CN104867099B - A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition - Google Patents

A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition Download PDF

Info

Publication number
CN104867099B
CN104867099B CN201510297558.5A CN201510297558A CN104867099B CN 104867099 B CN104867099 B CN 104867099B CN 201510297558 A CN201510297558 A CN 201510297558A CN 104867099 B CN104867099 B CN 104867099B
Authority
CN
China
Prior art keywords
watermark
data
embedded
dem
robust watermarking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510297558.5A
Other languages
Chinese (zh)
Other versions
CN104867099A (en
Inventor
朱长青
许惠
崔翰川
邹秀珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING JIYIN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
NANJING JIYIN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING JIYIN INFORMATION TECHNOLOGY Co Ltd filed Critical NANJING JIYIN INFORMATION TECHNOLOGY Co Ltd
Priority to CN201510297558.5A priority Critical patent/CN104867099B/en
Publication of CN104867099A publication Critical patent/CN104867099A/en
Application granted granted Critical
Publication of CN104867099B publication Critical patent/CN104867099B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a kind of based on the anti-DEM completeness certification methods for repeating embedded double watermarks, by adding robust watermarking pre-detection mechanism before watermark embedding, while fragile watermark integrated authentication effect is not influenceed, the repetition insertion of watermark effectively prevent.The method of the present invention be directed to be used only fragile watermark exist by be not embedded into watermark data and embedded watermark after the data distorted regard as certification not by cannot be distinguished by, and ax-grinder is by first distorting the dem data containing fragile watermark, then the problem of mode of embedded identical fragile watermark denies its tampering again, design a kind of integrality of the anti-double-watermarking method, more accurately and effectively certification dem data for repeating embedded robust+fragility.

Description

A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition
Technical field
The invention belongs to geography information security technology area, and in particular to a kind of based on the anti-DEM for repeating embedded double watermarks Completeness certification method.
Background technology
Under the overall background that information technology develops rapidly, the economic and social benefit of geodata is more and more closed Note and attention, the reliability and integrity issue of data also have become a popular research topic.Fragile watermark conduct A kind of advanced data integrity authentication techniques means, at present existing numerous scholars to it in terms of geodata integrated authentication Application conduct in-depth research, but vector remote sensing image data is concentrated mainly on, for dem data integrated authentication Fragile Watermark Algorithm is then fresh rare periodical.
In addition, the existing completeness certification method based on fragile watermark had been inserted into watermark before using data to be tested Carry, when that can not learn whether data to be tested contain fragile watermark, then exist the data for being not embedded into watermark and embedded watermark The data distorted afterwards regard as the problem of certification is not by cannot be distinguished by.On the other hand, in actual applications, due to The dem data producer and user's two-phase laminated flow, ax-grinder can by first distorting the dem data containing fragile watermark, Then the mode for being embedded in identical fragile watermark again denies its tampering, then make it that the accuracy to data integrated authentication is big Give a discount.
Robust watermarking technology is more ripe as another research direction of digital watermark technology, at present development.Robust water Print has the function that to prove watermark existence, therefore, can utilize this feature, be combined with fragile watermark, gives full play to each From advantage, solve the above problems jointly, that is, the more efficiently integrality of certification dem data, and by preventing the weight of watermark It is multiple embedded to distort denial behavior prevent from first distorting being embedded in watermark again.
The content of the invention
It is an object of the invention to:For the number of fragile watermark is may result in by and was not embedded into using only fragile watermark It is the incomplete problem of data according to mistakenly certification, and ax-grinder can be embedded in fragile watermark again by first altered data The problem of mode is denied to its tampering, propose a kind of based on the anti-DEM integrated authentications calculation for repeating embedded double watermarks Method, obtain more accurate integrated authentication result and prevent from denying the generation of tampering using embedded watermark is repeated.
In order to realize foregoing invention purpose, the technical solution adopted in the present invention is:One kind repeats embedded double water based on anti- The DEM completeness certification methods of print, including procedure below:
(1) watermark information generation and insertion
Step 1:According to the precision of DEM carrier datas, choose data is not influenceed the numerical value of part by watermark, is calculated using D8 Method extracts watermark dem data S to be embedded features of terrain point, obtains the characteristic area S of data1With non-characteristic area S2
Step 2:From the characteristic area S of the watermark dem data to be embedded obtained by step 11Middle detection robust watermarking (tool Body step met the detection of journey (2) robust watermarking), if illustrating that data are also be not embedded into any watermark original in the absence of robust watermarking Data, step 3 is skipped to, otherwise skip to step 5, no longer the data are carried out with the embedding operation of any watermark, prevents watermark Repeat to be embedded in;
Step 3:Pair also it is not embedded into the original dem data of any watermark, the characteristic area S using mapping mechanism by data1 Robust watermarking W_R is generated, then by the characteristic area S of robust watermarking information W_R qualified insertions to data1In, complete robust water The insertion of print:
S′1=S1⊕W_R
Wherein, ⊕ represents robust watermarking embedding method;
Step 4:To the data characteristics region S ' containing robust watermarking1MD5Hash computings are carried out, obtain carrier dem data Sequence of hash values, that is, watermark information sequence W_F to be embedded, its permanent length is 128:
W_F=MD5 (S '1)
W_F={ W_Fi,1≤i≤128;W_Fi∈{0,1}}
Extract the non-characteristic area part S of dem data2Obtain watermark sequence S to be embedded2
Watermark sequence W_F to be embedded is replaced into S successively2Low two bit plane, complete the insertion of fragile watermark;
Step 5:The characteristic area S ' of robust watermarking will be had been inserted into1With the non-characteristic area S ' for having been inserted into fragile watermark2Close And obtain being embedded in the anti-dem data S ' for repeating double watermarks, watermark insertion is completed;
(2) watermark information detects
Step 1:Method is identical when being embedded in watermark, and dem data S ' features of terrain point is extracted using D8 algorithms, is obtained The characteristic area S ' of data1With non-characteristic area S '2
Step 2:From characteristic area S '1Middle detection robust watermarking, if being free of robust watermarking, step 3 is skipped, directly judged Certification is not by the contrary to skip to step 3, the further integrality for detecting fragile watermark in data;
Step 3:Using identical method when being embedded in fragile watermark, to the DEM characteristic areas S ' extracted again1Carry out MD5Hash computings obtain the fragile watermark sequence W_F for checking;From the non-characteristic area S ' of DEM2According to watermark be embedded in side Formula extracts the low two bit planes information of data, forms watermark sequence W_F ' to be certified;Compare the water for regenerating and extracting Print sequence W_F and W_F ':
1. if W_F ≠ W_F ', represents that dem data is imperfect, certification does not pass through;
2. if W_F=W_F ', represents that dem data is complete, certification passes through.
Process (1) step 2 and the method for process (2) step 2 detection robust watermarking are to be embedded according to robust watermarking Inverse process extraction robust watermarking information W_R ', and generate original robust watermarking information W_R again, calculate it and extract Correlation between robust watermarking information W_R ', judge that data to be tested S ' is free of robust if coefficient correlation is less than threshold value 0.5 Watermark, otherwise then contain robust watermarking.
It can be completed based on the anti-dem data integrated authentication for repeating embedded double watermarks according to above step.
The characteristics of this method and technical advantage:
(1) this method introduces robust watermarking on the basis of general fragile watermark, avoid using only fragile watermark without The problem of method distinguishes the initial data for being not embedded into watermark with the data being tampered after embedded watermark, has obtained more accurate complete Property authentication result;
(2) this method adds robust watermarking pre-detection mechanism before watermark embedding, and not influenceing, fragile watermark is complete Property certification effect while, effectively prevent the repetition insertion of watermark, avoid and usurped by first distorting and being embedded in watermark again Change denial behavior, solve the problem in practical application.
Brief description of the drawings
Fig. 1 is watermark generation of the present invention and embedded flow chart.
Fig. 2 is watermark detection flow chart of the present invention.
Fig. 3 is the experimental data of embodiment.
Fig. 4 is that embodiment carries out the data after watermark insertion.
Fig. 5 is the data of the modified attacks of Fig. 4:(a) for elevation translation attack, (b) be elevation scaling attack, (c) be with Machine attacked by noise, (d) are that data delete attack, and (e) is data shearing attack, and (f) attacks for partial replacement.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.
The present embodiment select a width size is 509 × 515, resolution ratio 5m, the 1 of floating type altitude data:10000 grids DEM experimental datas (such as Fig. 3), for whole process such as the generating of watermark information, embedded and detections, provide the one of the inventive method Individual embodiment, the present invention is further described.
1. watermark information generates and insertion
Step 1:The features of terrain point of watermark dem data to be embedded is extracted, obtains the characteristic area of data and non-characteristic area Domain;
Step 2:The coefficient correlation of robust watermarking in the data characteristics region that Detection and Extraction go out, coefficient correlation are less than 0.5 Skip to step 3, it is on the contrary then skip to step 5, no longer the data are carried out with the embedding operation of watermark;
Step 3:Robust watermarking W_R is generated by the characteristic area of data using mapping mechanism, and by robust watermarking information W_ R qualified insertions complete the insertion of robust watermarking into the characteristic area of data;
Step 4:MD5Hash calculating is carried out to the data characteristics region containing robust watermarking, obtains watermark to be embedded, And the non-characteristic area of the data extracted is subjected to Binary Conversion, the watermark information of generation is replaced low the two of the region successively On bit plane, the insertion of fragile watermark is completed;
Step 5:By the characteristic area for having been inserted into robust watermarking and the non-characteristic region combination for having been inserted into fragile watermark, obtain To the anti-dem data S' for repeating double watermarks of insertion, watermark embedding operation is completed.
2. watermark information detects
Step 1:The features of terrain point of dem data to be certified is extracted again, obtains the characteristic area of data and non-feature Region;
Step 2:Inverse process according to robust watermarking insertion calculates the correlation of the robust watermarking in data characteristics region, If coefficient correlation is less than 0.5 explanation data to be tested and is free of robust watermarking, it can directly judge certification not by the contrary to skip to step Three;
Step 3:Watermark information is regenerated by the characteristic area of data using identical method when being embedded in fragile watermark W_F, and watermark sequence W_F' is extracted from the non-characteristic area of data;
Step 4:Compare the watermark sequence W_F and W_F' for regenerating and extracting:
1. if W_F ≠ W_F', represents that dem data is imperfect, certification does not pass through;
2. if W_F=W_F', represents that dem data is complete, certification passes through.
3. test and analysis
Method proposed by the invention is specific to the completeness certification method of dem data, can be right using this method Dem data carries out more accurate integrated authentication and the anti-of watermark repeats to be embedded in.
(1) dem data integrated authentication
Fragile watermark detection is carried out to the dem data after embedded watermark.Test result indicates that this method can be detected accurately Fragile watermark information into data, with the integrality of this certification carrier dem data, certification accuracy is 100%.
(2) the common modification attack of dem data
Data modification attack refers to dem data by intentional or unintentional modification, including elevation translation, scaling, random noise And data deletion, cutting, partial replacement etc..As shown in figure 5, test result indicates that, this method by variety classes for changing Dem data containing watermark, can correctly detect out dem data modification, the effectively integrality of authentication data, false alarm rate and Loss is 0.
(3) it is anti-to repeat Embedded test
Anti- repetition is embedded to be referred to be only capable of being embedded in a watermark to carrier data.Test result indicates that this method can be not While influenceing to be embedded in watermark first, effectively prevent the repetition of watermark to be embedded in, ensure that the uniqueness of containing watermark evidence.
Although the present invention disclosed as above with preferred embodiment, embodiment be not for limiting the present invention, it is any ripe This those skilled in the art is known, without departing from the spirit and scope of the invention, can make various changes or retouch from working as, but equally in the present invention Protection domain within.Therefore protection scope of the present invention should be with what claims hereof protection domain was defined It is accurate.

Claims (2)

  1. It is 1. a kind of based on the anti-DEM completeness certification methods for repeating embedded double watermarks, it is characterised in that including procedure below:
    (1) watermark information generation and insertion
    Step 1:According to the precision of DEM carrier datas, choose data is not influenceed the numerical value of part by watermark, is carried using D8 algorithms Watermark dem data S to be embedded features of terrain point is taken, obtains the characteristic area S of data1With non-characteristic area S2
    Step 2:From the characteristic area S of the watermark dem data to be embedded obtained by step 11Middle detection robust watermarking, if not depositing Illustrate that data are also to be not embedded into the initial data of any watermark in robust watermarking, skip to step 3, otherwise skip to step 5, no longer The data are carried out with the embedding operation of any watermark, prevents the repetition of watermark to be embedded in;
    Step 3:Pair also it is not embedded into the original dem data of any watermark, the characteristic area S using mapping mechanism by data1Generation Robust watermarking W_R, then by the characteristic area S of robust watermarking information W_R qualified insertions to data1In, complete robust watermarking It is embedded:
    <mrow> <msubsup> <mi>S</mi> <mn>1</mn> <mo>&amp;prime;</mo> </msubsup> <mo>=</mo> <msub> <mi>S</mi> <mn>1</mn> </msub> <mo>&amp;CirclePlus;</mo> <mi>W</mi> <mo>_</mo> <mi>R</mi> </mrow>
    Wherein,Represent robust watermarking embedding method;
    Step 4:To the data characteristics region S containing robust watermarking1' MD5Hash computings are carried out, obtain the Kazakhstan of carrier dem data Uncommon value sequence, that is, watermark information sequence W_F to be embedded, its permanent length is 128:
    W_F=MD5 (S1′)
    W_F={ W_Fi,1≤i≤128;W_Fi∈{0,1}}
    Extract the non-characteristic area part S of dem data2Obtain the sequence S of watermark to be embedded2
    <mrow> <msub> <mi>S</mi> <mn>2</mn> </msub> <mo>=</mo> <mo>{</mo> <msub> <mi>S</mi> <msub> <mn>2</mn> <mi>i</mi> </msub> </msub> <mo>,</mo> <mi>i</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mo>...</mo> <mo>,</mo> <mn>64</mn> <mo>;</mo> <msub> <mi>S</mi> <msub> <mn>2</mn> <mi>i</mi> </msub> </msub> <mo>&amp;Element;</mo> <mo>{</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>}</mo> <mo>}</mo> </mrow>
    Watermark sequence W_F to be embedded is replaced into S successively2Low two bit plane, complete the insertion of fragile watermark;
    Step 5:The characteristic area S of robust watermarking will be had been inserted into1' and have been inserted into the non-characteristic area S of fragile watermark2' merge, obtain To the anti-dem data S ' for repeating double watermarks of insertion, watermark insertion is completed;
    (2) watermark information detects
    Step 1:Method is identical when being embedded in watermark, and dem data S ' features of terrain point is extracted using D8 algorithms, obtains data Characteristic area S1' and non-characteristic area S2′;
    Step 2:From characteristic area S1' middle detection robust watermarking, if being free of robust watermarking, skips step 3, directly judges certification Not by the contrary to skip to step 3, the further integrality for detecting fragile watermark in data;
    Step 3:Using identical method when being embedded in fragile watermark, to the DEM characteristic areas S extracted again1' carry out MD5Hash computings obtain the fragile watermark sequence W_F for checking;From the non-characteristic area S of DEM2' according to watermark be embedded in side Formula extracts the low two bit planes information of data, forms watermark sequence W_F ' to be certified;Compare the water for regenerating and extracting Print sequence W-F and W-F ':
    1. if W-F ≠ W-F ', represents that dem data is imperfect, certification does not pass through;
    2. if W-F=W-F ', represents that dem data is complete, certification passes through.
  2. It is 2. according to claim 1 based on the anti-DEM completeness certification methods for repeating embedded double watermarks, it is characterised in that: Process (1) step 2 and the method for process (2) step 2 detection robust watermarking are the inverse process being embedded according to robust watermarking Robust watermarking information W-R ' is extracted, and generates original robust watermarking information W_R again, calculates it and the robust watermarking that extracts Correlation between information W_R ', judge that data to be tested S ' is free of robust watermarking if coefficient correlation is less than threshold value 0.5, otherwise Then contain robust watermarking.
CN201510297558.5A 2015-06-03 2015-06-03 A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition Active CN104867099B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510297558.5A CN104867099B (en) 2015-06-03 2015-06-03 A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510297558.5A CN104867099B (en) 2015-06-03 2015-06-03 A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition

Publications (2)

Publication Number Publication Date
CN104867099A CN104867099A (en) 2015-08-26
CN104867099B true CN104867099B (en) 2017-12-15

Family

ID=53912916

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510297558.5A Active CN104867099B (en) 2015-06-03 2015-06-03 A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition

Country Status (1)

Country Link
CN (1) CN104867099B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3460722A1 (en) * 2017-09-22 2019-03-27 Authentic Vision GmbH Tamper-activated authenticable security device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102682246A (en) * 2012-05-08 2012-09-19 常熟南师大发展研究院有限公司 Vector geographic data digital watermark method based on data point positioning
CN102800041A (en) * 2012-06-11 2012-11-28 哈尔滨工程大学 Method for protecting integrity of digital vector map
CN103377457A (en) * 2012-04-19 2013-10-30 常熟南师大发展研究院有限公司 Vector geographic data accurate authentication fragile watermarking method
CN103971324A (en) * 2014-05-28 2014-08-06 中国人民解放军信息工程大学 Asymmetric watermarking method for protecting vector map data copyright

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103377457A (en) * 2012-04-19 2013-10-30 常熟南师大发展研究院有限公司 Vector geographic data accurate authentication fragile watermarking method
CN102682246A (en) * 2012-05-08 2012-09-19 常熟南师大发展研究院有限公司 Vector geographic data digital watermark method based on data point positioning
CN102800041A (en) * 2012-06-11 2012-11-28 哈尔滨工程大学 Method for protecting integrity of digital vector map
CN103971324A (en) * 2014-05-28 2014-08-06 中国人民解放军信息工程大学 Asymmetric watermarking method for protecting vector map data copyright

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"数字水印技术的DEM版权保护适用性研究";闾国年 等;《遥感学报》;20080930;第12卷(第5期);第810-818页 *
"矢量地图数字水印技术的研究现状和展望";许德合 等;《地理信息世界》;20071231(第6期);第42-48页 *
《一种抗数据压缩的矢量地图数据数字水印算法》;朱长青 等;《测绘科学技术学报》;20060831;第23卷(第4期);第281-283页 *

Also Published As

Publication number Publication date
CN104867099A (en) 2015-08-26

Similar Documents

Publication Publication Date Title
CN103761702B (en) Image hiding and authentication method based on secret sharing
CN104636764B (en) A kind of image latent writing analysis method and its device
Wang et al. Reversible fragile watermarking for locating tampered blocks in 2D vector maps
CN104795071A (en) Blind audio watermark embedding and watermark extraction processing method
CN104063731A (en) Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology
Das et al. Multiple embedding secret key image steganography using LSB substitution and Arnold Transform
Chiew et al. Blind steganalysis: A countermeasure for binary image steganography
CN104217389A (en) Image watermark embedding and extracting method and device based on improved Arnold transform
CN107067363A (en) A kind of non-blind robust Spatial Domain Image Watermark method constant based on pixel order relation
CN102800041A (en) Method for protecting integrity of digital vector map
CN104217387A (en) Image watermark embedding and extracting method and device based on quantization embedding
CN103903217A (en) Vector map integrity authentication method based on vertex insertion
CN104867099B (en) A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition
Rajput et al. A novel image encryption and authentication scheme using chaotic maps
CN103106656B (en) Image signatures based on profile wave convert generates and tampering detection and localization method
CN102663673B (en) Chaotic mapping based shp line-surface layer fragile watermark technology
CN104866737B (en) A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account
Sudha et al. Randomly tampered image detection and self-recovery for a text document using Shamir secret sharing
CN105426710A (en) Method for accurately authenticating vector geographic data based on spatial domain sequencing
Wang et al. Error detecting code based fragile watermarking scheme for 3D models
Furon et al. A new measure of watermarking security applied on QIM
CN112511291A (en) Method for detecting OCB authentication encryption algorithm to resist differential fault attack
Senapati et al. Tamper Localization Through Fragile Watermarking with Vigenère Cipher Encryption
Neyman et al. An improvement technique of fragile watermarking to assurance the data integrity on vector maps
Patel et al. Multiple LSB data hiding based on pixel value and MSB value

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant