CN114897659B (en) * 2022-05-09 2023-12-29 南京师范大学 Vector geographic data zero watermark generation method and zero watermark information detection method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556578A (en) * 2009-05-12 2009-10-14 南京师范大学 Method for controlling file access of GIS vector data
CN102110281A (en) * 2011-02-18 2011-06-29 南京师范大学 Method for embedding and extracting watermarks by adopting difference expansion aiming at shape point map layer data
KR20130039605A (en) * 2011-10-12 2013-04-22 (주) 한양지에스티 Surveying system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7197160B2 (en) * 2001-03-05 2007-03-27 Digimarc Corporation Geographic information systems using digital watermarks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556578A (en) * 2009-05-12 2009-10-14 南京师范大学 Method for controlling file access of GIS vector data
CN102110281A (en) * 2011-02-18 2011-06-29 南京师范大学 Method for embedding and extracting watermarks by adopting difference expansion aiming at shape point map layer data
KR20130039605A (en) * 2011-10-12 2013-04-22 (주) 한양지에스티 Surveying system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GIS矢量数据的自适应水印研究;张丽娟等;《地球信息科学》;20081231;第10卷(第6期);文献第724-729页 *

Also Published As

Publication number Publication date
CN103810407A (en) 2014-05-21

Similar Documents

Publication Publication Date Title
Chang et al. A novel turtle shell based scheme for data hiding
Zhang Reversible data hiding in encrypted image
CN103810407B (en) A kind of GIS vector data line face figure layer copyright authentication method
CN104486073B (en) A kind of encryption and decryption method of character type data
CN105634732B (en) A kind of more bit reversible information hidden methods of ciphertext domain
CN109803142B (en) Encrypted domain image reversible data hiding method based on neighborhood prediction
EP2290872A1 (en) Device for generating a message authentication code for authenticating a message
CN105303075B (en) Adaptive Text Watermarking method based on PDF format
JP2006244496A5 (en)
CN106951943A (en) Believable electronic contract is printed as paper contract and restores the method for electronic contract again
CN106709853B (en) Image retrieval method and system
CN102117476B (en) Signature watermark system used for CAD (Computer-Aided Design) documents
CN103902925A (en) Method and equipment for digital document signature
CN109600620B (en) Video file protection method
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
CN102800041A (en) Method for protecting integrity of digital vector map
CN103853946B (en) A kind of GIS vector data copyright authentication method based on FCM cluster feature
CN102142129B (en) Visual secret sharing-based image content tampering detection method
CN103377320B (en) A kind of vector geographic data selectivity certification semi-fragile watermarking method
CN108564520A (en) GIS vector data copyright authentication method based on not blue index
CN111866547B (en) Novel video tamper-proofing method
CN104036448B (en) Digital watermark algorithm for three-dimensional model
Huang et al. A spherical coordinate based fragile watermarking scheme for 3D models
CN102663673B (en) Chaotic mapping based shp line-surface layer fragile watermark technology
Dadkhah et al. An efficient image self-recovery and tamper detection using fragile watermarking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20190311

Address after: 210023 No. 18 Lingshan North Road, Qixia District, Nanjing City, Jiangsu Province, 4 Blocks 102

Patentee after: Nanjing Panzhi Geographic Information Industry Research Institute Co., Ltd.

Address before: 210046 No. 1 Wenyuan Road, Yadong New District, Nanjing, Jiangsu Province

Patentee before: Nanjing Normal University

TR01 Transfer of patent right