期刊文献+

矢量地图的无损数据隐藏算法研究 被引量:23

Study on Lossless Data Hiding Algorithm for Digital Vector Maps
下载PDF
导出
摘要 在矢量地图中隐含水印信息,地图数据的质量往往由于水印的嵌入而受到影响。可逆水印技术(又称无损数据隐藏)具有完整恢复载体数据的能力,因而更加适用于矢量地图。基于差值扩大的思想,提出了一种应用于矢量地图的无损数据隐藏算法。算法根据矢量地图对数据精度的特殊要求提出了相应的水印嵌入条件,并通过修改地图中相邻顶点坐标间的差值来嵌入水印信息。水印的提取过程不仅能够得到隐藏信息,而且能够准确无误地恢复原始地图数据。采用两类地图进行实验,实验结果表明,算法在具有较强坐标相关性的地图中具有较高的嵌入容量,并且引入较低的扰动。算法的应用前景包括矢量地图数据的篡改鉴别、元数据格式兼容以及基于矢量地图的隐藏通信。 Embedding watermark in a digital vector map could generally degrade the quality of the map data. However, invertible watermarking(or lossless data hiding) is more appropriate to vector maps for its ability to recover the original cover data. A lossless data hiding algorithm for digital vector maps based on difference expansion is proposed in this paper. According to the vector map' s special requirement to data precision, an embedding condition is firstly presented. The watermark can be embedded by modifying the coordinate differences between the adjacent vertices and the original map can be recovered bit-by-blt after the watermark has been extracted. Two kinds of original maps are used in the experiments and the results indicate that higher payload and lower distortions could be achieved in the maps with higher correlated coordinates. The potential usages of the proposed scheme would include the map data authentication, meta data format compatibility, and secret communication based on vector maps.
出处 《中国图象图形学报》 CSCD 北大核心 2007年第2期206-211,共6页 Journal of Image and Graphics
基金 国家自然科学基金项目(60473141)
关键词 矢量地图 无损数据隐藏 差值扩大 信息载荷 vector map, lossless data hiding, difference expansion, payload
  • 相关文献

参考文献15

  • 1Ohbuchi R,Ueda H,Endoh S.Robust watermarking of vector digital maps[A].In:Proceedings of IEEE International Conference on Multimedia and Expo (ICME'02)[C],Lausanne,Switzerland,2002:577 - 580.
  • 2Voigt M,Busch C.Feature-based watermarking of 2d-vector data[A].In:Proceedings of SPIE,Security and watermarking of Multimedia Content[C],Santa Clara,USA,2003:359 - 366.
  • 3Nikolaidis N,Pitas I,Solachidis V.Fourier descriptors watermarking of vector graphics images[A].In:Proceedings of International Conference on Image Processing[C],Vancouver,BC,Canada,2000:9 -12.
  • 4LI Yuan-yuan,XU Lu-ping.A blind watermarking of vector graphics images[A].In:Proceedings of Fifth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA2003)[C],Xi'an,P.R.China,2003:424 -429.
  • 5Honsinger C W,Jones P,Rabbani M,et al.Lossless Recovery of an Original Image Containing Embedded Data[P].US Patent:77102/E-D,1999.
  • 6Fridrich J,Goljan J,Du R.Invertible authentication[A].In:Proceedings of SPIE,Security and Watermarking of Multimedia Content[C],San Jose,California,2001:197 -208.
  • 7Ni Z,Shi Y Q,Ansari N,et al.Reversible data hiding[A].In:Proceedings of International Symposium on Circuits and Systems (ISCAS2003)[C],Bangkok,Thailand,2003:912 - 915.
  • 8Leest A,Veen M,Bruekers F.Reversible image watermarking[A].In:Proceedings of IEEE International Conference on Image Processing(ICIP03)[C],Barcelona,Spain,2003:731 - 734.
  • 9Tian J.Reversible watermarking by difference expansion[A],In:Proceedings of Workshop on Multimedia and Security:Authentication,Secrecy,and Steganalysis[C],Juan-les-pins,France,2002:19 - 22.
  • 10Voigt M,Yang B,Busch C.Reversible watermarking of 2d-vector data[A].In:Proceedings of the 2004 multimedia and security workshop on Multimedia and security[C],Magdeburg,Germany,2004:160 - 165.

二级参考文献31

  • 1Gong L, Qian X. The complexity and composability of secure interoperation [A] In.- Proceedings of the IEEE Symposium on Research in Security and Privacy [C], Oakland, California,USA, 1994:190-200.
  • 2Matheson L R, Mitchell S G, Shamoon T G, et al. Robustness and Security of Digital Watermarks [A]. In: Proceedings of Financial Cryptography Secod International Conference '98, of Lecture Notes in Computer Science[C], Anguilla, British West Indies, 1998,1465:227-240.
  • 3Ping Wah Wong. A public key watermark for image verification and authentication [A]. In t International Conference on Image Processing[C], Chicago Illinais, USA,1998:445-459.
  • 4Ohbuchi R,Ueda H,Endoh S.Robust Watermarking of Vector Digital Maps[A].Proc ICME2002[C].Lausanne: IEEE Computer Society Press,2002.26-29.
  • 5Solachidis V,Nikolaidisand N,Pitas I.Watermarking Polygonal Lines Using Fourier Descriptors[A].Proc ICASSP2000[C].Istanbul: IEEE Computer Society Press,2000,1955-1958.
  • 6Kitamura I,Kanai S,Kishinami T.Watermarking Vector Digital Map Using Wavelet Transformation[A].Proc Annual Conference of the Geographical Information Systems Association(GISA): Vol 9[C].Japan: [s.n.],2000.417-421.
  • 7Kutter M,Bhattachacharjee S K,Ebrahim T.Towards Second Generation Watermarking Schemes[A].Proc ICIP1999[C].Kobe: IEEE Computer Society Press,1999.320-323.
  • 8Cox G S, de Jager G. A survey of point pattern matching techniques and a new approach to point pattern recognition[A]. In: Proceedings of Symposium on Communication and Signal Processing, Lesotho, 1993. 243~248
  • 9Johnson Neil F, Duric Zoran, Jajodia Sushil. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures[M]. Portland: Kluwer Academic Publishers, 2000
  • 10Kurihara M, Komatsu N, Arita H. Watermarking vector digital maps[R]. Tokyo: Information Processing Society of Japan, Computer Security No.009-1, 2000

共引文献62

同被引文献175

引证文献23

二级引证文献61

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部