CN104867099B - A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition - Google Patents
A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition Download PDFInfo
- Publication number
- CN104867099B CN104867099B CN201510297558.5A CN201510297558A CN104867099B CN 104867099 B CN104867099 B CN 104867099B CN 201510297558 A CN201510297558 A CN 201510297558A CN 104867099 B CN104867099 B CN 104867099B
- Authority
- CN
- China
- Prior art keywords
- watermark
- data
- embedded
- dem
- robust watermarking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The invention discloses a kind of based on the anti-DEM completeness certification methods for repeating embedded double watermarks, by adding robust watermarking pre-detection mechanism before watermark embedding, while fragile watermark integrated authentication effect is not influenceed, the repetition insertion of watermark effectively prevent.The method of the present invention be directed to be used only fragile watermark exist by be not embedded into watermark data and embedded watermark after the data distorted regard as certification not by cannot be distinguished by, and ax-grinder is by first distorting the dem data containing fragile watermark, then the problem of mode of embedded identical fragile watermark denies its tampering again, design a kind of integrality of the anti-double-watermarking method, more accurately and effectively certification dem data for repeating embedded robust+fragility.
Description
Technical field
The invention belongs to geography information security technology area, and in particular to a kind of based on the anti-DEM for repeating embedded double watermarks
Completeness certification method.
Background technology
Under the overall background that information technology develops rapidly, the economic and social benefit of geodata is more and more closed
Note and attention, the reliability and integrity issue of data also have become a popular research topic.Fragile watermark conduct
A kind of advanced data integrity authentication techniques means, at present existing numerous scholars to it in terms of geodata integrated authentication
Application conduct in-depth research, but vector remote sensing image data is concentrated mainly on, for dem data integrated authentication
Fragile Watermark Algorithm is then fresh rare periodical.
In addition, the existing completeness certification method based on fragile watermark had been inserted into watermark before using data to be tested
Carry, when that can not learn whether data to be tested contain fragile watermark, then exist the data for being not embedded into watermark and embedded watermark
The data distorted afterwards regard as the problem of certification is not by cannot be distinguished by.On the other hand, in actual applications, due to
The dem data producer and user's two-phase laminated flow, ax-grinder can by first distorting the dem data containing fragile watermark,
Then the mode for being embedded in identical fragile watermark again denies its tampering, then make it that the accuracy to data integrated authentication is big
Give a discount.
Robust watermarking technology is more ripe as another research direction of digital watermark technology, at present development.Robust water
Print has the function that to prove watermark existence, therefore, can utilize this feature, be combined with fragile watermark, gives full play to each
From advantage, solve the above problems jointly, that is, the more efficiently integrality of certification dem data, and by preventing the weight of watermark
It is multiple embedded to distort denial behavior prevent from first distorting being embedded in watermark again.
The content of the invention
It is an object of the invention to:For the number of fragile watermark is may result in by and was not embedded into using only fragile watermark
It is the incomplete problem of data according to mistakenly certification, and ax-grinder can be embedded in fragile watermark again by first altered data
The problem of mode is denied to its tampering, propose a kind of based on the anti-DEM integrated authentications calculation for repeating embedded double watermarks
Method, obtain more accurate integrated authentication result and prevent from denying the generation of tampering using embedded watermark is repeated.
In order to realize foregoing invention purpose, the technical solution adopted in the present invention is:One kind repeats embedded double water based on anti-
The DEM completeness certification methods of print, including procedure below:
(1) watermark information generation and insertion
Step 1:According to the precision of DEM carrier datas, choose data is not influenceed the numerical value of part by watermark, is calculated using D8
Method extracts watermark dem data S to be embedded features of terrain point, obtains the characteristic area S of data1With non-characteristic area S2:
Step 2:From the characteristic area S of the watermark dem data to be embedded obtained by step 11Middle detection robust watermarking (tool
Body step met the detection of journey (2) robust watermarking), if illustrating that data are also be not embedded into any watermark original in the absence of robust watermarking
Data, step 3 is skipped to, otherwise skip to step 5, no longer the data are carried out with the embedding operation of any watermark, prevents watermark
Repeat to be embedded in;
Step 3:Pair also it is not embedded into the original dem data of any watermark, the characteristic area S using mapping mechanism by data1
Robust watermarking W_R is generated, then by the characteristic area S of robust watermarking information W_R qualified insertions to data1In, complete robust water
The insertion of print:
S′1=S1⊕W_R
Wherein, ⊕ represents robust watermarking embedding method;
Step 4:To the data characteristics region S ' containing robust watermarking1MD5Hash computings are carried out, obtain carrier dem data
Sequence of hash values, that is, watermark information sequence W_F to be embedded, its permanent length is 128:
W_F=MD5 (S '1)
W_F={ W_Fi,1≤i≤128;W_Fi∈{0,1}}
Extract the non-characteristic area part S of dem data2Obtain watermark sequence S to be embedded2:
Watermark sequence W_F to be embedded is replaced into S successively2Low two bit plane, complete the insertion of fragile watermark;
Step 5:The characteristic area S ' of robust watermarking will be had been inserted into1With the non-characteristic area S ' for having been inserted into fragile watermark2Close
And obtain being embedded in the anti-dem data S ' for repeating double watermarks, watermark insertion is completed;
(2) watermark information detects
Step 1:Method is identical when being embedded in watermark, and dem data S ' features of terrain point is extracted using D8 algorithms, is obtained
The characteristic area S ' of data1With non-characteristic area S '2;
Step 2:From characteristic area S '1Middle detection robust watermarking, if being free of robust watermarking, step 3 is skipped, directly judged
Certification is not by the contrary to skip to step 3, the further integrality for detecting fragile watermark in data;
Step 3:Using identical method when being embedded in fragile watermark, to the DEM characteristic areas S ' extracted again1Carry out
MD5Hash computings obtain the fragile watermark sequence W_F for checking;From the non-characteristic area S ' of DEM2According to watermark be embedded in side
Formula extracts the low two bit planes information of data, forms watermark sequence W_F ' to be certified;Compare the water for regenerating and extracting
Print sequence W_F and W_F ':
1. if W_F ≠ W_F ', represents that dem data is imperfect, certification does not pass through;
2. if W_F=W_F ', represents that dem data is complete, certification passes through.
Process (1) step 2 and the method for process (2) step 2 detection robust watermarking are to be embedded according to robust watermarking
Inverse process extraction robust watermarking information W_R ', and generate original robust watermarking information W_R again, calculate it and extract
Correlation between robust watermarking information W_R ', judge that data to be tested S ' is free of robust if coefficient correlation is less than threshold value 0.5
Watermark, otherwise then contain robust watermarking.
It can be completed based on the anti-dem data integrated authentication for repeating embedded double watermarks according to above step.
The characteristics of this method and technical advantage:
(1) this method introduces robust watermarking on the basis of general fragile watermark, avoid using only fragile watermark without
The problem of method distinguishes the initial data for being not embedded into watermark with the data being tampered after embedded watermark, has obtained more accurate complete
Property authentication result;
(2) this method adds robust watermarking pre-detection mechanism before watermark embedding, and not influenceing, fragile watermark is complete
Property certification effect while, effectively prevent the repetition insertion of watermark, avoid and usurped by first distorting and being embedded in watermark again
Change denial behavior, solve the problem in practical application.
Brief description of the drawings
Fig. 1 is watermark generation of the present invention and embedded flow chart.
Fig. 2 is watermark detection flow chart of the present invention.
Fig. 3 is the experimental data of embodiment.
Fig. 4 is that embodiment carries out the data after watermark insertion.
Fig. 5 is the data of the modified attacks of Fig. 4:(a) for elevation translation attack, (b) be elevation scaling attack, (c) be with
Machine attacked by noise, (d) are that data delete attack, and (e) is data shearing attack, and (f) attacks for partial replacement.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.
The present embodiment select a width size is 509 × 515, resolution ratio 5m, the 1 of floating type altitude data:10000 grids
DEM experimental datas (such as Fig. 3), for whole process such as the generating of watermark information, embedded and detections, provide the one of the inventive method
Individual embodiment, the present invention is further described.
1. watermark information generates and insertion
Step 1:The features of terrain point of watermark dem data to be embedded is extracted, obtains the characteristic area of data and non-characteristic area
Domain;
Step 2:The coefficient correlation of robust watermarking in the data characteristics region that Detection and Extraction go out, coefficient correlation are less than 0.5
Skip to step 3, it is on the contrary then skip to step 5, no longer the data are carried out with the embedding operation of watermark;
Step 3:Robust watermarking W_R is generated by the characteristic area of data using mapping mechanism, and by robust watermarking information W_
R qualified insertions complete the insertion of robust watermarking into the characteristic area of data;
Step 4:MD5Hash calculating is carried out to the data characteristics region containing robust watermarking, obtains watermark to be embedded,
And the non-characteristic area of the data extracted is subjected to Binary Conversion, the watermark information of generation is replaced low the two of the region successively
On bit plane, the insertion of fragile watermark is completed;
Step 5:By the characteristic area for having been inserted into robust watermarking and the non-characteristic region combination for having been inserted into fragile watermark, obtain
To the anti-dem data S' for repeating double watermarks of insertion, watermark embedding operation is completed.
2. watermark information detects
Step 1:The features of terrain point of dem data to be certified is extracted again, obtains the characteristic area of data and non-feature
Region;
Step 2:Inverse process according to robust watermarking insertion calculates the correlation of the robust watermarking in data characteristics region,
If coefficient correlation is less than 0.5 explanation data to be tested and is free of robust watermarking, it can directly judge certification not by the contrary to skip to step
Three;
Step 3:Watermark information is regenerated by the characteristic area of data using identical method when being embedded in fragile watermark
W_F, and watermark sequence W_F' is extracted from the non-characteristic area of data;
Step 4:Compare the watermark sequence W_F and W_F' for regenerating and extracting:
1. if W_F ≠ W_F', represents that dem data is imperfect, certification does not pass through;
2. if W_F=W_F', represents that dem data is complete, certification passes through.
3. test and analysis
Method proposed by the invention is specific to the completeness certification method of dem data, can be right using this method
Dem data carries out more accurate integrated authentication and the anti-of watermark repeats to be embedded in.
(1) dem data integrated authentication
Fragile watermark detection is carried out to the dem data after embedded watermark.Test result indicates that this method can be detected accurately
Fragile watermark information into data, with the integrality of this certification carrier dem data, certification accuracy is 100%.
(2) the common modification attack of dem data
Data modification attack refers to dem data by intentional or unintentional modification, including elevation translation, scaling, random noise
And data deletion, cutting, partial replacement etc..As shown in figure 5, test result indicates that, this method by variety classes for changing
Dem data containing watermark, can correctly detect out dem data modification, the effectively integrality of authentication data, false alarm rate and
Loss is 0.
(3) it is anti-to repeat Embedded test
Anti- repetition is embedded to be referred to be only capable of being embedded in a watermark to carrier data.Test result indicates that this method can be not
While influenceing to be embedded in watermark first, effectively prevent the repetition of watermark to be embedded in, ensure that the uniqueness of containing watermark evidence.
Although the present invention disclosed as above with preferred embodiment, embodiment be not for limiting the present invention, it is any ripe
This those skilled in the art is known, without departing from the spirit and scope of the invention, can make various changes or retouch from working as, but equally in the present invention
Protection domain within.Therefore protection scope of the present invention should be with what claims hereof protection domain was defined
It is accurate.
Claims (2)
- It is 1. a kind of based on the anti-DEM completeness certification methods for repeating embedded double watermarks, it is characterised in that including procedure below:(1) watermark information generation and insertionStep 1:According to the precision of DEM carrier datas, choose data is not influenceed the numerical value of part by watermark, is carried using D8 algorithms Watermark dem data S to be embedded features of terrain point is taken, obtains the characteristic area S of data1With non-characteristic area S2:Step 2:From the characteristic area S of the watermark dem data to be embedded obtained by step 11Middle detection robust watermarking, if not depositing Illustrate that data are also to be not embedded into the initial data of any watermark in robust watermarking, skip to step 3, otherwise skip to step 5, no longer The data are carried out with the embedding operation of any watermark, prevents the repetition of watermark to be embedded in;Step 3:Pair also it is not embedded into the original dem data of any watermark, the characteristic area S using mapping mechanism by data1Generation Robust watermarking W_R, then by the characteristic area S of robust watermarking information W_R qualified insertions to data1In, complete robust watermarking It is embedded:<mrow> <msubsup> <mi>S</mi> <mn>1</mn> <mo>&prime;</mo> </msubsup> <mo>=</mo> <msub> <mi>S</mi> <mn>1</mn> </msub> <mo>&CirclePlus;</mo> <mi>W</mi> <mo>_</mo> <mi>R</mi> </mrow>Wherein,Represent robust watermarking embedding method;Step 4:To the data characteristics region S containing robust watermarking1' MD5Hash computings are carried out, obtain the Kazakhstan of carrier dem data Uncommon value sequence, that is, watermark information sequence W_F to be embedded, its permanent length is 128:W_F=MD5 (S1′)W_F={ W_Fi,1≤i≤128;W_Fi∈{0,1}}Extract the non-characteristic area part S of dem data2Obtain the sequence S of watermark to be embedded2:<mrow> <msub> <mi>S</mi> <mn>2</mn> </msub> <mo>=</mo> <mo>{</mo> <msub> <mi>S</mi> <msub> <mn>2</mn> <mi>i</mi> </msub> </msub> <mo>,</mo> <mi>i</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mn>2</mn> <mo>,</mo> <mo>...</mo> <mo>,</mo> <mn>64</mn> <mo>;</mo> <msub> <mi>S</mi> <msub> <mn>2</mn> <mi>i</mi> </msub> </msub> <mo>&Element;</mo> <mo>{</mo> <mn>0</mn> <mo>,</mo> <mn>1</mn> <mo>}</mo> <mo>}</mo> </mrow>Watermark sequence W_F to be embedded is replaced into S successively2Low two bit plane, complete the insertion of fragile watermark;Step 5:The characteristic area S of robust watermarking will be had been inserted into1' and have been inserted into the non-characteristic area S of fragile watermark2' merge, obtain To the anti-dem data S ' for repeating double watermarks of insertion, watermark insertion is completed;(2) watermark information detectsStep 1:Method is identical when being embedded in watermark, and dem data S ' features of terrain point is extracted using D8 algorithms, obtains data Characteristic area S1' and non-characteristic area S2′;Step 2:From characteristic area S1' middle detection robust watermarking, if being free of robust watermarking, skips step 3, directly judges certification Not by the contrary to skip to step 3, the further integrality for detecting fragile watermark in data;Step 3:Using identical method when being embedded in fragile watermark, to the DEM characteristic areas S extracted again1' carry out MD5Hash computings obtain the fragile watermark sequence W_F for checking;From the non-characteristic area S of DEM2' according to watermark be embedded in side Formula extracts the low two bit planes information of data, forms watermark sequence W_F ' to be certified;Compare the water for regenerating and extracting Print sequence W-F and W-F ':1. if W-F ≠ W-F ', represents that dem data is imperfect, certification does not pass through;2. if W-F=W-F ', represents that dem data is complete, certification passes through.
- It is 2. according to claim 1 based on the anti-DEM completeness certification methods for repeating embedded double watermarks, it is characterised in that: Process (1) step 2 and the method for process (2) step 2 detection robust watermarking are the inverse process being embedded according to robust watermarking Robust watermarking information W-R ' is extracted, and generates original robust watermarking information W_R again, calculates it and the robust watermarking that extracts Correlation between information W_R ', judge that data to be tested S ' is free of robust watermarking if coefficient correlation is less than threshold value 0.5, otherwise Then contain robust watermarking.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510297558.5A CN104867099B (en) | 2015-06-03 | 2015-06-03 | A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510297558.5A CN104867099B (en) | 2015-06-03 | 2015-06-03 | A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104867099A CN104867099A (en) | 2015-08-26 |
CN104867099B true CN104867099B (en) | 2017-12-15 |
Family
ID=53912916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510297558.5A Active CN104867099B (en) | 2015-06-03 | 2015-06-03 | A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104867099B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3460722A1 (en) * | 2017-09-22 | 2019-03-27 | Authentic Vision GmbH | Tamper-activated authenticable security device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102682246A (en) * | 2012-05-08 | 2012-09-19 | 常熟南师大发展研究院有限公司 | Vector geographic data digital watermark method based on data point positioning |
CN102800041A (en) * | 2012-06-11 | 2012-11-28 | 哈尔滨工程大学 | Method for protecting integrity of digital vector map |
CN103377457A (en) * | 2012-04-19 | 2013-10-30 | 常熟南师大发展研究院有限公司 | Vector geographic data accurate authentication fragile watermarking method |
CN103971324A (en) * | 2014-05-28 | 2014-08-06 | 中国人民解放军信息工程大学 | Asymmetric watermarking method for protecting vector map data copyright |
-
2015
- 2015-06-03 CN CN201510297558.5A patent/CN104867099B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103377457A (en) * | 2012-04-19 | 2013-10-30 | 常熟南师大发展研究院有限公司 | Vector geographic data accurate authentication fragile watermarking method |
CN102682246A (en) * | 2012-05-08 | 2012-09-19 | 常熟南师大发展研究院有限公司 | Vector geographic data digital watermark method based on data point positioning |
CN102800041A (en) * | 2012-06-11 | 2012-11-28 | 哈尔滨工程大学 | Method for protecting integrity of digital vector map |
CN103971324A (en) * | 2014-05-28 | 2014-08-06 | 中国人民解放军信息工程大学 | Asymmetric watermarking method for protecting vector map data copyright |
Non-Patent Citations (3)
Title |
---|
"数字水印技术的DEM版权保护适用性研究";闾国年 等;《遥感学报》;20080930;第12卷(第5期);第810-818页 * |
"矢量地图数字水印技术的研究现状和展望";许德合 等;《地理信息世界》;20071231(第6期);第42-48页 * |
《一种抗数据压缩的矢量地图数据数字水印算法》;朱长青 等;《测绘科学技术学报》;20060831;第23卷(第4期);第281-283页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104867099A (en) | 2015-08-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103761702B (en) | Image hiding and authentication method based on secret sharing | |
CN104636764B (en) | A kind of image latent writing analysis method and its device | |
Wang et al. | Reversible fragile watermarking for locating tampered blocks in 2D vector maps | |
CN104795071A (en) | Blind audio watermark embedding and watermark extraction processing method | |
CN104063731A (en) | Two-dimension code anti-counterfeiting printing and verification method adopting digital watermark technology | |
Das et al. | Multiple embedding secret key image steganography using LSB substitution and Arnold Transform | |
Chiew et al. | Blind steganalysis: A countermeasure for binary image steganography | |
CN104217389A (en) | Image watermark embedding and extracting method and device based on improved Arnold transform | |
CN107067363A (en) | A kind of non-blind robust Spatial Domain Image Watermark method constant based on pixel order relation | |
CN102800041A (en) | Method for protecting integrity of digital vector map | |
CN104217387A (en) | Image watermark embedding and extracting method and device based on quantization embedding | |
CN103903217A (en) | Vector map integrity authentication method based on vertex insertion | |
CN104867099B (en) | A kind of DEM completeness certification methods based on the embedded double watermarks of anti-repetition | |
Rajput et al. | A novel image encryption and authentication scheme using chaotic maps | |
CN103106656B (en) | Image signatures based on profile wave convert generates and tampering detection and localization method | |
CN102663673B (en) | Chaotic mapping based shp line-surface layer fragile watermark technology | |
CN104866737B (en) | A kind of DEM fragile watermark completeness certification methods for taking features of terrain into account | |
Sudha et al. | Randomly tampered image detection and self-recovery for a text document using Shamir secret sharing | |
CN105426710A (en) | Method for accurately authenticating vector geographic data based on spatial domain sequencing | |
Wang et al. | Error detecting code based fragile watermarking scheme for 3D models | |
Furon et al. | A new measure of watermarking security applied on QIM | |
CN112511291A (en) | Method for detecting OCB authentication encryption algorithm to resist differential fault attack | |
Senapati et al. | Tamper Localization Through Fragile Watermarking with Vigenère Cipher Encryption | |
Neyman et al. | An improvement technique of fragile watermarking to assurance the data integrity on vector maps | |
Patel et al. | Multiple LSB data hiding based on pixel value and MSB value |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |