CN105488434B - A kind of map vector completeness certification method based on label - Google Patents

A kind of map vector completeness certification method based on label Download PDF

Info

Publication number
CN105488434B
CN105488434B CN201510883547.5A CN201510883547A CN105488434B CN 105488434 B CN105488434 B CN 105488434B CN 201510883547 A CN201510883547 A CN 201510883547A CN 105488434 B CN105488434 B CN 105488434B
Authority
CN
China
Prior art keywords
watermark
group
vertex
authentication
primitive
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510883547.5A
Other languages
Chinese (zh)
Other versions
CN105488434A (en
Inventor
王娜娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuzhou Shenshan Intelligent Technology Co Ltd
Original Assignee
Jiangsu Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Normal University filed Critical Jiangsu Normal University
Priority to CN201510883547.5A priority Critical patent/CN105488434B/en
Publication of CN105488434A publication Critical patent/CN105488434A/en
Application granted granted Critical
Publication of CN105488434B publication Critical patent/CN105488434B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Image Processing (AREA)

Abstract

The present invention provides a kind of map vector completeness certification method based on label.Include the following steps:Identification can be embedded in watermark apex coordinate;It is adaptive to divide pel group;Generate authenticating water-mark;Embedded authenticating water-mark;Mark pel;Watermark authentication and initial data Distortionless.Map vector pel is adaptively divided into different groups by the present invention, under the premise of the trueness error tolerance for considering map vector, the insertion of authenticating water-mark is realized using reversible information hidden method, and based on the method for being inserted into vertex, addition label ensures the correct division of watermark authentication stage diagram tuple to indicate its affiliated pel group in each pel, is accurately positioned while distort pel, with preferable invisibility, and it can tolerate that pel is out of order and vertex backward is attacked;On the other hand the algorithm is in the watermark authentication stage, and after removal marks and extracts authenticating water-mark, lossless reduction map vector initial data can effectively ensure the accurate use of map vector data.

Description

Mark-based vector map integrity authentication method
Technical Field
The invention relates to the fields of geographic information science and information hiding, in particular to a vector map integrity authentication method based on marks.
Background
Nowadays, a two-dimensional vector map is widely used as basic data of a Geographic Information System (GIS) in the fields of city planning, post and telecommunications, transportation, navigation, mapping, and the like. The acquisition of vector data requires a high outlay. However, these vector data can be copied, modified and distributed conveniently and quickly by means of information processing tools and public networks, which makes integrity certification and authenticity identification of two-dimensional vector maps increasingly prominent.
In order to meet the requirements of data integrity authentication and authenticity identification, digital signature technology is proposed. However, this technique can only identify whether data is tampered, and cannot locate the tampered position. Once the data is found to be changed, no matter the tampered data is the required data or the non-required data, the data is considered to be tampered and cannot be used, the data needs to be acquired again, the data acquisition time and cost are increased, and unnecessary delay is caused to some application occasions needing to acquire the data in time. In order to make up for the defects of the digital signature technology, the fragile watermarking technology is generated as an effective means of integrity authentication, and becomes a hot spot of research in the field of integrity authentication of geographic information products in recent years.
In addition, the name of patent application No. CN201210566500 is "a multi-stage authentication method for the integrity of shp line-surface layers"; patent application No. CN201210189469, entitled "a digital vector map integrity protection method"; the patent application number CN201210142896, entitled "a chaotic mapping based shp line-surface layer fragile watermarking technology", also relates to the problem of vector map integrity authentication, but unlike the method adopted in the present patent application, the method cannot have the characteristics of accurate positioning and tampering, recovery of vector map original data after authentication, and tolerance of primitive disorder and vertex reverse-order attack.
The "alternative gate-like multi-level Authentication" and "Authentication method and system" in the U.S. patent library are not specific to the present application, and the specific method is not the same.
Disclosure of Invention
On one hand, the method divides the vector map graphic elements into different groups in a self-adaptive manner, adopts a reversible information hiding method to realize the embedding of authentication watermarks on the premise of considering the precision error tolerance of the vector map, adds marks in each graphic element to indicate the image element group to which the graphic element belongs on the basis of a vertex inserting method, ensures the correct division of the image element group in the watermark authentication stage, has better invisibility while accurately positioning and tampering the graphic elements, and can tolerate the disordered graphic element and the reverse vertex attack; on the other hand, in the watermark authentication stage, after the mark is removed and the authentication watermark is extracted, the original data of the vector map is restored in a lossless manner, and the accurate use of the vector map data can be effectively ensured. Experimental results show that the scheme accurately positions tampered data, and is a practical algorithm for integrity authentication and positioning tampering of the vector map.
Vector map primitives (point, line and surface) are formed by arranging a large number of closely spaced vertices in a particular order, and the map data is a 2-dimensional coordinate sequence of the vertices. The vector map fragile watermarking technology is an important means for solving the problems of integrity authentication and positioning tampering of the vector map. The vector map fragile watermarking strategies which are currently proposed can achieve the aim of authenticating the integrity and the authenticity of data, but the strategies have defects in accurately positioning tampering. Aiming at the problems, the invention provides a vector map integrity authentication method based on a mark, which comprises the following steps:
(1) identifying embeddable watermark vertex coordinates;
identifying the vertex coordinates of the embeddable watermark according to the precision error tolerance of the vector map; suppose that the vector map M contains N line primitives, denoted as P1,P2,…,PN,PjDenotes the j (j ═ 1,2, …, N) th line element, PjThe number of coordinates of the embeddable watermark is
(2) Adaptively dividing the graph element group;
adaptively dividing the vector map primitives into non-overlapping groups according to the number of coordinates of the embedded watermark vertices in the primitives; in the invention, the authentication watermark length of each group is L bits, the watermark length embedded by each embeddable watermark vertex coordinate is c (c is 1,2, … bits), and the number of the embeddable watermark vertex coordinates required by each group is LAssume that the number of tuples is Ng(1≤NgN), ith (i ═ 0,1, …, Ng-1) the groups of graph cells are Gi,GiContaining embeddable watermark topsNumber of point coordinates ofIf in the group of pixels GiFully embeds its corresponding L-bit authentication watermark,and NrIt is necessary to satisfy the following relationship,group of drawing graphs GiThe included line drawing elements are marked as
(3) Generating an authentication watermark;
generating the authentication watermark of each image element group in the step (2) by using a hash algorithm; group of drawing graphs Gi(i=0,1,…,Ng-1) authentication watermark is denoted as Hi,Hi={hi,jE {0,1}, j 0,1iNumber of middle bits, hi,j(j-0, 1, …, L-1) represents HiThe jth bit of (1); h is to beiConversion into a sequence W of watermarks to be embeddedi={wi,j|wi,j=0,1,…,2c–1,j=0,1,…,Nr–1},wi,j=hi,j×c×2c-1+hi,j×c+1×2c-2+…+hi,(j+1)×c-1×20
(4) Embedding an authentication watermark;
using reversible information hiding method based on interval state value to embed watermark sequence W generated in step (3)i(i=0,1,…,Ng-1) embedding into group of primitives GiFront N ofrEach embeddable watermark vertex coordinate is in the primitive group GiInto which its corresponding authentication watermark H is embeddediThen, obtaining the watermark-containing pattern group Gi w
(5) Marking the graphic primitive;
embedding a mark indicating the image group where the watermark-containing primitive is located in each primitive containing the watermark by using a vertex inserting method, wherein the inserted vertex is called as a position vertex, embedding the mark in the primitive containing the watermark to obtain a corresponding primitive containing the mark, correctly identifying the position vertex of the primitive containing the mark according to the characteristics of the primitive containing the mark, obtaining the primitive group where the primitive containing the mark is located, and inserting the mark in each primitive to obtain a vector map containing the mark;
(6) watermark authentication and original data recovery;
according to the primitive marking and reversible information hiding method, vector map data are restored and positioned and tampered, and the specific steps are as follows:
(6.1) identifying an original graph group;
according to the characteristics of the marked primitives contained in the step (5), identifying the original primitive of each primitive group, and deleting the inserted position vertex;
(6.2) watermark extraction and original data recovery;
identifying the watermark-containing embeddable watermark vertex coordinates of the image group by using the embeddable watermark vertex coordinate judgment method in the step (1), extracting the watermark and recovering the original data of the vector map, and recovering the watermark-containing image group G after the data is recoveredi w(i=0,1,…,Ng-1) is denoted as Gi', from Gi wThe watermark sequence extracted from the sequence is recorded as Wi'={wi,j'|wi,j'=0,1,…,2c–1,j=0,1,…,Nr-1}, using the following formula, W is expressedi' conversion to binary sequence Hi'={hi,j'|hi,j'∈{0,1},j=0,1,…,L–1},
(6.3) generating an authentication watermark;
using the method of step (3), generating eachThe authentication watermark of the pixel group after data recovery is assumed as a pixel group Gi'(i=0,1,…,Ng-1) the generated authentication watermark is Hi”={hi,j”|hi,j”∈{0,1},j=0,1,…,L–1};
(6.4) watermark authentication;
according to the group of drawing cells Gi'(i=0,1,…,NgWatermark H extracted in-1)i' and the generated watermark Hi", determine whether the primitive group is tampered, if Hi'=Hi", the group has not been tampered with; otherwise, the group is tampered; and after the integrity of each primitive group is verified, displaying all tampered primitives.
Suppose PjComprising u vertices V1(x1,y1),V2(x2,y2),…,Vu(xu,yu),Vm(xm,ym) (m-1, 2, …, u) represents PjM-th vertex of (2), xmAnd ymRespectively being vertex VmThe x-coordinate and the y-coordinate of (c),andare respectively line drawing element PjThe maximum value and the minimum value of the middle x coordinate, and the judgment vertex VmX coordinate x ofmThe method for determining whether the watermark vertex coordinates can be embedded comprises the following specific steps:
(1.1) mixingAndis equally divided intoThe length of the section is equal to the length of the section,
wherein,the length of each of the segments is represented,the value of (a) should satisfy the following conditions,
in the formula, tau is the precision error tolerance of the vector map M;
(1.2) according to the length of each segmentCalculating the coordinate xmThe end points of the boundary of the segment in which the segment is located,
in the formula,denotes the coordinate xmThe value of the index of the segment in which it is located,andrespectively representing a defined coordinate xmThe left end point and the right end point of the boundary of the segment range arexmAndviewed as a space
(1.3) if xmThe following conditions are satisfied,
scale xmThe vertex coordinates of the embeddable watermark are obtained;
the method for dividing the graph element group comprises the following specific steps:
(2.1) mixingDivision of line primitives into primitive groups G0In (1),to satisfy the minimum positive integer of the following relationship,
(2.2) according to the method of step (2.1), dividing the remaining primitives into groups in sequence, i.e. for any primitive Gi(i>0) Selecting from the remaining primitivesThe line-line primitives are taken as its members,to satisfy the minimum positive integer of the following relationship,
delta is a group of picture elements G0To the group of picture elements Gi-1Number of all primitives in, i.e.
(2.3) since the primitives are divided into groups in sequence, the last group of primitives may not provide enough embedding space, at which point the last group of primitives is divided into the penultimate group.
Generating authentication watermark HiThe method comprises the following steps:
Hi=grouphash(hash(I(Gi),k,i,Vi,Min),L,K)
wherein I (-) denotes a method of acquiring spatial data and attribute data, k denotes a private key generating a hash (-) input parameter, ViGroup of pictures GiNumber of vertices, MinAn index value representing the vector map, hash (·) representing an existing cryptographic hash algorithm, grouhash (H)i aL, K) denotes the slave bit sequence H under the control of the private key Ki aA method of selecting L bits; method I (-) obtaining tuple GiThe group of primitive vertices are scanned as follows: scanning G in sequence according to the storage sequence of the graphics primitivesiLine drawing elements of, i.e. fromScan toIn each line element, scan from the first vertex to the last vertex. Said interval QmThe state values of (a) are defined as follows: suppose embeddable watermark vertex coordinate xmCorresponding to an interval ofWill QmIs divided into P (P is more than or equal to 2) sub-intervals, xmThe index value of the sub-interval is the interval QmThe state value of (2).
Suppose that the coordinate x of the vertex of the embeddable watermarkmIn which the embedded watermark is wi,jThe specific steps of watermark embedding are as follows:
(4.1) calculating the Interval QmThe state of (a) is (b),
(4.2) mixing QmAverage score of 2c+1Subinterval, calculating interval QmCorresponding watermark-containing spaceS, i.e. xm' the index value of the sub-interval in which,
s=2c×r+wi,j
(4.3) calculating the coordinate x of the water markm',
Wherein,
suppose a tuple Gi wLine drawing elementContains f vertices, denoted asThe t-th vertex of the representation, and respectively vertex Vt wX and y coordinates of (a) and the vertex to be inserted is Vg(xg,yg),xgAnd ygRespectively being vertex VgX and y coordinates of (a) and (b), said group of cells G in which it is markedi wThe method comprises the following specific steps:
(5.1) putting the vertex V1 wAnd V2 wIs divided into N on averaget(Nt=2×Ng) Segments, each segment having a length of lt
(5.2) inserting vertex V at the midpoint of the i-th segmentgAnd is marked by thisThe located graphic primitive group Gi w
Wherein,
in thatAfter embedding the mark, the corresponding graphic element containing the mark is obtainedHas the following characteristics:
i) three consecutive vertices at one end are in the sameOn the straight line, the end is the starting end; suppose that the vertex obtained from the start scan is Vt mThe t-th vertex represented by (t-1, 2, …, f +1), and the vertex Vt mThe x coordinate and the y coordinate of the insertion point are the inserted position vertex;
ii) calculated as followsIndex value i of the located tuple
From set G of watermark-containing patternsi w(i=0,1,…,Ng-1) embeddable watermark coordinate XmThe specific steps of extracting the watermark information in' are as follows:
(6.2.1) according to step (4.1), x is calculatedm' corresponding watermark-containing spaceR state of (1);
(6.2.2) spacing Qm' average division into 2c+1Sub-intervals, calculating the length l of each sub-intervals
(6.2.3) calculating the Interval Qm' of the state value s of the device,
(6.2.4) extracting the watermark wi,j',
wi,j'=s-r×2c
(6.2.5) recovery xm' of the original data of the above-mentioned publication,
wherein,
the invention has proposed a vector map integrity authentication method based on marking, on the one hand this method divides the primitive of the vector map into different groups adaptively, under the prerequisite of the precision error tolerance of considering the vector map, adopt the hidden method of the reversible information to realize the embedding of the authentication watermark, and on the basis of inserting the method of the vertex, add the marking in each primitive in order to point its affiliated primitive group, guarantee the correct division of the primitive group in the authentication stage of the watermark, while locating and tampering the primitive accurately, have better invisibility, and can tolerate primitive out of order and vertex reverse order attacks; on the other hand, in the watermark authentication stage, after the mark is removed and the authentication information is extracted, the original data of the vector map is restored in a lossless mode, and accurate use of the vector map data can be effectively guaranteed. Compared with other vector map integrity authentication methods, the method has the following advantages:
1. the method adaptively divides the primitive groups, marks the group information for each group, has higher tampering positioning precision, and effectively reduces the data retransmission times caused by the failure of accurately detecting the tampered data;
2. according to the method, the embedding parameters are set according to the precision error tolerance of the vector map, so that the disturbance of the watermark embedding to the vector map data can be effectively controlled, and the quality of the watermark-containing vector map can be ensured;
3. the invention embeds authentication watermarks in each pixel group by using a reversible information hiding method, adds marks in each pixel group based on a vertex inserting method, and not only can realize integrity authentication, but also can recover the original data of the vector map and ensure the accurate use of the vector map after removing the marks and extracting authentication information in an authentication stage.
4. The marking method adopted by the invention can still correctly indicate the group of the primitives and the vertex scanning sequence after being attacked by the operations of keeping the contents, namely the primitive disorder and the vertex reverse order, and is robust to the primitive disorder and the vertex reverse order attack.
Drawings
FIG. 1 is a flowchart of a tag-based vector map integrity authentication method;
fig. 2 is a vector map (gaussian snow block map) before embedding authentication watermark;
fig. 3 is a vector map (gaussian snow block map) with an embedded authentication watermark;
FIG. 4 is a tampered watermark-containing vector map (Gauss mountain snow Block map);
fig. 5 locates a tampered vector map (gaussian snow block map).
Detailed Description
The technical scheme of the invention is further described by combining the drawings and the examples:
as shown in fig. 1, the method for authenticating integrity of a tag-based vector map of the present invention is generally divided into two aspects: A. vector map watermark embedding algorithm; B. and (5) a vector map watermark authentication algorithm.
A. The vector map watermark embedding algorithm comprises the following steps:
B. identifying vertex coordinates of the embeddable watermark;
C. and identifying the coordinates of the vertex of the embeddable watermark according to the precision error tolerance of the vector map. The same method for judging whether the x coordinate and the y coordinate of the primitive vertex are the coordinates of the embeddable watermark vertex is adopted, and the invention takes the x coordinate as an example to explain the method for judging the coordinates of the vertex of the embeddable watermark.
Suppose that the vector map M contains N line primitives, denoted as P1,P2,…,PN,PjDenotes the j (j ═ 1,2, …, N) th line element, PjComprising u vertices V1(x1,y1),V2(x2,y2),…,Vu(xu,yu),Vm(xm,ym) (m-1, 2, …, u) represents PjM-th vertex of (2), xmAnd ymRespectively being vertex VmThe x-coordinate and the y-coordinate of (c),andare respectively line drawing element PjThe maximum and minimum of the medium x coordinate. Determining vertex VmX coordinate x ofmThe concrete method for determining whether the vertex coordinate of the embeddable watermark is as follows:
a. will be provided withAndis equally divided intoThe length of the section is equal to the length of the section,
wherein,the length of each of the segments is represented,the value of (a) should satisfy the following conditions,
where τ is the accuracy error margin of the vector map M.
b. According to the length of each segmentCalculating the coordinate xmThe end points of the boundary of the segment in which the segment is located,
in the formula,denotes the coordinate xmThe value of the index of the segment in which it is located,andrespectively representing a defined coordinate xmThe left end point of the boundary and the right end point of the boundary of the segment range. Will be provided withxmAndviewed as a space
c. If xmThe following conditions are satisfied,
scale xmAre embeddable watermark vertex coordinates. A line primitive PjThe number of vertex coordinates in which the watermark can be embedded is recorded as
(2) Adaptively dividing the graph element group;
and adaptively dividing the vector map primitives into non-overlapping groups according to the number of the coordinates of the embedded watermark vertexes in the primitives. In the invention, the authentication watermark length of each group is L bits, and the watermark length embedded by each embeddable watermark vertex coordinate is c (c is 1,2, …). Thus, the number of embeddable watermark vertex coordinates required for each set isAssume that the number of tuples is Ng(1≤NgN), ith (i ═ 0,1, …, Ng-1) the groups of graph cells are Gi,GiThe number of vertex coordinates of the embeddable watermark isIf in the group of pixels GiFully embeds its corresponding L-bit authentication watermark,and NrIt is necessary to satisfy the following relationship,
the graph tuples are divided using the following method:
a. will be provided withDivision of line primitives into primitive groups G0In (1),to satisfy the minimum positive integer of the following relationship,
b. sequentially dividing the remaining primitives into groups according to the method of step (a). I.e. for arbitrary tuples Gi(i>0) Selecting from the remaining primitivesThe line-line primitives are taken as its members,
to satisfy the minimum positive integer of the following relationship,
delta is a group of picture elements G0To the group of picture elements Gi-1Number of all primitives in, i.e.
c. Because the primitives are divided into groups in sequence, the last group of primitives may not provide enough embedding space, at which point the last group of primitives is divided into a penultimate group.
Group of drawing graphs GiThe included line drawing elements are marked as
(3) Generating an authentication watermark;
and (3) generating the authentication watermark of each image element group in the step (2) by using a hash algorithm. Group of drawing graphs Gi(i=0,1,…,Ng-1) authentication watermark is denoted as Hi
Hi={hi,j∈{0,1},j=0,1,...,L-1}
Wherein L represents HiNumber of middle bits, hi,j(j-0, 1, …, L-1) represents HiThe jth bit of (a).
Generating an authentication watermark HiThe method comprises the following steps:
Hi=grouphash(hash(I(Gi),k,i,Vi,Min),L,K)
wherein I (-) denotes a method of acquiring spatial data and attribute data, k denotes a private key generating a hash (-) input parameter, ViGroup of pictures GiNumber of vertices, MinAn index value representing the vector map, hash (·) representing an existing cryptographic hash algorithm, grouhash (H)i aL, K) denotes the slave bit sequence H under the control of the private key Ki aThe method of selecting L bits.
Method I (-) obtaining tuple GiThe group of primitive vertices are scanned as follows: scanning G in sequence according to the storage sequence of the graphics primitivesiLine drawing elements of, i.e. fromScan toIn each line element, scan from the first vertex to the last vertex.
H is to beiConversion into a sequence W of watermarks to be embeddedi={wi,j|wi,j=0,1,…,2c–1,j=0,1,…,Nr–1},
wi,j=hi,j×c×2c-1+hi,j×c+1×2c-2+…+hi,(j+1)×c-1×20
(4) Embedding an authentication watermark;
using reversible information hiding method based on interval state value to embed watermark sequence W generated in step (3)i(i=0,1,…,Ng-1) embedding into group of primitives GiFront N ofrEach can be embedded in watermark vertex coordinates. Suppose embeddable watermark vertex coordinate xmCorresponding to an interval ofInterval QmThe state values of (a) are defined as follows:
will QmIs divided into P (P is more than or equal to 2) sub-intervals, xmThe index value of the sub-interval is the interval QmThe state value of (2).
Since the invention embeds the watermark by changing the state value of the interval, xmCorresponding water mark containing vertex coordinate xm' still located in the intervalIn (1).
Suppose that the coordinate x of the vertex of the embeddable watermarkmIn which the embedded watermark is wi,jThe method comprises the following specific steps:
a. calculating the interval QmThe state of (a) is (b),
b. will QmAverage score of 2c+1Subinterval, calculating interval QmCorresponding watermark-containing spaceS, i.e. xm' the index value of the sub-interval in which,
s=2c×r+wi,j
c. calculating the coordinate x containing the watermarkm',
Wherein,
in the group of picture elements GiInto which its corresponding authentication watermark H is embeddediThen, obtaining the watermark-containing pattern group Gi w. G is to bei wThe primitive containing the watermark line is marked as
(5) Marking the graphic primitive;
by means of inserting vertex, embedding mark in each primitive containing watermark to indicate the primitive group. Suppose a tuple Gi wLine drawing elementContains f vertices, denoted as The t-th vertex of the representation, and respectively vertex Vt wX and y coordinates of (a) and the vertex to be inserted is Vg(xg,yg),xgAnd ygRespectively being vertex VgX-coordinate and y-coordinate. Mark the group G of graph cells in which it is locatedi wThe method comprises the following specific steps:
a. let the vertex V1 wAndis divided into N on averaget(Nt=2×Ng) Segments, each segment having a length of lt
b. Inserting vertex V at midpoint of ith segmentgAnd is marked by thisThe located graphic primitive group Gi w
Wherein,
the inserted vertex is referred to as a positional vertex. In thatAfter embedding the mark, the corresponding graphic element containing the mark is obtainedHas the following characteristics:
i)three continuous vertexes at one end are on the same straight line, and the other end isThe start of (2). Assuming scanning from the beginningHas a vertex of Vt m(t-1, 2, …, f +1) representsThe (t) th vertex of (a),andrespectively being vertex Vt mX and y coordinates ofIs the inserted position vertex;
ii) calculated as followsThe index value i of the located tuple of the graph,
according to the characteristics of the marked primitives, the position vertex can be correctly identified, and the primitive group where the position vertex is located can be obtained.
And inserting a mark into each graphic element to obtain a vector map containing the mark. As shown in fig. 2-3, the comparison of the vector map before and after embedding the authentication watermark is shown, where fig. 2 is an original gaussian snow block map, and fig. 3 is the situation after embedding the authentication watermark.
B. Vector map watermark authentication algorithm
(6) Watermark authentication and original data recovery;
according to the primitive marking and reversible information hiding method, vector map data are restored and positioned and tampered, and the specific steps are as follows:
a. identifying an original graph tuple;
and (5) identifying the original primitive of each primitive group according to the characteristics of the marked primitives in the step (5), and deleting the inserted position vertex.
b. Extracting a watermark and recovering original data;
and (3) identifying the watermark-containing embeddable watermark vertex coordinates of the map element group by using the embeddable watermark vertex coordinate determination method in the step (1), extracting the watermark and recovering the original data of the vector map. From set G of watermark-containing patternsi w(i=0,1,…,Ng-1) embeddable watermark coordinates xmThe specific steps of extracting the watermark information in' are as follows:
p1. calculating x according to sub-step (a) of step (4)m' corresponding watermark-containing spaceR state of (1);
p2. will separate the space Qm' average division into 2c+1Sub-intervals, calculating the length l of each sub-intervals
p3. calculating the interval Qm' of the state value s of the device,
p4. extraction of watermark wi,j',
wi,j'=s-r×2c
p5. recovery xm' of the original data of the above-mentioned publication,
wherein,
the watermark-containing image group G after data recoveryi wIs marked as Gi', from Gi wThe watermark sequence extracted from the sequence is recorded as Wi'={wi,j'|wi,j'=0,1,…,2c–1,j=0,1,…,Nr-1}. Using the following formula, Wi' conversion to binary sequence Hi'={hi,j'|hi,j'∈{0,1},j=0,1,…,L–1},
c. Generating an authentication watermark;
and (4) generating the authentication watermark of each pixel group after the data is recovered by using the method in the step (3). Assumed to be a tuple Gi'(i=0,1,…,Ng-1) generatingAuthentication watermark of Hi”={hi,j”|hi,j”∈{0,1},j=0,1,…,L–1}。
d. Watermark authentication;
according to the group of drawing cells Gi'(i=0,1,…,NgWatermark H extracted in-1)i' and the generated watermark Hi", determine whether the group of primitives is tampered. If H isi'=Hi", the group has not been tampered with; otherwise the group is tampered with.
And after the integrity of each primitive group is verified, displaying all tampered primitives. Fig. 4 shows the vector map of fig. 3 after the watermark-containing gaussian snow block map has been tampered with, and the region A, B, C has been tampered with. In fig. 5, after the integrity of each primitive group is detected, the primitives of the tampered primitive group are displayed as dark gray. Therefore, the method can accurately position tampering.

Claims (6)

1. A vector map integrity authentication method based on marks is characterized by comprising the following steps:
(1) identifying embeddable watermark vertex coordinates;
identifying the vertex coordinates of the embeddable watermark according to the precision error tolerance of the vector map; suppose that the vector map M contains N line primitives, denoted as P1,P2,…,PN,PjRepresents the jth line drawing element, j is 1,2, …, N, PjThe number of coordinates of the embeddable watermark is
(2) Adaptively dividing the graph element group;
adaptively dividing the vector map primitives into non-overlapping groups according to the number of coordinates of the embedded watermark vertices in the primitives; the length of each group of authentication watermarks is L bits, the length of each watermark embedded into each embeddable watermark vertex coordinate is c bits, c is 1,2 and …, and the number of the embeddable watermark vertex coordinates required by each group is NrAssume that the number of tuples is Ng,1≤NgN is less than or equal to N, the ith figure group is Gi,i=0,1,…,Ng–1,GiThe number of vertex coordinates of the embeddable watermark isIf in the group of pixels GiFully embeds its corresponding L-bit authentication watermark,and NrIt is necessary to satisfy the following relationship,group of drawing graphs GiThe included line drawing elements are marked as
(3) Generating an authentication watermark;
generating the authentication watermark of each image element group in the step (2) by using a hash algorithm; group of drawing graphs GiIs marked as Hi,i=0,1,…,Ng–1,Hi={hi,jE {0,1}, j 0,1iNumber of middle bits, hi,jRepresents HiJ ═ 0,1, …, L-1; h is to beiConversion to a watermark to be embeddedSequence Wi={wi,j|wi,j=0,1,…,2c–1,j=0,1,…,Nr–1},wi,j=hi,j×c×2c-1+hi,j×c+1×2c-2+Λ+hi,(j+1)×c-1×20
(4) Embedding an authentication watermark;
using reversible information hiding method based on interval state value to embed watermark sequence W generated in step (3)iEmbedding into groups of primitives GiFront N ofrCan be embedded into the watermark vertex coordinates, i is 0,1, …, Ng-1; in the group of picture elements GiInto which its corresponding authentication watermark H is embeddediThen, obtaining the watermark-containing pattern group Gi w
(5) Marking the graphic primitive;
embedding a mark indicating the image group where the watermark-containing primitive is located in each primitive containing the watermark by using a vertex inserting method, wherein the inserted vertex is called as a position vertex, the corresponding primitive containing the mark is obtained after the mark is embedded in the primitive containing the watermark, the position vertex can be correctly identified according to the characteristics of the primitive containing the mark, and the primitive group where the position vertex is located is obtained; inserting a mark into each primitive to obtain a vector map containing the mark;
(6) watermark authentication and original data recovery;
according to the primitive marking and reversible information hiding method, vector map data are restored and positioned and tampered, and the specific steps are as follows:
(6.1) identifying an original graph group;
according to the characteristics of the marked primitives contained in the step (5), identifying the original primitive of each primitive group, and deleting the inserted position vertex;
(6.2) watermark extraction and original data recovery;
identifying the watermark-containing embeddable watermark vertex coordinates of the image group by using the embeddable watermark vertex coordinate judgment method in the step (1), extracting the watermark and recovering the original data of the vector map, and recovering the watermark-containing image group G after the data is recoveredi wIs marked as Gi',i=0,1,…,Ng-1, from Gi wThe watermark sequence extracted from the data is recorded asWi'={wi,j'|wi,j'=0,1,…,2c–1,j=0,1,…,Nr-1}, using the following formula, W is expressedi' conversion to binary sequence Hi'={hi,j'|hi,j'∈{0,1},j=0,1,…,L–1},
(6.3) generating an authentication watermark;
and (4) generating the authentication watermark of each pixel group after the data is recovered by using the method in the step (3), wherein the authentication watermark is assumed to be a pixel group Gi' authentication watermark generated is Hi”={hi,j”|hi,j”∈{0,1},j=0,1,…,L–1},i=0,1,…,Ng–1;
(6.4) watermark authentication;
according to the group of drawing cells Gi' the extracted watermark Hi' and the generated watermark Hi”,i=0,1,…,Ng-1, determining whether the group of primitives has been tampered with, if Hi'=Hi", the group has not been tampered with; otherwise, the group is tampered; and after the integrity of each primitive group is verified, displaying all tampered primitives.
2. The tag-based vector map integrity authentication method of claim 1, wherein: suppose PjComprising u vertices V1(x1,y1),V2(x2,y2),…,Vu(xu,yu),Vm(xm,ym) And m is 1,2, …, u represents PjM-th vertex of (2), xmAnd ymRespectively being vertex VmThe x-coordinate and the y-coordinate of (c),andare respectively line drawing element PjThe maximum value and the minimum value of the middle x coordinate, and the judgment vertex VmX coordinate x ofmThe method for determining whether the watermark vertex coordinates can be embedded comprises the following specific steps:
(1.1) mixingAndis equally divided intoThe length of the section is equal to the length of the section,
wherein,the length of each of the segments is represented,the value of (a) should satisfy the following conditions,
in the formula, tau is the precision error tolerance of the vector map M;
(1.2) according to the length of each segmentCalculating the boundary end point of the segment where the coordinate xm is positioned,
in the formula,denotes the coordinate xmThe value of the index of the segment in which it is located,andrespectively representing a defined coordinate xmThe left end point and the right end point of the boundary of the segment range arexmAndviewed as a space
(1.3) if xmThe following conditions are satisfied,
scale xmAre embeddable watermark vertex coordinates.
3. The tag-based vector map integrity authentication method of claim 1, wherein: the method for dividing the graph element group comprises the following specific steps:
(2.1) mixingDivision of line primitives into primitive groups G0In (1),to satisfy the minimum positive integer of the following relationship,
(2.2) according to the method of step (2.1), dividing the remaining primitives into groups in sequence, i.e. for any primitive Gi,i>0, select from the remaining primitivesThe line-line primitives are taken as its members,to satisfy the minimum positive integer of the following relationship,
delta is a group of picture elements G0To the group of picture elements Gi-1Number of all primitives in, i.e.
(2.3) since the primitives are divided into groups in sequence, the last group of primitives may not provide enough embedding space, at which point the last group of primitives is divided into the penultimate group.
4. The tag-based vector map integrity authentication method of claim 1, wherein: generating authentication watermark HiThe method comprises the following steps:
Hi=gro uphash(hash(I(Gi),k,i,Vi,Min),L,K)
where I (-) denotes a method of acquiring spatial data and attribute data, k denotes a private key for generating a hash (-) input parameter, I ═ 0,1, …, Ng–1,ViGroup of pictures GiNumber of vertices, MinAn index value representing the vector map, hash (·) representing an existing cryptographic hash algorithm, grouhash (H)i aL, K) tableFrom bit sequence H under control of private key Ki aA method of selecting L bits; method I (-) obtaining tuple GiThe group of primitive vertices are scanned as follows: scanning G in sequence according to the storage sequence of the graphics primitivesiLine drawing elements of, i.e. from PGi,1Scan toIn each line element, scan from the first vertex to the last vertex.
5. The tag-based vector map integrity authentication method of claim 1, wherein: said interval QmThe state values of (a) are defined as follows: suppose embeddable watermark vertex coordinate xmCorresponding to an interval ofWill QmEqually divided into P sub-intervals, P is more than or equal to 2, xmThe index value of the sub-interval is the interval QmThe state value of (2).
6. The tag-based vector map integrity authentication method of claim 1, wherein: suppose that the coordinate x of the vertex of the embeddable watermarkmIn which the embedded watermark is wi,jThe specific steps of watermark embedding are as follows:
(4.1) calculating the Interval QmThe state of (a) is (b),
(4.2) mixing QmAverage score of 2c+1Subinterval, calculating interval QmCorresponding watermark-containing spaceS, i.e. xm' the index value of the sub-interval in which,
s=2c×r+wi,j
(4.3) calculating the coordinate x of the water markm',
Wherein,
CN201510883547.5A 2015-12-03 2015-12-03 A kind of map vector completeness certification method based on label Active CN105488434B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510883547.5A CN105488434B (en) 2015-12-03 2015-12-03 A kind of map vector completeness certification method based on label

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510883547.5A CN105488434B (en) 2015-12-03 2015-12-03 A kind of map vector completeness certification method based on label

Publications (2)

Publication Number Publication Date
CN105488434A CN105488434A (en) 2016-04-13
CN105488434B true CN105488434B (en) 2018-11-02

Family

ID=55675406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510883547.5A Active CN105488434B (en) 2015-12-03 2015-12-03 A kind of map vector completeness certification method based on label

Country Status (1)

Country Link
CN (1) CN105488434B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106056528A (en) * 2016-05-31 2016-10-26 华中科技大学 Engineering drawing copyright protection and modification positioning method
CN106599727B (en) * 2016-12-02 2019-01-25 江苏师范大学 A kind of map vector completeness certification method
CN107154011B (en) * 2017-03-21 2020-09-15 江苏师范大学 Vector map integrity authentication method for positioning tamper map group
CN106886973B (en) * 2017-03-21 2020-06-02 江苏师范大学 Vector map integrity authentication method for positioning tampered area
CN111510672A (en) * 2020-03-19 2020-08-07 西安电子科技大学 Video tampering recovery processing method, system, storage medium and encoder
CN113051357B (en) * 2021-03-08 2022-09-30 中国地质大学(武汉) Vector map optimization local desensitization method based on game theory

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903217A (en) * 2014-03-28 2014-07-02 哈尔滨工程大学 Vector map integrity authentication method based on vertex insertion

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0119629D0 (en) * 2001-08-10 2001-10-03 Cryptomathic As Data certification method and apparatus

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903217A (en) * 2014-03-28 2014-07-02 哈尔滨工程大学 Vector map integrity authentication method based on vertex insertion

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates;王娜娜等;《Computer-Aided Design》;20141231;第108-117页 *
Reversible fragile watermarking for locating tampered blocks in 2D vector maps;王娜娜等;《Multimed Tools Appl》;20130119;第709-739页 *

Also Published As

Publication number Publication date
CN105488434A (en) 2016-04-13

Similar Documents

Publication Publication Date Title
CN105488434B (en) A kind of map vector completeness certification method based on label
Wang et al. Reversible fragile watermarking for 2-D vector map authentication with localization
CN108961141B (en) Vector map double zero watermarking method, system, storage medium and server
Ma et al. Local geometric distortions resilient watermarking scheme based on symmetry
JP5654434B2 (en) Method and apparatus for embedding watermark image in host image
CN102110281B (en) Method for embedding and extracting watermarks by adopting difference expansion aiming at shape point map layer data
CN103325081B (en) Insertion and extracting method based on spatial domain image digital watermark
Wu et al. Reversible watermarking of 3D mesh models by prediction-error expansion
CN106599727B (en) A kind of map vector completeness certification method
Neyman et al. Reversible fragile watermarking based on difference expansion using manhattan distances for 2d vector map
CN108470318B (en) Three-dimensional grid double watermarking method based on grouping strategy and neighborhood relation positioning
CN103903217A (en) Vector map integrity authentication method based on vertex insertion
Wang et al. RST invariant fragile watermarking for 2D vector map authentication
CN111242825B (en) Water depth feature-based ENC electronic nautical chart zero-watermarking method
CN117150456A (en) Vector geographic data exchange password watermarking method, device and medium
CN116805069A (en) Track data zero watermark generation method, track data zero watermark detection device and storage medium
CN107154011B (en) Vector map integrity authentication method for positioning tamper map group
Jan et al. An improved data hiding method using image interpolation
CN113628091B (en) Safety information extraction method and device for electronic display screen content reproduction scene
CN114387167A (en) Robust image steganography method for resisting interpolation scaling attack
CN112561767B (en) Screen shooting watermark resisting method for CAD engineering drawing
CN114565500A (en) Reversible image authentication method and system based on prediction error expansion
Fang et al. Image Watermarking Resisting to Geometrical Attacks Based on Histogram
Thayananthan et al. Fragile watermarking based on linear cellular automata using manhattan distances for 2D vector map
CN105550970B (en) A kind of map vector reversible information hidden method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200424

Address after: 221416 e-commerce Incubation Park, ban Shenshan village, Beigou street, Xinyi City, Xuzhou City, Jiangsu Province

Patentee after: Xuzhou Shenshan Intelligent Technology Co., Ltd

Address before: 221000 Shanghai Road, Copper Mt. District, Jiangsu, No. 101, No.

Patentee before: Jiangsu Normal UNIVERSITY