CN103903217A - Vector map integrity authentication method based on vertex insertion - Google Patents

Vector map integrity authentication method based on vertex insertion Download PDF

Info

Publication number
CN103903217A
CN103903217A CN201410120970.5A CN201410120970A CN103903217A CN 103903217 A CN103903217 A CN 103903217A CN 201410120970 A CN201410120970 A CN 201410120970A CN 103903217 A CN103903217 A CN 103903217A
Authority
CN
China
Prior art keywords
piece
watermark
summit
coordinate
map vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410120970.5A
Other languages
Chinese (zh)
Inventor
门朝光
王娜娜
田泽宇
门宇博
王思佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Engineering University
Original Assignee
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Engineering University filed Critical Harbin Engineering University
Priority to CN201410120970.5A priority Critical patent/CN103903217A/en
Publication of CN103903217A publication Critical patent/CN103903217A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention belongs to the field of geographic information science and information hiding, and particularly relates to a vector map integrity authentication method based on vertex insertion. The method comprises the steps of dividing a vector map into multiple areas, conducting block sorting on the vector map, recording the block type of the vector map, generating an authentication watermark, embedding the authentication watermark, and conducting watermark authentication and original data recovery. According to the method, the vector map is divided into multiple areas, corresponding authentication information is embedded into each area with the vertex insertion method, and in this way, in the authentication phase, not only can integrity authentication be achieved, tampered areas can also be positioned accurately, and the frequency of data retransmission caused by the failure in detecting tampered data accurately is effectively reduced; the false alarm rate is zero, the false dismissal rate is (1/2)L, and tampering detection can be conducted effectively.

Description

A kind of map vector completeness certification method inserting based on summit
Technical field
The invention belongs to Geographical Information Sciences, Information hiding field, be specifically related to a kind of map vector completeness certification method inserting based on summit.
Background technology
Along with the fast development of infotech and surveying and mapping technology, two-dimension vector map data have become the essential Support Resources in aspect such as Geographic Information System, intelligent transport system, digitalized city and digitizing national defense construction.The geography information of two-dimension vector map data description is full and accurate accurately, has huge economic worth and strategic importance.And by network and geographic information processing instrument, these data with huge economic value are easy to by bootlegging, distort and propagate.The map vector data of distorting, causes damage not only can to the precision of map vector, more can make the geography information producer, publisher and user sustain a great loss.When geographic information services is provided, the authenticity and integrity that how to ensure map vector data is current problem in the urgent need to address.
Digital signature technology in cryptography can be realized integrated authentication and the true and false of map vector and differentiate.But this technology can not positioning tampering position, once find that data change, no matter the data of distorting are desired data or non-required data, capital is thought that data are tampered and can not be used, need to again obtain data, increased time and the expense of data acquisition, unnecessary delay is caused in the application scenario that need to obtain in time data to some.And afterbody or head that the digital signature having is attached to copyright transmit together with copyright, when copyright is after format conversion and other operations, the digital signature of himself carrying will be lost, and causes authentication to be lost efficacy.For making up the defect of digital signature technology, Fragile Watermarking Technique arises at the historic moment as a kind of effective means of integrated authentication, becomes a focus of geography information digital product integrated authentication area research in recent years.
In Fragile Watermarking Technique, data receiver is divided into copyright after some parts, for every partial data generates corresponding authentication information and is embedded in corresponding data.The consistance of the authentication information that data receiver extracts in every partial data by judgement and the authentication information of generation, detects and positioning tampering data.Utilize the characteristic of Fragile Watermarking Technique positioning tampering, people can judge that altered data is the current data that will need or non-required data, thereby avoid factor data to retransmit the resource and the waste of time that cause.Because authentication information is hidden in copyright, with works interwoveness, together transmit, Fragile Watermarking Technique makes more hidden, the safety of authentication information transmission simultaneously.
In recent years, Fragile Watermarking Technique is at image, video, and considerable achievement in research has been obtained in audio frequency and text data field.The research of vector map watermark technology is progressively tending towards to ripe, but aspect map vector Fragile Watermarking Technique, the achievement that people obtain is also fewer.Use for reference the reversible authentication method for image integrity authentication that the people such as J.Fridrich propose, first the people such as Shao Chengyong proposed a kind of reversible Fragile Watermark Algorithm for two-dimension vector map integrated authentication in 2005.This algorithm is divided into map vector summit after different groups, generates corresponding authentication information and utilizes the people's such as Fridrich reversible authentication method to realize the embedding of watermark for every group.The method can detect that the multiple of map vector distort operation, attack but can not resist vector quantization, and when map vector increased summit/pel, when deleting summit/pel and operating, the tampering location ability of the method is strong not.Utilize equally the people's such as Fridrich reversible authentication method, 2009, the people such as Zheng in conjunction with the thought of piecemeal proposed can positioning tampering piece map vector reversible Fragile Watermark Algorithm.This method can tamper detection region, but increase, delete after attack when map vector suffers summit, tampering location ability is still poor, and if embedding parameter select improper, the method can not guarantee all map vectors can both correctly extract watermark information.Subsequently, the people such as Zheng proposes the reversible Fragile Watermark Algorithm of map vector of positioning tampering figure tuple in conjunction with the thought of pel grouping.The method is faced with the problem that map vector suffers that summit/pel increases, deletes tampering location scarce capacity after attacking equally.For obtaining good altered data positioning precision, Wang and Men have proposed the reversible vulnerable watermark method of map vector based on figure meta-tag.The method is positioning tampering figure tuple accurately, but can't be applied to a pel.
In addition, Zhang and Gao have proposed a kind of two-dimension vector graphics Semi-fragile watermarking algorithm based on dct transform.The method is to rotation, convergent-divergent, translation robust, but the embedding of watermark may affect the summit sequence situation of authentication phase, and then affects its grouping situation, causes watermark information correctly to extract, thereby cannot complete integrated authentication.The people such as Peng Fei have proposed a kind of semi-fragile watermarking method of two-dimentional CAD engineering drawing based on log-polar transform.The method is divided into groups summit, will be mapped to log-polar system for the summit of embed watermark, and the method for utilizing position to replace embeds watermark information in log-polar.For improving its tampering location ability, algorithm makes marks to guarantee that authentication phase can correctly divide into groups in the attribute information of the Article 1 line of each grouping.This scheme is to rotation, convergent-divergent, translation robust, but in the time that a certain group of data are deleted, tampering location ability is still not high.
In sum, although people have proposed some at present for map vector vulnerable watermark method, attempt to solve in verify data integrality the problem of positioning tampering, these methods Shortcomings also aspect accurate positioning tampering.
Summary of the invention
The object of the present invention is to provide accurately positioning tampering region of one, effectively reduce the map vector completeness certification method inserting based on summit because of the data re-transmission number of times that accurately tamper detection data cause.
The object of the present invention is achieved like this:
(1) divide map vector region;
Map vector pel is divided into the piece of non-overlapping copies, line number and the columns of the piece that map vector is divided are designated as N rand N w, the sum of piece is designated as N b, N b=N r× N w, i, i=1,2 ..., N bindividual map vector piece is designated as B i, comprise piece B ileft upper apex and the summit, bottom right of rectangle of regional extent be designated as respectively
Figure BDA0000483579700000021
with
Figure BDA0000483579700000022
with
Figure BDA0000483579700000023
represent respectively
Figure BDA0000483579700000024
x coordinate and y coordinate, with
Figure BDA0000483579700000026
represent respectively
Figure BDA0000483579700000027
x coordinate and y coordinate;
(2) map vector block sort;
All pieces are divided into two classes, and normal piece and empty piece, by piece B isummit number be designated as
Figure BDA0000483579700000028
if
Figure BDA0000483579700000029
piece B ifor normal piece; Otherwise, piece B ifor empty piece;
(3) record map vector block type;
Generation comprises N bthe sequence F of individual element, the type of each in recording step (2),
F={f i|f i∈{0,1},i=1,...,N B}
Wherein, f i=0 represents that i piece is a normal piece, f i=1 represents that i piece is an empty piece;
(4) generate authenticating water-mark;
Generate the authenticating water-mark of each normal piece in step (2), by piece B iwatermark information be designated as H i,
H i={h i,j∈{0,1},j∈[0,L-1]}
Wherein, L represents the number of bit in Hi, h i,j(0≤j≤L – 1) represents H iin j bit;
(5) embed authenticating water-mark;
The authenticating water-mark generating in step (4) is embedded in normal piece to embed watermark in normal piece
(5.1) according to map vector piece B iborder, calculate B icenter with
Figure BDA0000483579700000032
represent respectively center B c,ix coordinate and y coordinate;
(5.2) generate one with B c,icentered by, the round CB that r is radius i(B c,i, r), will be at circle CB i(B c,i, on circumference r), to insert and contain watermark summit with Hidden Authentication watermark, the value of radius r is:
( B i , max x - B i , min x , B i , max y - B i , min y )
(5.3) authenticating water-mark Hi is converted to the watermark sequence W that will embed i={ W i,j| j ∈ [0, N a– 1] }, W i,jrepresent sequence W iin j element, N arepresent sequence W imiddle element number;
(5.4) according to key K d, generate double-precision floating points sequence A i={ A i,j| j ∈ [0, N a– 1], (0≤A i,j<180) }, A i,jrepresent sequence A ij element, sequence A ibe used for embed watermark sequence W iangle sequence;
(5.5) for each element W of sequence Wi i,j(j ∈ [0, N a– 1]), be embedded into j angle A in sequence A i i,jmagnitude portion, be designated as A by what obtain containing watermark angle i,j';
(5.6) according to containing watermark angle A i,j', calculate at circle CB icircumference on containing watermark summit
Figure BDA0000483579700000034
position,
r j a = A i , j &prime; &times; ( &pi; / 180 ) v i , j x = B c , j x + r &times; cos ( r j a ) v i , j y = B c , i y + r &times; sin ( r j a )
Wherein,
Figure BDA0000483579700000036
with
Figure BDA0000483579700000037
represent respectively v i,jx coordinate and y coordinate, be designated as V by what calculate containing watermark vertex set i={ v i,j| j ∈ [0, N a– 1] };
(5.7) by V iin be inserted in map vector containing watermark summit, obtain containing watermark map vector;
(6) watermark authentication and raw data are recovered;
The piece of non-overlapping copies will be divided into containing the pel of watermark map vector; According to the type of each of sequence F identification in step (3);
For empty piece, in piece, contain summit, suffer to distort depending on it; Otherwise, think that this piece is by authentication, for normal piece:
(6.1) according to computing block B in step (5) i' center
Figure BDA0000483579700000041
and generate with B c,i' centered by, the circle that r' is radius
Figure BDA0000483579700000042
with
Figure BDA0000483579700000043
represent respectively center B c,i' x coordinate and y coordinate;
(6.2) search CB i' all summits on circumference, by CB i' the set on all summits is designated as on circumference V i c = { v i , j c ( v i , j c , x , v i , j c , y ) | j &Element; [ 0 , N c - 1 ] ) } , v i , j c Table CB i' j summit on circumference, v i , j c , x With v i , j c , y Represent respectively summit v i , j c X coordinate and y coordinate, N crepresent
Figure BDA0000483579700000049
the summit number comprising;
(6.3) obtain all possible watermark vertex set that contains, the sequence containing watermark vertex set is designated as V i p = { V i , j p | j &Element; [ 0 , N p - 1 ] } , V i , j p = { v i , j , k p ( v i , j , k p , x , v i , j , k p , y ) | k &Element; [ 0 , N A - 1 ] } Represent one possible containing watermark vertex set, by from
Figure BDA00004835797000000412
in choose N aindividual different summit obtains,
Figure BDA00004835797000000413
express possibility containing watermark vertex set in k summit,
Figure BDA00004835797000000415
with
Figure BDA00004835797000000416
represent respectively summit
Figure BDA00004835797000000417
x coordinate and y coordinate,
Figure BDA00004835797000000418
express possibility containing the number of watermark vertex set;
(6.4) for
Figure BDA00004835797000000419
in eachly may contain watermark vertex set
(6.4.1) utilize the watermark generation method of describing in step (4) to generate the watermark information H of Bi'' i'={ h i,j' | h i,j' ∈ { 0,1}, j ∈ [0, L – 1] }, B i' ' represent not comprise the piece B on middle summit i';
(6.4.2) generate one containing watermark vertex set V i , j &prime; = { v i , j , k &prime; ( v i , j , k x &prime; , v i , j , k y &prime; ) | k &Element; [ 0 , N A - 1 ] } , v i , j , k &prime; Represent V i,j' k summit,
Figure BDA00004835797000000423
with
Figure BDA00004835797000000424
represent respectively vertex v i, j, k' x coordinate and y coordinate;
If (6.4.3)
Figure BDA00004835797000000425
piece B i' comprise it accordingly containing watermark summit, piece B i' by integrated authentication, delete
Figure BDA00004835797000000426
in summit with recover raw data, piece B i' verification process leave it at that; Otherwise, repeating step (6.4) until
Figure BDA00004835797000000427
all set are all completed;
(6.5) if middle neither one may be piece B containing watermark vertex set i' containing watermark vertex set, think piece B i' suffered to distort.
Beneficial effect of the present invention is:
Map vector is divided into some regions by the present invention, the method of utilizing summit to insert embeds corresponding authentication information in each region, in authentication phase, not only can realize integrated authentication, and accurate positioning tampering region, effectively reduce the data re-transmission number of times because accurately tamper detection data cause; The present invention is carrying out after integrated authentication, and what the deletion watermark embedding stage inserted contains watermark summit, and precise restoration map vector raw data can meet the demand that user accurately uses map vector data; The alert rate of mistake of the present invention (being about to there is no the Data Detection of distorting is the probability of distorting) is zero, and false dismissed rate (Data Detection that is about to distort is the probability of distorting) is (1/2) l, effectively tamper detection.
Accompanying drawing explanation
Fig. 1 is the map vector completeness certification method process flow diagram inserting based on summit;
Fig. 2 is a piece and the example that is divided into the line chart unit in this piece;
Fig. 3 is IEEE-754 double-precision floating point form;
Fig. 4 is the map vector before embed watermark;
Fig. 5 is the map vector after embed watermark;
Fig. 6 be distort containing watermark map vector;
Fig. 7 is the map vector of positioning tampering.
Embodiment
Below in conjunction with accompanying drawing, 1-7 is described further the present invention.
The present invention proposes a kind of map vector completeness certification method inserting based on summit, the method is divided to map vector pel in different regions on the one hand, generate the corresponding authentication information in each region in conjunction with hashing algorithm, authentication information is embedded in angle sequence, and according to calculating the position containing watermark summit containing watermark angle sequence, the method of utilizing summit to insert realizes authentication information hiding in map vector data, can effectively solve the problem in accurate positioning tampering region; This algorithm is extracting after authentication information on the other hand, deletes the watermark summit that contains of inserting and can't harm reduction map vector raw data, can effectively guarantee the accurate use of map vector data.Experimental result shows the accurate positioning tampering of this scheme position, is a kind of practical algorithm for map vector integrated authentication, positioning tampering.
Map vector pel (some pel, line chart unit and face pel) is to be arranged and form according to specific order by a large amount of intensive summits, and map datum is exactly the 2 dimension coordinate sequences on these summits.Map vector Fragile Watermarking Technique is a kind of important means that solves map vector integrated authentication, positioning tampering problem.The map vector fragile watermark strategy of the current proposition of people can reach the target of verify data integrality and authenticity, but these strategies Shortcomings also aspect accurate positioning tampering.For the problems referred to above, the present invention proposes the map vector completeness certification method inserting based on summit, comprises the steps:
(1) divide map vector region;
In this step, map vector pel is divided into the piece of non-overlapping copies.The regional extent of a map vector piece can be considered as the region that a left upper apex by rectangle and summit, bottom right define.Line number and the columns of the piece that map vector is divided are designated as N rand N w, the sum of piece is designated as N b(N b=N r× N w), i (i=1,2 ..., N b) individual map vector piece is designated as B i, comprise piece B ileft upper apex and the summit, bottom right of rectangle of regional extent be designated as respectively
Figure BDA0000483579700000061
with
Figure BDA0000483579700000062
with
Figure BDA0000483579700000064
represent respectively
Figure BDA0000483579700000065
x coordinate and y coordinate,
Figure BDA0000483579700000066
with
Figure BDA0000483579700000067
represent respectively
Figure BDA0000483579700000068
x coordinate and y coordinate.
(2) map vector block sort;
In this step, according to the number on summit in each region unit, all pieces are divided into two classes: normal piece and empty piece.By piece B isummit number be designated as
Figure BDA00004835797000000613
if
Figure BDA00004835797000000612
piece B iit is a normal piece; Otherwise, piece B iit is an empty piece.The present invention is embed watermark in normal piece only.
(3) record map vector block type;
In this step, generate one and comprise N bthe sequence F of individual element, this sequence is used for the type of each of recording step (2),
F={f i|f i∈{0,1},i=1,...,N B}
Wherein, f i=0 represents that i piece is a normal piece, f i=1 represents that i piece is an empty piece.
(4) generate authenticating water-mark;
In this step, utilize hashing algorithm, generate the authenticating water-mark of each normal piece in step (2).By piece B iwatermark information be designated as H i,
H i={h i,j∈{0,1},j∈[0,L-1]}
Wherein, L represents H ithe number of middle bit, h i,j(0≤j≤L – 1) represents j bit in Hi.
(5) embed authenticating water-mark;
In this step, the method for utilizing summit to insert, is embedded into the authenticating water-mark generating in step (4) in corresponding normal piece.In a normal piece, the concrete steps of embed watermark (are supposed piece B as follows ibe a normal piece, the watermark that embed is H i):
A. according to map vector piece B iborder, calculate B icenter
Figure BDA0000483579700000069
with
Figure BDA00004835797000000610
represent respectively center B c,ix coordinate and y coordinate;
B. generate one with B c,icentered by, the round CB that r is radius i(B c,i, r).The present invention will be at circle CB i(B c,i, on circumference r), insert containing watermark summit with Hidden Authentication watermark.For guaranteeing can not exceed piece B containing watermark summit iborder, the value of radius r should meet the following conditions,
( B i , max x - B i , min x , B i , max y - B i , min y )
C. by authenticating water-mark H iconvert the watermark sequence W that will embed to i={ W i,j| j ∈ [0, N a– 1] }, W i,jrepresent sequence W iin j element, N arepresent sequence W imiddle element number;
D. in key K dparticipation under, generate a double-precision floating points sequence A i={ A i,j| j ∈ [0, N a– 1], (0≤A i,j<180) }.A i,jrepresent sequence A ij element, sequence A ibe used for embed watermark sequence W iangle sequence;
E. for sequence W ieach element W i,j(j ∈ [0, N a– 1]), the method for utilizing position to replace is embedded into sequence A iin j angle A i,jmagnitude portion.Be designated as A by what obtain containing watermark angle i,j';
F. according to containing watermark angle A i,j', calculate at circle CB icircumference on containing watermark summit
Figure BDA00004835797000000723
position,
r j a = A i , j &prime; &times; ( &pi; / 180 ) v i , j x = B c , j x + r &times; cos ( r j a ) v i , j y = B c , i y + r &times; sin ( r j a )
Wherein,
Figure BDA0000483579700000072
with
Figure BDA0000483579700000073
represent respectively v i,jx coordinate and y coordinate.Be designated as V by what calculate according to step e-f containing watermark vertex set i={ v i,j| j ∈ [0, N a– 1] };
G. by V iin be inserted in map vector containing watermark summit, obtain containing watermark map vector.
(6) watermark authentication and raw data are recovered;
In this step, the piece of non-overlapping copies will be divided into containing the pel of watermark map vector; Utilize sequence F in step (3) to identify the type of each; Utilize diverse ways to authenticate the integrality of different pieces.
For an empty piece, if contain summit in this piece, suffer to distort depending on it; Otherwise, think that this piece is by authentication.
For a normal piece, the concrete steps of its verification process are following (to be supposed containing watermark block B i' be a normal piece):
A. according to the a-b computing block B in step (5) i' center and generate one with B c,i' centered by, the round CB that r' is radius i' (B c,i', r').Wherein,
Figure BDA0000483579700000075
with represent respectively center B c,i' x coordinate and y coordinate;
B. search for CB i' all summits on circumference.By CB i' the set on all summits is designated as on circumference
Figure BDA0000483579700000077
Figure BDA0000483579700000078
table CB i' j summit on circumference,
Figure BDA0000483579700000079
with
Figure BDA00004835797000000710
represent respectively summit
Figure BDA00004835797000000711
x coordinate and y coordinate, Nc represents
Figure BDA00004835797000000712
the summit number comprising;
C. obtain all possible containing watermark vertex set.The all possible sequence containing watermark vertex set is designated as V i p = { V i , j p | j &Element; [ 0 , N p - 1 ] } , Wherein, V i , j p = { v i , j , k p ( v i , j , k p , x , v i , j , k p , y ) | k &Element; [ 0 , N A - 1 ] } Represent one possible containing watermark vertex set, this set by from
Figure BDA00004835797000000716
in choose N aindividual different summit obtains,
Figure BDA00004835797000000717
express possibility containing watermark vertex set
Figure BDA00004835797000000718
in k summit,
Figure BDA00004835797000000719
with represent respectively summit
Figure BDA00004835797000000721
x coordinate and y coordinate,
Figure BDA00004835797000000722
express possibility containing the number of watermark vertex set;
D. for
Figure BDA0000483579700000081
in eachly may contain watermark vertex set carry out following 3 steps:
P1. utilize the watermark generation method of describing in step (4) to generate B i' ' watermark information
Figure BDA0000483579700000083
l – 1] }.Wherein, B i' ' represent not comprise
Figure BDA0000483579700000084
the piece B on middle summit i'.
P2. utilize c-f and the H of step (5) i', generate one containing watermark vertex set
Figure BDA0000483579700000085
Figure BDA0000483579700000086
represent V i,j' k summit,
Figure BDA0000483579700000087
with
Figure BDA0000483579700000088
represent respectively vertex v i, j, k' x coordinate and y coordinate.
If p3.
Figure BDA0000483579700000089
piece B i' comprise it accordingly containing watermark summit, piece B i' by integrated authentication, delete
Figure BDA00004835797000000810
in summit with recover raw data, piece B i' verification process leave it at that; Otherwise, repeating step d until
Figure BDA00004835797000000811
all set are all completed.
If e.
Figure BDA00004835797000000812
middle neither one may be piece B containing watermark vertex set i' containing watermark vertex set, think piece B i' suffered to distort.
Verify after the integrality of each map vector piece, shown all map vector pieces that are tampered.
The present invention proposes a kind of map vector completeness certification method based on inserting summit, the method is divided to map vector pel in different regions on the one hand, generate the corresponding authentication information in each region in conjunction with hashing algorithm, authentication information is embedded in angle sequence, according to calculating the position containing watermark summit containing watermark angle sequence, the method of utilizing summit to insert realizes authentication information hiding in map vector data, can effectively solve the problem in accurate positioning tampering region; This algorithm is extracting after authentication information on the other hand, deletes the watermark summit that contains of inserting and can't harm reduction map vector raw data, can effectively guarantee the accurate use of map vector data.Compared with other map vector completeness certification methods, the present invention has the following advantages:
1, map vector is divided into some regions by the present invention, the method of utilizing summit to insert embeds corresponding authentication information in each region, in authentication phase, not only can realize integrated authentication, and accurate positioning tampering region, effectively reduce the data re-transmission number of times because accurately tamper detection data cause;
2, the present invention is carrying out after integrated authentication, and what the deletion watermark embedding stage inserted contains watermark summit, and precise restoration map vector raw data can meet the demand that user accurately uses map vector data;
3, the alert rate of mistake of the present invention (being about to there is no the Data Detection of distorting is the probability of distorting) is zero, and false dismissed rate (Data Detection that is about to distort is the probability of distorting) is (1/2) l, effectively tamper detection.
The present invention proposes a kind of map vector completeness certification method based on inserting summit, the method is divided to map vector pel in different regions on the one hand, generate the corresponding authentication information in each region in conjunction with hashing algorithm, authentication information is embedded in angle sequence, according to calculating the position containing watermark summit containing watermark angle sequence, the method of utilizing summit to insert realizes authentication information hiding in map vector data, can effectively solve the problem in accurate positioning tampering region; This algorithm is extracting after authentication information on the other hand, deletes the watermark summit that contains of inserting and can't harm reduction map vector raw data, can effectively guarantee the accurate use of map vector data.Compared with other map vector completeness certification methods, the present invention has the following advantages:
1, map vector is divided into some regions by the present invention, the method of utilizing summit to insert embeds corresponding authentication information in each region, in authentication phase, not only can realize integrated authentication, and accurate positioning tampering region, effectively reduce the data re-transmission number of times because accurately tamper detection data cause;
2, the present invention is carrying out after integrated authentication, and what the deletion watermark embedding stage inserted contains watermark summit, and precise restoration map vector raw data can meet the demand that user accurately uses map vector data;
3, the alert rate of mistake of the present invention (being about to there is no the Data Detection of distorting is the probability of distorting) is zero, and false dismissed rate (Data Detection that is about to distort is the probability of distorting) is (1/2) l, effectively tamper detection.
As shown in Figure 1, the present invention is based on the map vector completeness certification method process flow diagram that insert on summit, the method is totally divided into two aspect: A, vector map watermark embeds algorithm; B, vector map watermark identifying algorithm.
A, vector map watermark embed algorithm, and step is as follows:
(1) divide map vector region;
Map vector pel is divided into the piece of non-overlapping copies.The regional extent of a map vector piece can be considered as the region that a left upper apex by rectangle and summit, bottom right define.Line number and the columns of the piece that map vector is divided are designated as N rand N w, the sum of piece is designated as N b(N b=N r× N w), i (i=1,2 ..., N b) individual map vector piece is designated as B i, comprise piece B ileft upper apex and the summit, bottom right of rectangle of regional extent be designated as respectively
Figure BDA0000483579700000091
with
Figure BDA0000483579700000092
with
Figure BDA0000483579700000093
represent respectively
Figure BDA0000483579700000094
x coordinate and y coordinate, with
Figure BDA0000483579700000096
represent respectively
Figure BDA0000483579700000097
x coordinate and y coordinate.
Here, a pel is only divided in a region unit.Once after a pel is divided in a region unit, all summits of this pel are also all divided in this region unit, even if some summits of this pel may exceed the regional extent of this piece.In Fig. 2, show map vector piece B iborder and a line chart unit being divided into wherein
Figure BDA0000483579700000098
example,
Figure BDA0000483579700000099
with represent respectively vertex v in the PL of line chart unit jx coordinate and y coordinate.For summit is described
Figure BDA00004835797000000911
with and B iuntrue being present in map vector file of border, summit
Figure BDA00004835797000000913
with
Figure BDA00004835797000000914
show B with Dark grey iborder show with dotted line.In all summits of online pel PL, v 0, v 1and v 4exceed map vector piece B iregional extent, v 2and v 3at B iregional extent in, but all summits of pel PL all belong to map vector piece B i.
(2) map vector block sort;
According to the number on summit in each region unit, all pieces are divided into two classes: normal piece and empty piece.By piece B isummit number be designated as NB iif, NB i>=0, piece Bi is a normal piece; Otherwise piece Bi is an empty piece.The present invention is embed watermark in normal piece only.
(3) record map vector block type;
Generate one and comprise N bthe sequence F of individual element, this sequence is used for the type of each of recording step (2),
F={f i|f i∈{0,1},i=1,...,N B}
Wherein, f i=0 represents that i piece is a normal piece, f i=1 represents that i piece is an empty piece.
(4) generate authenticating water-mark;
Utilize hashing algorithm, generate the authenticating water-mark of each normal piece in step (2).By piece B iwatermark information be designated as H i,
H i={h i,j∈{0,1},j∈[0,L-1]}
Wherein, L represents H ithe number of middle bit, h i,j(0≤j≤L – 1) represents H iin j bit.
Generate piece B iauthenticating water-mark H imethod as follows:
H i=blockhash(hash(I(B i),k,i,M index),L,K).
Wherein, I () represents the spatial data that obtains and the method for attribute data, and k represents that one for generating the private key of an input parameter of hash (), M indexrepresent the index value of this map vector, hash () represents an existing cryptographic Hash algorithm, blockhash (H i a, L, K) be illustrated under the control of private key K from bit sequence H i athe method of middle selection L bit.Blockhash (H i a, L, K) and in method, H i a={ h t a| h t a∈ { 0,1}, t ∈ [0, HA – 1] } represents the binary string that hash () generates, and HA represents H i alength, the method is specific as follows:
tp = ( u j &times; i ) % HA h i , j = h tp a
Wherein, u jrepresent the pseudo-random number sequence U={u being generated by key K j| j=0,1 ..., j the element of L – 1}.
(5) embed authenticating water-mark;
In this step, the method for utilizing summit to insert, is embedded into the authenticating water-mark generating in step (4) in corresponding normal piece.In a normal, the concrete steps of embed watermark (are supposed piece B as follows ibe a normal piece, the watermark that embed is H i):
A. according to map vector piece B iborder, calculate B icenter
Figure BDA0000483579700000102
B c , i x = ( B i , max x + B i , min x ) / 2 B c , i y = ( B i , max y + B i , min y ) / 2
Wherein,
Figure BDA0000483579700000104
with
Figure BDA0000483579700000105
represent respectively center B c,ix coordinate and y coordinate.
B. generate one with B c,icentered by, the round CB that r is radius i(B c,i, r).The present invention will be at circle CB i(B c,i, on circumference r), insert containing watermark summit with Hidden Authentication watermark.For guaranteeing can not exceed piece B containing watermark summit iborder, the value of radius r should meet the following conditions,
( B i , max x - B i , min x , B i , max y - B i , min y )
C. authenticating water-mark Hi is converted to watermark sequence W to be embedded i={ W i,j| j ∈ [0, N a– 1] },
W i , j = { h i , k | k &Element; [ j &times; 52 , ( j + 1 ) &times; 52 - 1 ] } , 0 &le; j < N A - 1 W i , j = { h i , k | k &Element; [ j &times; 52 , L - 1 ] } , j = N A - 1
Wherein, W i,jrepresent sequence W iin j element, N arepresent sequence W imiddle element number.Embed watermark in the magnitude portion of the angle that the present invention represents at double-precision floating points.As shown in Figure 3, the double-precision floating points stipulating in IEEE-754 comprises 3 parts: symbolic component (the 63rd bit), exponential part (52-62 bit) and magnitude portion (0-51 bit).Because the magnitude portion of a double-precision floating points can embed the data of 52 bits, therefore, watermark sequence W to be embedded ieach element can comprise 52 bit watermark information, i.e. W ielement number N afor=
Figure BDA0000483579700000115
required angle number is also
Figure BDA0000483579700000116
D. in key K dparticipation under, generate a double-precision floating points sequence A i={ A i,j| j ∈ [0, N a– 1], (0≤A i,j<180) },
P i , j b = rand ( K d ) % 180 P i , j a = 1.0 / ( rand ( K d ) + 1 ) A i , j = P i , j a + P i , j b
Wherein, A i,jrepresent sequence A ij element, rand (K d) be illustrated in key K dparticipation under return a random integers P (P=0,1,2 ...) function.Sequence A ibe used for embed watermark sequence W iangle sequence.
E. for each element W of sequence Wi i,j(j ∈ [0, N a– 1]), the method for utilizing position to replace is embedded into sequence A iin j angle A i,jmagnitude portion, be designated as A by what obtain containing watermark angle i,j';
F. according to containing watermark angle A i,j', calculate at circle CB icircumference on containing watermark summit
Figure BDA0000483579700000113
position,
r j a = A i , j &prime; &times; ( &pi; / 180 ) v i , j x = B c , i x + r &times; cos ( r j a ) v i , j y = B c , i y + r &times; sin ( r j a )
Be designated as V by what calculate according to step e-f containing watermark vertex set i={ v i,j| j ∈ [0, N a– 1] };
G. by V iin be inserted in map vector containing watermark summit, obtain containing watermark map vector.If this map vector is made up of a pel, will be considered as a pel containing watermark summit and be inserted in map vector; If this map vector is made up of line chart unit or face pel, utilize all watermark summits that contain build new line chart unit or a face pel and be inserted in map vector.
As shown in Figure 5, after the Chinese Railway map embed watermark shown in Fig. 4, increased some bar charts unit.
B, vector map watermark identifying algorithm
(6) watermark authentication and raw data are recovered;
The piece of non-overlapping copies will be divided into containing the pel of watermark map vector; Utilize sequence F in step (3) to identify the type of each; Utilize diverse ways to authenticate the integrality of different pieces.
For an empty piece, if contain summit in this piece, suffer to distort depending on it; Otherwise, think that this piece is by authentication.
For a normal piece, the concrete steps of its verification process are following (to be supposed containing watermark block B i' be a normal piece):
A. according to the a-b computing block B in step (5) i' center
Figure BDA0000483579700000121
and generate one with B c,i' centered by, the round CB that r' is radius i' (B c,i', r').Wherein,
Figure BDA0000483579700000122
with
Figure BDA0000483579700000123
represent respectively center B c,i' x coordinate and y coordinate;
B. search for CB i' all summits on circumference.By CB i' the set on all summits is designated as on circumference
Figure BDA0000483579700000125
table CB i' j summit on circumference,
Figure BDA0000483579700000126
with
Figure BDA0000483579700000127
represent respectively summit
Figure BDA0000483579700000128
x coordinate and y coordinate, N crepresent
Figure BDA0000483579700000129
the summit number comprising;
C. obtain all possible containing watermark vertex set.The all possible sequence containing watermark vertex set is designated as V i p = { V i , j p | j &Element; [ 0 , N p - 1 ] } , Wherein, V i , j p = { v i , j , k p ( v i , j , k p , x , v i , j , k p , y ) | k &Element; [ 0 , N A - 1 ] } Represent one possible containing watermark vertex set, this set by from
Figure BDA00004835797000001213
in choose N aindividual different summit obtains,
Figure BDA00004835797000001214
express possibility containing watermark vertex set in k summit,
Figure BDA00004835797000001216
with
Figure BDA00004835797000001217
represent respectively summit
Figure BDA00004835797000001218
x coordinate and y coordinate,
Figure BDA00004835797000001219
express possibility containing the number of watermark vertex set;
D. for in eachly may contain watermark vertex set carry out following 3 steps:
P1. utilize the watermark generation method of describing in step (4) to generate B i' ' watermark information H i'={ h i,j' | h i,j' ∈ { 0,1}, j ∈ [0, L – 1] }.Wherein, B i' ' represent not comprise the piece B on middle summit i'.
P2. utilize c-f and the H of step (5) i', generate one containing watermark vertex set
Figure BDA00004835797000001223
Figure BDA00004835797000001230
represent V i,j' k summit,
Figure BDA00004835797000001224
with
Figure BDA00004835797000001225
represent respectively vertex v i, j, k' x coordinate and y coordinate.
If p3.
Figure BDA00004835797000001226
piece B i' comprise it accordingly containing watermark summit, piece B i' by integrated authentication, delete
Figure BDA00004835797000001227
in summit with recover raw data, piece B i' verification process leave it at that; Otherwise, repeating step d until
Figure BDA00004835797000001228
all set are all completed.
If e.
Figure BDA00004835797000001229
middle neither one is piece B containing watermark vertex set i' containing watermark vertex set, think piece B i' suffered to distort.
Verify after the integrality of each map vector piece, shown all map vector pieces that are tampered.Map vector after the moisture seal Chinese Railway map that Figure 6 shows that Fig. 5 is distorted has occurred to distort in region A, B, C.In Fig. 7, detected after the integrality of each map vector piece, the pel of the map vector piece of distorting is shown as thick lines and is Dark grey.Can find out, the present invention is positioning tampering accurately.
The method embed watermark that utilizes position to replace in the magnitude portion of the angle that the present invention represents in the floating number of double precision, can guarantee the correct extraction at authentication phase watermark information, if map vector piece is not distorted, can accurately calculate it containing watermark summit, and then correctly judge the integrality of this map vector piece, the alert rate of mistake is zero, and false dismissed rate is (1/2) l.

Claims (1)

1. the map vector completeness certification method inserting based on summit, is characterized in that:
(1) divide map vector region;
Map vector pel is divided into the piece of non-overlapping copies, line number and the columns of the piece that map vector is divided are designated as N rand N w, the sum of piece is designated as N b, N b=N r× N w, i, i=1,2 ..., N bindividual map vector piece is designated as B i, comprise piece B ileft upper apex and the summit, bottom right of rectangle of regional extent be designated as respectively with
Figure FDA0000483579690000011
with
Figure FDA0000483579690000012
represent respectively
Figure FDA0000483579690000013
x coordinate and y coordinate, with represent respectively
Figure FDA0000483579690000016
x coordinate and y coordinate;
(2) map vector block sort;
All pieces are divided into two classes, and normal piece and empty piece, by piece B isummit number be designated as
Figure FDA0000483579690000017
if
Figure FDA0000483579690000018
piece B ifor normal piece; Otherwise, piece B ifor empty piece;
(3) record map vector block type;
Generation comprises N bthe sequence F of individual element, the type of each in recording step (2),
F={f i|f i∈{0,1},i=1,...,N B}
Wherein, f i=0 represents that i piece is a normal piece, f i=1 represents that i piece is an empty piece;
(4) generate authenticating water-mark;
Generate the authenticating water-mark of each normal piece in step (2), by piece B iwatermark information be designated as H i,
H i={h i,j∈{0,1},j∈[0,L-1]}
Wherein, L represents the number of bit in Hi, h i,j(0≤j≤L – 1) represents j bit in Hi;
(5) embed authenticating water-mark;
The authenticating water-mark generating in step (4) is embedded in normal piece to embed watermark in normal piece
(5.1) according to map vector piece B iborder, calculate B icenter
Figure FDA00004835796900000111
with
Figure FDA00004835796900000112
represent respectively center B c,ix coordinate and y coordinate;
(5.2) generate one with B c,icentered by, the round CB that r is radius i(B c,i, r), will be at circle CB i(B c,i, on circumference r), to insert and contain watermark summit with Hidden Authentication watermark, the value of radius r is:
( B i , max x - B i , min x , B i , max y - B i , min y )
(5.3) authenticating water-mark Hi is converted to the watermark sequence W that will embed i={ W i,j| j ∈ [0, N a– 1] }, W i,jrepresent j element in sequence Wi, N arepresent sequence W imiddle element number;
(5.4) according to key K d, generate double-precision floating points sequence A i={ A i,j| j ∈ [0, N a– 1], (0≤A i,j<180) }, A i,jrepresent sequence A ij element, sequence A ibe used for embed watermark sequence W iangle sequence;
(5.5) for each element W of sequence Wi i,j(j ∈ [0, N a– 1]), be embedded into sequence A iin j angle A i,jmagnitude portion, be designated as A by what obtain containing watermark angle i,j';
(5.6) according to containing watermark angle A i, j', calculate at circle CB icircumference on containing watermark summit
Figure FDA0000483579690000021
position,
r j a = A i , j &prime; &times; ( &pi; / 180 ) v i , j x = B c , j x + r &times; cos ( r j a ) v i , j y = B c , i y + r &times; sin ( r j a )
Wherein, with
Figure FDA0000483579690000024
represent respectively v i,jx coordinate and y coordinate, be designated as V by what calculate containing watermark vertex set i={ v i,j| j ∈ [0, N a– 1] };
(5.7) by V iin be inserted in map vector containing watermark summit, obtain containing watermark map vector;
(6) watermark authentication and raw data are recovered;
The piece of non-overlapping copies will be divided into containing the pel of watermark map vector; According to the type of each of sequence F identification in step (3);
For empty piece, in piece, contain summit, suffer to distort depending on it; Otherwise, think that this piece is by authentication, for normal piece:
(6.1) according to computing block B in step (5) i' center
Figure FDA0000483579690000025
and generate with B c,i' centered by, the circle that r' is radius
Figure FDA0000483579690000026
with
Figure FDA0000483579690000027
represent respectively center B c,i' x coordinate and y coordinate;
(6.2) search CB i' all summits on circumference, by CB i' the set on all summits is designated as on circumference V i c = { v i , j c ( v i , j c , x , v i , j c , y ) | j &Element; [ 0 , N c - 1 ] ) } , v i , j c Table CB i' j summit on circumference, v i , j c , x With v i , j c , y Represent respectively summit v i , j c X coordinate and y coordinate, N crepresent V i cthe summit number comprising;
(6.3) obtain all possible watermark vertex set that contains, the sequence containing watermark vertex set is designated as V i p = { V i , j p | j &Element; [ 0 , N p - 1 ] } , V i , j p = { v i , j , k p ( v i , j , k p , x , v i , j , k p , y ) | k &Element; [ 0 , N A - 1 ] } Represent one possible containing watermark vertex set, by from V i c In choose N aindividual different summit obtains,
Figure FDA00004835796900000216
express possibility containing watermark vertex set
Figure FDA00004835796900000217
in k summit,
Figure FDA00004835796900000218
with
Figure FDA00004835796900000219
represent respectively summit
Figure FDA00004835796900000220
x coordinate and y coordinate,
Figure FDA00004835796900000221
express possibility containing the number of watermark vertex set;
(6.4) for
Figure FDA00004835796900000222
in eachly may contain watermark vertex set
Figure FDA00004835796900000223
(6.4.1) utilize the watermark generation method of describing in step (4) to generate B i' ' watermark information H i'={ h i, j' | h i, j' ∈ { 0,1}, j ∈ [0, L – 1] }, B i' ' represent not comprise
Figure FDA00004835796900000224
the piece B on middle summit i';
(6.4.2) generate one containing watermark vertex set V i , j &prime; = { v i , j , k &prime; ( v i , j , k x &prime; , v i , j , k y &prime; ) | k &Element; [ 0 , N A - 1 ] } , v i , j , k &prime; Represent V i,j' k summit, with
Figure FDA0000483579690000032
represent respectively vertex v i, j, k' x coordinate and y coordinate;
If (6.4.3) piece B i' comprise it accordingly containing watermark summit, piece B i 'by integrated authentication, delete
Figure FDA0000483579690000034
in summit with recover raw data, piece B i' verification process leave it at that; Otherwise, repeating step (6.4) until
Figure FDA0000483579690000035
all set are all completed;
(6.5) if
Figure FDA0000483579690000036
middle neither one may be piece B containing watermark vertex set i' containing watermark vertex set, think piece B i' suffered to distort.
CN201410120970.5A 2014-03-28 2014-03-28 Vector map integrity authentication method based on vertex insertion Pending CN103903217A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410120970.5A CN103903217A (en) 2014-03-28 2014-03-28 Vector map integrity authentication method based on vertex insertion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410120970.5A CN103903217A (en) 2014-03-28 2014-03-28 Vector map integrity authentication method based on vertex insertion

Publications (1)

Publication Number Publication Date
CN103903217A true CN103903217A (en) 2014-07-02

Family

ID=50994525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410120970.5A Pending CN103903217A (en) 2014-03-28 2014-03-28 Vector map integrity authentication method based on vertex insertion

Country Status (1)

Country Link
CN (1) CN103903217A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426710A (en) * 2015-11-12 2016-03-23 南京师范大学 Method for accurately authenticating vector geographic data based on spatial domain sequencing
CN105488434A (en) * 2015-12-03 2016-04-13 江苏师范大学 Mark based vector map completeness authentication method
CN107154011A (en) * 2017-03-21 2017-09-12 江苏师范大学 The map vector completeness certification method of positioning tampering pel group
CN113052939A (en) * 2019-12-10 2021-06-29 辉达公司 Unified coding of patch sections, tops and connections for path delineation
CN115630402A (en) * 2022-12-22 2023-01-20 安徽华云安科技有限公司 Information hiding method, device and equipment based on floating point number and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604440A (en) * 2009-04-23 2009-12-16 哈尔滨工程大学 Treatment method for reversibly watermarking vector map based on space characteristics
CN102800041A (en) * 2012-06-11 2012-11-28 哈尔滨工程大学 Method for protecting integrity of digital vector map
CN103325082A (en) * 2013-06-14 2013-09-25 哈尔滨工程大学 Vector map reversible information hiding method based on LSD planes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604440A (en) * 2009-04-23 2009-12-16 哈尔滨工程大学 Treatment method for reversibly watermarking vector map based on space characteristics
CN102800041A (en) * 2012-06-11 2012-11-28 哈尔滨工程大学 Method for protecting integrity of digital vector map
CN103325082A (en) * 2013-06-14 2013-09-25 哈尔滨工程大学 Vector map reversible information hiding method based on LSD planes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
NANA WANG,ET AL.: "Reversible fragile watermarking for locating tampered blocks in 2D vector maps", 《MULTIMEDIA TOOLS AND APPLICATIONS》 *
NANA WANGA,ET AL.: "Reversible fragile watermarking for 2-D vector map authentication with localization", 《COMPUTER-AIDED DESIGN》 *
WANG NANA,ET AL.: "A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates", 《COMPUTER-AIDED DESIGN》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105426710A (en) * 2015-11-12 2016-03-23 南京师范大学 Method for accurately authenticating vector geographic data based on spatial domain sequencing
CN105426710B (en) * 2015-11-12 2018-02-09 南京师范大学 A kind of vector geographic data Hard Authentication method based on spatial domain sequence
CN105488434A (en) * 2015-12-03 2016-04-13 江苏师范大学 Mark based vector map completeness authentication method
CN105488434B (en) * 2015-12-03 2018-11-02 江苏师范大学 A kind of map vector completeness certification method based on label
CN107154011A (en) * 2017-03-21 2017-09-12 江苏师范大学 The map vector completeness certification method of positioning tampering pel group
CN107154011B (en) * 2017-03-21 2020-09-15 江苏师范大学 Vector map integrity authentication method for positioning tamper map group
CN113052939A (en) * 2019-12-10 2021-06-29 辉达公司 Unified coding of patch sections, tops and connections for path delineation
CN113052939B (en) * 2019-12-10 2024-03-08 辉达公司 Patch segment, tip and connection unification encoding for path tracing
CN115630402A (en) * 2022-12-22 2023-01-20 安徽华云安科技有限公司 Information hiding method, device and equipment based on floating point number and storage medium

Similar Documents

Publication Publication Date Title
Chang et al. A secure fragile watermarking scheme based on chaos-and-hamming code
Wang et al. Reversible fragile watermarking for 2-D vector map authentication with localization
Dhole et al. Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks
CN103310407B (en) Based on the vectorial geographical spatial data total blindness water mark method of QR code
Peng et al. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion
Wang et al. Reversible fragile watermarking for locating tampered blocks in 2D vector maps
CN102103738B (en) Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks
CN107742272A (en) A kind of semi-fragile watermarks method for positioning and recovering based on distorted image
CN110390623B (en) Secret sharing-based image media security authentication recovery method
CN103903217A (en) Vector map integrity authentication method based on vertex insertion
CN103268588B (en) Encrypted domain lossless reciprocal information concealing method based on carrier image check code
CN102800041B (en) Method for protecting integrity of digital vector map
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
CN105488434A (en) Mark based vector map completeness authentication method
Wu et al. A simple image tamper detection and recovery based on fragile watermark with one parity section and two restoration sections
Ren et al. Selective authentication algorithm based on semi-fragile watermarking for vector geographical data
CN103123719B (en) The Zero watermarking method of a kind of image authentication and tampering location
CN102270336A (en) Safe fragile watermarking method based on multiple dependency structures
CN103886536A (en) Digital-watermark realization method for positioning of digital-image tampering
Li et al. Oblivious fragile watermarking scheme for image authentication
Neyman et al. Reversible fragile watermarking based on difference expansion using manhattan distances for 2d vector map
Li et al. Study on copyright authentication of GIS vector data based on Zero-watermarking
CN102073978A (en) Method and system for identifying and recovering digital images by utilizing irregular region segmentation
CN103377320B (en) A kind of vector geographic data selectivity certification semi-fragile watermarking method
Zheng et al. A fragile digital watermark used to verify the integrity of vector map

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140702

WD01 Invention patent application deemed withdrawn after publication