CN103903217A - Vector map integrity authentication method based on vertex insertion - Google Patents
Vector map integrity authentication method based on vertex insertion Download PDFInfo
- Publication number
- CN103903217A CN103903217A CN201410120970.5A CN201410120970A CN103903217A CN 103903217 A CN103903217 A CN 103903217A CN 201410120970 A CN201410120970 A CN 201410120970A CN 103903217 A CN103903217 A CN 103903217A
- Authority
- CN
- China
- Prior art keywords
- piece
- watermark
- summit
- coordinate
- map vector
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention belongs to the field of geographic information science and information hiding, and particularly relates to a vector map integrity authentication method based on vertex insertion. The method comprises the steps of dividing a vector map into multiple areas, conducting block sorting on the vector map, recording the block type of the vector map, generating an authentication watermark, embedding the authentication watermark, and conducting watermark authentication and original data recovery. According to the method, the vector map is divided into multiple areas, corresponding authentication information is embedded into each area with the vertex insertion method, and in this way, in the authentication phase, not only can integrity authentication be achieved, tampered areas can also be positioned accurately, and the frequency of data retransmission caused by the failure in detecting tampered data accurately is effectively reduced; the false alarm rate is zero, the false dismissal rate is (1/2)L, and tampering detection can be conducted effectively.
Description
Technical field
The invention belongs to Geographical Information Sciences, Information hiding field, be specifically related to a kind of map vector completeness certification method inserting based on summit.
Background technology
Along with the fast development of infotech and surveying and mapping technology, two-dimension vector map data have become the essential Support Resources in aspect such as Geographic Information System, intelligent transport system, digitalized city and digitizing national defense construction.The geography information of two-dimension vector map data description is full and accurate accurately, has huge economic worth and strategic importance.And by network and geographic information processing instrument, these data with huge economic value are easy to by bootlegging, distort and propagate.The map vector data of distorting, causes damage not only can to the precision of map vector, more can make the geography information producer, publisher and user sustain a great loss.When geographic information services is provided, the authenticity and integrity that how to ensure map vector data is current problem in the urgent need to address.
Digital signature technology in cryptography can be realized integrated authentication and the true and false of map vector and differentiate.But this technology can not positioning tampering position, once find that data change, no matter the data of distorting are desired data or non-required data, capital is thought that data are tampered and can not be used, need to again obtain data, increased time and the expense of data acquisition, unnecessary delay is caused in the application scenario that need to obtain in time data to some.And afterbody or head that the digital signature having is attached to copyright transmit together with copyright, when copyright is after format conversion and other operations, the digital signature of himself carrying will be lost, and causes authentication to be lost efficacy.For making up the defect of digital signature technology, Fragile Watermarking Technique arises at the historic moment as a kind of effective means of integrated authentication, becomes a focus of geography information digital product integrated authentication area research in recent years.
In Fragile Watermarking Technique, data receiver is divided into copyright after some parts, for every partial data generates corresponding authentication information and is embedded in corresponding data.The consistance of the authentication information that data receiver extracts in every partial data by judgement and the authentication information of generation, detects and positioning tampering data.Utilize the characteristic of Fragile Watermarking Technique positioning tampering, people can judge that altered data is the current data that will need or non-required data, thereby avoid factor data to retransmit the resource and the waste of time that cause.Because authentication information is hidden in copyright, with works interwoveness, together transmit, Fragile Watermarking Technique makes more hidden, the safety of authentication information transmission simultaneously.
In recent years, Fragile Watermarking Technique is at image, video, and considerable achievement in research has been obtained in audio frequency and text data field.The research of vector map watermark technology is progressively tending towards to ripe, but aspect map vector Fragile Watermarking Technique, the achievement that people obtain is also fewer.Use for reference the reversible authentication method for image integrity authentication that the people such as J.Fridrich propose, first the people such as Shao Chengyong proposed a kind of reversible Fragile Watermark Algorithm for two-dimension vector map integrated authentication in 2005.This algorithm is divided into map vector summit after different groups, generates corresponding authentication information and utilizes the people's such as Fridrich reversible authentication method to realize the embedding of watermark for every group.The method can detect that the multiple of map vector distort operation, attack but can not resist vector quantization, and when map vector increased summit/pel, when deleting summit/pel and operating, the tampering location ability of the method is strong not.Utilize equally the people's such as Fridrich reversible authentication method, 2009, the people such as Zheng in conjunction with the thought of piecemeal proposed can positioning tampering piece map vector reversible Fragile Watermark Algorithm.This method can tamper detection region, but increase, delete after attack when map vector suffers summit, tampering location ability is still poor, and if embedding parameter select improper, the method can not guarantee all map vectors can both correctly extract watermark information.Subsequently, the people such as Zheng proposes the reversible Fragile Watermark Algorithm of map vector of positioning tampering figure tuple in conjunction with the thought of pel grouping.The method is faced with the problem that map vector suffers that summit/pel increases, deletes tampering location scarce capacity after attacking equally.For obtaining good altered data positioning precision, Wang and Men have proposed the reversible vulnerable watermark method of map vector based on figure meta-tag.The method is positioning tampering figure tuple accurately, but can't be applied to a pel.
In addition, Zhang and Gao have proposed a kind of two-dimension vector graphics Semi-fragile watermarking algorithm based on dct transform.The method is to rotation, convergent-divergent, translation robust, but the embedding of watermark may affect the summit sequence situation of authentication phase, and then affects its grouping situation, causes watermark information correctly to extract, thereby cannot complete integrated authentication.The people such as Peng Fei have proposed a kind of semi-fragile watermarking method of two-dimentional CAD engineering drawing based on log-polar transform.The method is divided into groups summit, will be mapped to log-polar system for the summit of embed watermark, and the method for utilizing position to replace embeds watermark information in log-polar.For improving its tampering location ability, algorithm makes marks to guarantee that authentication phase can correctly divide into groups in the attribute information of the Article 1 line of each grouping.This scheme is to rotation, convergent-divergent, translation robust, but in the time that a certain group of data are deleted, tampering location ability is still not high.
In sum, although people have proposed some at present for map vector vulnerable watermark method, attempt to solve in verify data integrality the problem of positioning tampering, these methods Shortcomings also aspect accurate positioning tampering.
Summary of the invention
The object of the present invention is to provide accurately positioning tampering region of one, effectively reduce the map vector completeness certification method inserting based on summit because of the data re-transmission number of times that accurately tamper detection data cause.
The object of the present invention is achieved like this:
(1) divide map vector region;
Map vector pel is divided into the piece of non-overlapping copies, line number and the columns of the piece that map vector is divided are designated as N
rand N
w, the sum of piece is designated as N
b, N
b=N
r× N
w, i, i=1,2 ..., N
bindividual map vector piece is designated as B
i, comprise piece B
ileft upper apex and the summit, bottom right of rectangle of regional extent be designated as respectively
with
with
represent respectively
x coordinate and y coordinate,
with
represent respectively
x coordinate and y coordinate;
(2) map vector block sort;
All pieces are divided into two classes, and normal piece and empty piece, by piece B
isummit number be designated as
if
piece B
ifor normal piece; Otherwise, piece B
ifor empty piece;
(3) record map vector block type;
Generation comprises N
bthe sequence F of individual element, the type of each in recording step (2),
F={f
i|f
i∈{0,1},i=1,...,N
B}
Wherein, f
i=0 represents that i piece is a normal piece, f
i=1 represents that i piece is an empty piece;
(4) generate authenticating water-mark;
Generate the authenticating water-mark of each normal piece in step (2), by piece B
iwatermark information be designated as H
i,
H
i={h
i,j∈{0,1},j∈[0,L-1]}
Wherein, L represents the number of bit in Hi, h
i,j(0≤j≤L – 1) represents H
iin j bit;
(5) embed authenticating water-mark;
The authenticating water-mark generating in step (4) is embedded in normal piece to embed watermark in normal piece
(5.1) according to map vector piece B
iborder, calculate B
icenter
with
represent respectively center B
c,ix coordinate and y coordinate;
(5.2) generate one with B
c,icentered by, the round CB that r is radius
i(B
c,i, r), will be at circle CB
i(B
c,i, on circumference r), to insert and contain watermark summit with Hidden Authentication watermark, the value of radius r is:
(5.3) authenticating water-mark Hi is converted to the watermark sequence W that will embed
i={ W
i,j| j ∈ [0, N
a– 1] }, W
i,jrepresent sequence W
iin j element, N
arepresent sequence W
imiddle element number;
(5.4) according to key K
d, generate double-precision floating points sequence A
i={ A
i,j| j ∈ [0, N
a– 1], (0≤A
i,j<180) }, A
i,jrepresent sequence A
ij element, sequence A
ibe used for embed watermark sequence W
iangle sequence;
(5.5) for each element W of sequence Wi
i,j(j ∈ [0, N
a– 1]), be embedded into j angle A in sequence A i
i,jmagnitude portion, be designated as A by what obtain containing watermark angle
i,j';
(5.6) according to containing watermark angle A
i,j', calculate at circle CB
icircumference on containing watermark summit
position,
Wherein,
with
represent respectively v
i,jx coordinate and y coordinate, be designated as V by what calculate containing watermark vertex set
i={ v
i,j| j ∈ [0, N
a– 1] };
(5.7) by V
iin be inserted in map vector containing watermark summit, obtain containing watermark map vector;
(6) watermark authentication and raw data are recovered;
The piece of non-overlapping copies will be divided into containing the pel of watermark map vector; According to the type of each of sequence F identification in step (3);
For empty piece, in piece, contain summit, suffer to distort depending on it; Otherwise, think that this piece is by authentication, for normal piece:
(6.1) according to computing block B in step (5)
i' center
and generate with B
c,i' centered by, the circle that r' is radius
with
represent respectively center B
c,i' x coordinate and y coordinate;
(6.2) search CB
i' all summits on circumference, by CB
i' the set on all summits is designated as on circumference
Table CB
i' j summit on circumference,
With
Represent respectively summit
X coordinate and y coordinate, N
crepresent
the summit number comprising;
(6.3) obtain all possible watermark vertex set that contains, the sequence containing watermark vertex set is designated as
Represent one possible containing watermark vertex set, by from
in choose N
aindividual different summit obtains,
express possibility containing watermark vertex set
in k summit,
with
represent respectively summit
x coordinate and y coordinate,
express possibility containing the number of watermark vertex set;
(6.4.1) utilize the watermark generation method of describing in step (4) to generate the watermark information H of Bi''
i'={ h
i,j' | h
i,j' ∈ { 0,1}, j ∈ [0, L – 1] }, B
i' ' represent not comprise
the piece B on middle summit
i';
(6.4.2) generate one containing watermark vertex set
Represent V
i,j' k summit,
with
represent respectively vertex v
i, j, k' x coordinate and y coordinate;
If (6.4.3)
piece B
i' comprise it accordingly containing watermark summit, piece B
i' by integrated authentication, delete
in summit with recover raw data, piece B
i' verification process leave it at that; Otherwise, repeating step (6.4) until
all set are all completed;
(6.5) if
middle neither one may be piece B containing watermark vertex set
i' containing watermark vertex set, think piece B
i' suffered to distort.
Beneficial effect of the present invention is:
Map vector is divided into some regions by the present invention, the method of utilizing summit to insert embeds corresponding authentication information in each region, in authentication phase, not only can realize integrated authentication, and accurate positioning tampering region, effectively reduce the data re-transmission number of times because accurately tamper detection data cause; The present invention is carrying out after integrated authentication, and what the deletion watermark embedding stage inserted contains watermark summit, and precise restoration map vector raw data can meet the demand that user accurately uses map vector data; The alert rate of mistake of the present invention (being about to there is no the Data Detection of distorting is the probability of distorting) is zero, and false dismissed rate (Data Detection that is about to distort is the probability of distorting) is (1/2)
l, effectively tamper detection.
Accompanying drawing explanation
Fig. 1 is the map vector completeness certification method process flow diagram inserting based on summit;
Fig. 2 is a piece and the example that is divided into the line chart unit in this piece;
Fig. 3 is IEEE-754 double-precision floating point form;
Fig. 4 is the map vector before embed watermark;
Fig. 5 is the map vector after embed watermark;
Fig. 6 be distort containing watermark map vector;
Fig. 7 is the map vector of positioning tampering.
Embodiment
Below in conjunction with accompanying drawing, 1-7 is described further the present invention.
The present invention proposes a kind of map vector completeness certification method inserting based on summit, the method is divided to map vector pel in different regions on the one hand, generate the corresponding authentication information in each region in conjunction with hashing algorithm, authentication information is embedded in angle sequence, and according to calculating the position containing watermark summit containing watermark angle sequence, the method of utilizing summit to insert realizes authentication information hiding in map vector data, can effectively solve the problem in accurate positioning tampering region; This algorithm is extracting after authentication information on the other hand, deletes the watermark summit that contains of inserting and can't harm reduction map vector raw data, can effectively guarantee the accurate use of map vector data.Experimental result shows the accurate positioning tampering of this scheme position, is a kind of practical algorithm for map vector integrated authentication, positioning tampering.
Map vector pel (some pel, line chart unit and face pel) is to be arranged and form according to specific order by a large amount of intensive summits, and map datum is exactly the 2 dimension coordinate sequences on these summits.Map vector Fragile Watermarking Technique is a kind of important means that solves map vector integrated authentication, positioning tampering problem.The map vector fragile watermark strategy of the current proposition of people can reach the target of verify data integrality and authenticity, but these strategies Shortcomings also aspect accurate positioning tampering.For the problems referred to above, the present invention proposes the map vector completeness certification method inserting based on summit, comprises the steps:
(1) divide map vector region;
In this step, map vector pel is divided into the piece of non-overlapping copies.The regional extent of a map vector piece can be considered as the region that a left upper apex by rectangle and summit, bottom right define.Line number and the columns of the piece that map vector is divided are designated as N
rand N
w, the sum of piece is designated as N
b(N
b=N
r× N
w), i (i=1,2 ..., N
b) individual map vector piece is designated as B
i, comprise piece B
ileft upper apex and the summit, bottom right of rectangle of regional extent be designated as respectively
with
with
represent respectively
x coordinate and y coordinate,
with
represent respectively
x coordinate and y coordinate.
(2) map vector block sort;
In this step, according to the number on summit in each region unit, all pieces are divided into two classes: normal piece and empty piece.By piece B
isummit number be designated as
if
piece B
iit is a normal piece; Otherwise, piece B
iit is an empty piece.The present invention is embed watermark in normal piece only.
(3) record map vector block type;
In this step, generate one and comprise N
bthe sequence F of individual element, this sequence is used for the type of each of recording step (2),
F={f
i|f
i∈{0,1},i=1,...,N
B}
Wherein, f
i=0 represents that i piece is a normal piece, f
i=1 represents that i piece is an empty piece.
(4) generate authenticating water-mark;
In this step, utilize hashing algorithm, generate the authenticating water-mark of each normal piece in step (2).By piece B
iwatermark information be designated as H
i,
H
i={h
i,j∈{0,1},j∈[0,L-1]}
Wherein, L represents H
ithe number of middle bit, h
i,j(0≤j≤L – 1) represents j bit in Hi.
(5) embed authenticating water-mark;
In this step, the method for utilizing summit to insert, is embedded into the authenticating water-mark generating in step (4) in corresponding normal piece.In a normal piece, the concrete steps of embed watermark (are supposed piece B as follows
ibe a normal piece, the watermark that embed is H
i):
A. according to map vector piece B
iborder, calculate B
icenter
with
represent respectively center B
c,ix coordinate and y coordinate;
B. generate one with B
c,icentered by, the round CB that r is radius
i(B
c,i, r).The present invention will be at circle CB
i(B
c,i, on circumference r), insert containing watermark summit with Hidden Authentication watermark.For guaranteeing can not exceed piece B containing watermark summit
iborder, the value of radius r should meet the following conditions,
C. by authenticating water-mark H
iconvert the watermark sequence W that will embed to
i={ W
i,j| j ∈ [0, N
a– 1] }, W
i,jrepresent sequence W
iin j element, N
arepresent sequence W
imiddle element number;
D. in key K
dparticipation under, generate a double-precision floating points sequence A
i={ A
i,j| j ∈ [0, N
a– 1], (0≤A
i,j<180) }.A
i,jrepresent sequence A
ij element, sequence A
ibe used for embed watermark sequence W
iangle sequence;
E. for sequence W
ieach element W
i,j(j ∈ [0, N
a– 1]), the method for utilizing position to replace is embedded into sequence A
iin j angle A
i,jmagnitude portion.Be designated as A by what obtain containing watermark angle
i,j';
F. according to containing watermark angle A
i,j', calculate at circle CB
icircumference on containing watermark summit
position,
Wherein,
with
represent respectively v
i,jx coordinate and y coordinate.Be designated as V by what calculate according to step e-f containing watermark vertex set
i={ v
i,j| j ∈ [0, N
a– 1] };
G. by V
iin be inserted in map vector containing watermark summit, obtain containing watermark map vector.
(6) watermark authentication and raw data are recovered;
In this step, the piece of non-overlapping copies will be divided into containing the pel of watermark map vector; Utilize sequence F in step (3) to identify the type of each; Utilize diverse ways to authenticate the integrality of different pieces.
For an empty piece, if contain summit in this piece, suffer to distort depending on it; Otherwise, think that this piece is by authentication.
For a normal piece, the concrete steps of its verification process are following (to be supposed containing watermark block B
i' be a normal piece):
A. according to the a-b computing block B in step (5)
i' center
and generate one with B
c,i' centered by, the round CB that r' is radius
i' (B
c,i', r').Wherein,
with
represent respectively center B
c,i' x coordinate and y coordinate;
B. search for CB
i' all summits on circumference.By CB
i' the set on all summits is designated as on circumference
table CB
i' j summit on circumference,
with
represent respectively summit
x coordinate and y coordinate, Nc represents
the summit number comprising;
C. obtain all possible containing watermark vertex set.The all possible sequence containing watermark vertex set is designated as
Wherein,
Represent one possible containing watermark vertex set, this set by from
in choose N
aindividual different summit obtains,
express possibility containing watermark vertex set
in k summit,
with
represent respectively summit
x coordinate and y coordinate,
express possibility containing the number of watermark vertex set;
P1. utilize the watermark generation method of describing in step (4) to generate B
i' ' watermark information
l – 1] }.Wherein, B
i' ' represent not comprise
the piece B on middle summit
i'.
P2. utilize c-f and the H of step (5)
i', generate one containing watermark vertex set
represent V
i,j' k summit,
with
represent respectively vertex v
i, j, k' x coordinate and y coordinate.
If p3.
piece B
i' comprise it accordingly containing watermark summit, piece B
i' by integrated authentication, delete
in summit with recover raw data, piece B
i' verification process leave it at that; Otherwise, repeating step d until
all set are all completed.
If e.
middle neither one may be piece B containing watermark vertex set
i' containing watermark vertex set, think piece B
i' suffered to distort.
Verify after the integrality of each map vector piece, shown all map vector pieces that are tampered.
The present invention proposes a kind of map vector completeness certification method based on inserting summit, the method is divided to map vector pel in different regions on the one hand, generate the corresponding authentication information in each region in conjunction with hashing algorithm, authentication information is embedded in angle sequence, according to calculating the position containing watermark summit containing watermark angle sequence, the method of utilizing summit to insert realizes authentication information hiding in map vector data, can effectively solve the problem in accurate positioning tampering region; This algorithm is extracting after authentication information on the other hand, deletes the watermark summit that contains of inserting and can't harm reduction map vector raw data, can effectively guarantee the accurate use of map vector data.Compared with other map vector completeness certification methods, the present invention has the following advantages:
1, map vector is divided into some regions by the present invention, the method of utilizing summit to insert embeds corresponding authentication information in each region, in authentication phase, not only can realize integrated authentication, and accurate positioning tampering region, effectively reduce the data re-transmission number of times because accurately tamper detection data cause;
2, the present invention is carrying out after integrated authentication, and what the deletion watermark embedding stage inserted contains watermark summit, and precise restoration map vector raw data can meet the demand that user accurately uses map vector data;
3, the alert rate of mistake of the present invention (being about to there is no the Data Detection of distorting is the probability of distorting) is zero, and false dismissed rate (Data Detection that is about to distort is the probability of distorting) is (1/2)
l, effectively tamper detection.
The present invention proposes a kind of map vector completeness certification method based on inserting summit, the method is divided to map vector pel in different regions on the one hand, generate the corresponding authentication information in each region in conjunction with hashing algorithm, authentication information is embedded in angle sequence, according to calculating the position containing watermark summit containing watermark angle sequence, the method of utilizing summit to insert realizes authentication information hiding in map vector data, can effectively solve the problem in accurate positioning tampering region; This algorithm is extracting after authentication information on the other hand, deletes the watermark summit that contains of inserting and can't harm reduction map vector raw data, can effectively guarantee the accurate use of map vector data.Compared with other map vector completeness certification methods, the present invention has the following advantages:
1, map vector is divided into some regions by the present invention, the method of utilizing summit to insert embeds corresponding authentication information in each region, in authentication phase, not only can realize integrated authentication, and accurate positioning tampering region, effectively reduce the data re-transmission number of times because accurately tamper detection data cause;
2, the present invention is carrying out after integrated authentication, and what the deletion watermark embedding stage inserted contains watermark summit, and precise restoration map vector raw data can meet the demand that user accurately uses map vector data;
3, the alert rate of mistake of the present invention (being about to there is no the Data Detection of distorting is the probability of distorting) is zero, and false dismissed rate (Data Detection that is about to distort is the probability of distorting) is (1/2)
l, effectively tamper detection.
As shown in Figure 1, the present invention is based on the map vector completeness certification method process flow diagram that insert on summit, the method is totally divided into two aspect: A, vector map watermark embeds algorithm; B, vector map watermark identifying algorithm.
A, vector map watermark embed algorithm, and step is as follows:
(1) divide map vector region;
Map vector pel is divided into the piece of non-overlapping copies.The regional extent of a map vector piece can be considered as the region that a left upper apex by rectangle and summit, bottom right define.Line number and the columns of the piece that map vector is divided are designated as N
rand N
w, the sum of piece is designated as N
b(N
b=N
r× N
w), i (i=1,2 ..., N
b) individual map vector piece is designated as B
i, comprise piece B
ileft upper apex and the summit, bottom right of rectangle of regional extent be designated as respectively
with
with
represent respectively
x coordinate and y coordinate,
with
represent respectively
x coordinate and y coordinate.
Here, a pel is only divided in a region unit.Once after a pel is divided in a region unit, all summits of this pel are also all divided in this region unit, even if some summits of this pel may exceed the regional extent of this piece.In Fig. 2, show map vector piece B
iborder and a line chart unit being divided into wherein
example,
with
represent respectively vertex v in the PL of line chart unit
jx coordinate and y coordinate.For summit is described
with
and B
iuntrue being present in map vector file of border, summit
with
show B with Dark grey
iborder show with dotted line.In all summits of online pel PL, v
0, v
1and v
4exceed map vector piece B
iregional extent, v
2and v
3at B
iregional extent in, but all summits of pel PL all belong to map vector piece B
i.
(2) map vector block sort;
According to the number on summit in each region unit, all pieces are divided into two classes: normal piece and empty piece.By piece B
isummit number be designated as NB
iif, NB
i>=0, piece Bi is a normal piece; Otherwise piece Bi is an empty piece.The present invention is embed watermark in normal piece only.
(3) record map vector block type;
Generate one and comprise N
bthe sequence F of individual element, this sequence is used for the type of each of recording step (2),
F={f
i|f
i∈{0,1},i=1,...,N
B}
Wherein, f
i=0 represents that i piece is a normal piece, f
i=1 represents that i piece is an empty piece.
(4) generate authenticating water-mark;
Utilize hashing algorithm, generate the authenticating water-mark of each normal piece in step (2).By piece B
iwatermark information be designated as H
i,
H
i={h
i,j∈{0,1},j∈[0,L-1]}
Wherein, L represents H
ithe number of middle bit, h
i,j(0≤j≤L – 1) represents H
iin j bit.
Generate piece B
iauthenticating water-mark H
imethod as follows:
H
i=blockhash(hash(I(B
i),k,i,M
index),L,K).
Wherein, I () represents the spatial data that obtains and the method for attribute data, and k represents that one for generating the private key of an input parameter of hash (), M
indexrepresent the index value of this map vector, hash () represents an existing cryptographic Hash algorithm, blockhash (H
i a, L, K) be illustrated under the control of private key K from bit sequence H
i athe method of middle selection L bit.Blockhash (H
i a, L, K) and in method, H
i a={ h
t a| h
t a∈ { 0,1}, t ∈ [0, HA – 1] } represents the binary string that hash () generates, and HA represents H
i alength, the method is specific as follows:
Wherein, u
jrepresent the pseudo-random number sequence U={u being generated by key K
j| j=0,1 ..., j the element of L – 1}.
(5) embed authenticating water-mark;
In this step, the method for utilizing summit to insert, is embedded into the authenticating water-mark generating in step (4) in corresponding normal piece.In a normal, the concrete steps of embed watermark (are supposed piece B as follows
ibe a normal piece, the watermark that embed is H
i):
B. generate one with B
c,icentered by, the round CB that r is radius
i(B
c,i, r).The present invention will be at circle CB
i(B
c,i, on circumference r), insert containing watermark summit with Hidden Authentication watermark.For guaranteeing can not exceed piece B containing watermark summit
iborder, the value of radius r should meet the following conditions,
C. authenticating water-mark Hi is converted to watermark sequence W to be embedded
i={ W
i,j| j ∈ [0, N
a– 1] },
Wherein, W
i,jrepresent sequence W
iin j element, N
arepresent sequence W
imiddle element number.Embed watermark in the magnitude portion of the angle that the present invention represents at double-precision floating points.As shown in Figure 3, the double-precision floating points stipulating in IEEE-754 comprises 3 parts: symbolic component (the 63rd bit), exponential part (52-62 bit) and magnitude portion (0-51 bit).Because the magnitude portion of a double-precision floating points can embed the data of 52 bits, therefore, watermark sequence W to be embedded
ieach element can comprise 52 bit watermark information, i.e. W
ielement number N
afor=
required angle number is also
D. in key K
dparticipation under, generate a double-precision floating points sequence A
i={ A
i,j| j ∈ [0, N
a– 1], (0≤A
i,j<180) },
Wherein, A
i,jrepresent sequence A
ij element, rand (K
d) be illustrated in key K
dparticipation under return a random integers P (P=0,1,2 ...) function.Sequence A
ibe used for embed watermark sequence W
iangle sequence.
E. for each element W of sequence Wi
i,j(j ∈ [0, N
a– 1]), the method for utilizing position to replace is embedded into sequence A
iin j angle A
i,jmagnitude portion, be designated as A by what obtain containing watermark angle
i,j';
F. according to containing watermark angle A
i,j', calculate at circle CB
icircumference on containing watermark summit
position,
Be designated as V by what calculate according to step e-f containing watermark vertex set
i={ v
i,j| j ∈ [0, N
a– 1] };
G. by V
iin be inserted in map vector containing watermark summit, obtain containing watermark map vector.If this map vector is made up of a pel, will be considered as a pel containing watermark summit and be inserted in map vector; If this map vector is made up of line chart unit or face pel, utilize all watermark summits that contain build new line chart unit or a face pel and be inserted in map vector.
As shown in Figure 5, after the Chinese Railway map embed watermark shown in Fig. 4, increased some bar charts unit.
B, vector map watermark identifying algorithm
(6) watermark authentication and raw data are recovered;
The piece of non-overlapping copies will be divided into containing the pel of watermark map vector; Utilize sequence F in step (3) to identify the type of each; Utilize diverse ways to authenticate the integrality of different pieces.
For an empty piece, if contain summit in this piece, suffer to distort depending on it; Otherwise, think that this piece is by authentication.
For a normal piece, the concrete steps of its verification process are following (to be supposed containing watermark block B
i' be a normal piece):
A. according to the a-b computing block B in step (5)
i' center
and generate one with B
c,i' centered by, the round CB that r' is radius
i' (B
c,i', r').Wherein,
with
represent respectively center B
c,i' x coordinate and y coordinate;
B. search for CB
i' all summits on circumference.By CB
i' the set on all summits is designated as on circumference
table CB
i' j summit on circumference,
with
represent respectively summit
x coordinate and y coordinate, N
crepresent
the summit number comprising;
C. obtain all possible containing watermark vertex set.The all possible sequence containing watermark vertex set is designated as
Wherein,
Represent one possible containing watermark vertex set, this set by from
in choose N
aindividual different summit obtains,
express possibility containing watermark vertex set
in k summit,
with
represent respectively summit
x coordinate and y coordinate,
express possibility containing the number of watermark vertex set;
D. for
in eachly may contain watermark vertex set
carry out following 3 steps:
P1. utilize the watermark generation method of describing in step (4) to generate B
i' ' watermark information H
i'={ h
i,j' | h
i,j' ∈ { 0,1}, j ∈ [0, L – 1] }.Wherein, B
i' ' represent not comprise
the piece B on middle summit
i'.
P2. utilize c-f and the H of step (5)
i', generate one containing watermark vertex set
represent V
i,j' k summit,
with
represent respectively vertex v
i, j, k' x coordinate and y coordinate.
If p3.
piece B
i' comprise it accordingly containing watermark summit, piece B
i' by integrated authentication, delete
in summit with recover raw data, piece B
i' verification process leave it at that; Otherwise, repeating step d until
all set are all completed.
If e.
middle neither one is piece B containing watermark vertex set
i' containing watermark vertex set, think piece B
i' suffered to distort.
Verify after the integrality of each map vector piece, shown all map vector pieces that are tampered.Map vector after the moisture seal Chinese Railway map that Figure 6 shows that Fig. 5 is distorted has occurred to distort in region A, B, C.In Fig. 7, detected after the integrality of each map vector piece, the pel of the map vector piece of distorting is shown as thick lines and is Dark grey.Can find out, the present invention is positioning tampering accurately.
The method embed watermark that utilizes position to replace in the magnitude portion of the angle that the present invention represents in the floating number of double precision, can guarantee the correct extraction at authentication phase watermark information, if map vector piece is not distorted, can accurately calculate it containing watermark summit, and then correctly judge the integrality of this map vector piece, the alert rate of mistake is zero, and false dismissed rate is (1/2)
l.
Claims (1)
1. the map vector completeness certification method inserting based on summit, is characterized in that:
(1) divide map vector region;
Map vector pel is divided into the piece of non-overlapping copies, line number and the columns of the piece that map vector is divided are designated as N
rand N
w, the sum of piece is designated as N
b, N
b=N
r× N
w, i, i=1,2 ..., N
bindividual map vector piece is designated as B
i, comprise piece B
ileft upper apex and the summit, bottom right of rectangle of regional extent be designated as respectively
with
with
represent respectively
x coordinate and y coordinate,
with
represent respectively
x coordinate and y coordinate;
(2) map vector block sort;
All pieces are divided into two classes, and normal piece and empty piece, by piece B
isummit number be designated as
if
piece B
ifor normal piece; Otherwise, piece B
ifor empty piece;
(3) record map vector block type;
Generation comprises N
bthe sequence F of individual element, the type of each in recording step (2),
F={f
i|f
i∈{0,1},i=1,...,N
B}
Wherein, f
i=0 represents that i piece is a normal piece, f
i=1 represents that i piece is an empty piece;
(4) generate authenticating water-mark;
Generate the authenticating water-mark of each normal piece in step (2), by piece B
iwatermark information be designated as H
i,
H
i={h
i,j∈{0,1},j∈[0,L-1]}
Wherein, L represents the number of bit in Hi, h
i,j(0≤j≤L – 1) represents j bit in Hi;
(5) embed authenticating water-mark;
The authenticating water-mark generating in step (4) is embedded in normal piece to embed watermark in normal piece
(5.1) according to map vector piece B
iborder, calculate B
icenter
with
represent respectively center B
c,ix coordinate and y coordinate;
(5.2) generate one with B
c,icentered by, the round CB that r is radius
i(B
c,i, r), will be at circle CB
i(B
c,i, on circumference r), to insert and contain watermark summit with Hidden Authentication watermark, the value of radius r is:
(5.3) authenticating water-mark Hi is converted to the watermark sequence W that will embed
i={ W
i,j| j ∈ [0, N
a– 1] }, W
i,jrepresent j element in sequence Wi, N
arepresent sequence W
imiddle element number;
(5.4) according to key K
d, generate double-precision floating points sequence A
i={ A
i,j| j ∈ [0, N
a– 1], (0≤A
i,j<180) }, A
i,jrepresent sequence A
ij element, sequence A
ibe used for embed watermark sequence W
iangle sequence;
(5.5) for each element W of sequence Wi
i,j(j ∈ [0, N
a– 1]), be embedded into sequence A
iin j angle A
i,jmagnitude portion, be designated as A by what obtain containing watermark angle
i,j';
(5.6) according to containing watermark angle A
i, j', calculate at circle CB
icircumference on containing watermark summit
position,
Wherein,
with
represent respectively v
i,jx coordinate and y coordinate, be designated as V by what calculate containing watermark vertex set
i={ v
i,j| j ∈ [0, N
a– 1] };
(5.7) by V
iin be inserted in map vector containing watermark summit, obtain containing watermark map vector;
(6) watermark authentication and raw data are recovered;
The piece of non-overlapping copies will be divided into containing the pel of watermark map vector; According to the type of each of sequence F identification in step (3);
For empty piece, in piece, contain summit, suffer to distort depending on it; Otherwise, think that this piece is by authentication, for normal piece:
(6.1) according to computing block B in step (5)
i' center
and generate with B
c,i' centered by, the circle that r' is radius
with
represent respectively center B
c,i' x coordinate and y coordinate;
(6.2) search CB
i' all summits on circumference, by CB
i' the set on all summits is designated as on circumference
Table CB
i' j summit on circumference,
With
Represent respectively summit
X coordinate and y coordinate, N
crepresent V
i cthe summit number comprising;
(6.3) obtain all possible watermark vertex set that contains, the sequence containing watermark vertex set is designated as
Represent one possible containing watermark vertex set, by from
In choose N
aindividual different summit obtains,
express possibility containing watermark vertex set
in k summit,
with
represent respectively summit
x coordinate and y coordinate,
express possibility containing the number of watermark vertex set;
(6.4.1) utilize the watermark generation method of describing in step (4) to generate B
i' ' watermark information H
i'={ h
i,
j' | h
i,
j' ∈ { 0,1}, j ∈ [0, L – 1] }, B
i' ' represent not comprise
the piece B on middle summit
i';
(6.4.2) generate one containing watermark vertex set
Represent V
i,j' k summit,
with
represent respectively vertex v
i, j, k' x coordinate and y coordinate;
If (6.4.3)
piece B
i' comprise it accordingly containing watermark summit, piece B
i 'by integrated authentication, delete
in summit with recover raw data, piece B
i' verification process leave it at that; Otherwise, repeating step (6.4) until
all set are all completed;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410120970.5A CN103903217A (en) | 2014-03-28 | 2014-03-28 | Vector map integrity authentication method based on vertex insertion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410120970.5A CN103903217A (en) | 2014-03-28 | 2014-03-28 | Vector map integrity authentication method based on vertex insertion |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103903217A true CN103903217A (en) | 2014-07-02 |
Family
ID=50994525
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410120970.5A Pending CN103903217A (en) | 2014-03-28 | 2014-03-28 | Vector map integrity authentication method based on vertex insertion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103903217A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426710A (en) * | 2015-11-12 | 2016-03-23 | 南京师范大学 | Method for accurately authenticating vector geographic data based on spatial domain sequencing |
CN105488434A (en) * | 2015-12-03 | 2016-04-13 | 江苏师范大学 | Mark based vector map completeness authentication method |
CN107154011A (en) * | 2017-03-21 | 2017-09-12 | 江苏师范大学 | The map vector completeness certification method of positioning tampering pel group |
CN113052939A (en) * | 2019-12-10 | 2021-06-29 | 辉达公司 | Unified coding of patch sections, tops and connections for path delineation |
CN115630402A (en) * | 2022-12-22 | 2023-01-20 | 安徽华云安科技有限公司 | Information hiding method, device and equipment based on floating point number and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101604440A (en) * | 2009-04-23 | 2009-12-16 | 哈尔滨工程大学 | Treatment method for reversibly watermarking vector map based on space characteristics |
CN102800041A (en) * | 2012-06-11 | 2012-11-28 | 哈尔滨工程大学 | Method for protecting integrity of digital vector map |
CN103325082A (en) * | 2013-06-14 | 2013-09-25 | 哈尔滨工程大学 | Vector map reversible information hiding method based on LSD planes |
-
2014
- 2014-03-28 CN CN201410120970.5A patent/CN103903217A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101604440A (en) * | 2009-04-23 | 2009-12-16 | 哈尔滨工程大学 | Treatment method for reversibly watermarking vector map based on space characteristics |
CN102800041A (en) * | 2012-06-11 | 2012-11-28 | 哈尔滨工程大学 | Method for protecting integrity of digital vector map |
CN103325082A (en) * | 2013-06-14 | 2013-09-25 | 哈尔滨工程大学 | Vector map reversible information hiding method based on LSD planes |
Non-Patent Citations (3)
Title |
---|
NANA WANG,ET AL.: "Reversible fragile watermarking for locating tampered blocks in 2D vector maps", 《MULTIMEDIA TOOLS AND APPLICATIONS》 * |
NANA WANGA,ET AL.: "Reversible fragile watermarking for 2-D vector map authentication with localization", 《COMPUTER-AIDED DESIGN》 * |
WANG NANA,ET AL.: "A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates", 《COMPUTER-AIDED DESIGN》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105426710A (en) * | 2015-11-12 | 2016-03-23 | 南京师范大学 | Method for accurately authenticating vector geographic data based on spatial domain sequencing |
CN105426710B (en) * | 2015-11-12 | 2018-02-09 | 南京师范大学 | A kind of vector geographic data Hard Authentication method based on spatial domain sequence |
CN105488434A (en) * | 2015-12-03 | 2016-04-13 | 江苏师范大学 | Mark based vector map completeness authentication method |
CN105488434B (en) * | 2015-12-03 | 2018-11-02 | 江苏师范大学 | A kind of map vector completeness certification method based on label |
CN107154011A (en) * | 2017-03-21 | 2017-09-12 | 江苏师范大学 | The map vector completeness certification method of positioning tampering pel group |
CN107154011B (en) * | 2017-03-21 | 2020-09-15 | 江苏师范大学 | Vector map integrity authentication method for positioning tamper map group |
CN113052939A (en) * | 2019-12-10 | 2021-06-29 | 辉达公司 | Unified coding of patch sections, tops and connections for path delineation |
CN113052939B (en) * | 2019-12-10 | 2024-03-08 | 辉达公司 | Patch segment, tip and connection unification encoding for path tracing |
CN115630402A (en) * | 2022-12-22 | 2023-01-20 | 安徽华云安科技有限公司 | Information hiding method, device and equipment based on floating point number and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chang et al. | A secure fragile watermarking scheme based on chaos-and-hamming code | |
Wang et al. | Reversible fragile watermarking for 2-D vector map authentication with localization | |
Dhole et al. | Self embedding fragile watermarking for image tampering detection and image recovery using self recovery blocks | |
CN103310407B (en) | Based on the vectorial geographical spatial data total blindness water mark method of QR code | |
Peng et al. | A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion | |
Wang et al. | Reversible fragile watermarking for locating tampered blocks in 2D vector maps | |
CN102103738B (en) | Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks | |
CN107742272A (en) | A kind of semi-fragile watermarks method for positioning and recovering based on distorted image | |
CN110390623B (en) | Secret sharing-based image media security authentication recovery method | |
CN103903217A (en) | Vector map integrity authentication method based on vertex insertion | |
CN103268588B (en) | Encrypted domain lossless reciprocal information concealing method based on carrier image check code | |
CN102800041B (en) | Method for protecting integrity of digital vector map | |
CN104063731A (en) | Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology | |
CN105488434A (en) | Mark based vector map completeness authentication method | |
Wu et al. | A simple image tamper detection and recovery based on fragile watermark with one parity section and two restoration sections | |
Ren et al. | Selective authentication algorithm based on semi-fragile watermarking for vector geographical data | |
CN103123719B (en) | The Zero watermarking method of a kind of image authentication and tampering location | |
CN102270336A (en) | Safe fragile watermarking method based on multiple dependency structures | |
CN103886536A (en) | Digital-watermark realization method for positioning of digital-image tampering | |
Li et al. | Oblivious fragile watermarking scheme for image authentication | |
Neyman et al. | Reversible fragile watermarking based on difference expansion using manhattan distances for 2d vector map | |
Li et al. | Study on copyright authentication of GIS vector data based on Zero-watermarking | |
CN102073978A (en) | Method and system for identifying and recovering digital images by utilizing irregular region segmentation | |
CN103377320B (en) | A kind of vector geographic data selectivity certification semi-fragile watermarking method | |
Zheng et al. | A fragile digital watermark used to verify the integrity of vector map |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140702 |
|
WD01 | Invention patent application deemed withdrawn after publication |