期刊文献+

基于弱水印的地理数据篡改检验方法 被引量:3

Fragile Watermarking Scheme for Checking the Tamper of Geographical Data
下载PDF
导出
摘要 为验证地理数据的真实性、完整性,检验地理数据是否被篡改,提出一种基于弱水印的地理数据篡改检验方法.该方法包括水印嵌入算法和水印检测算法,其中水印嵌入算法采用"两次水印"的方式将组水印和元组水印这两种弱水印信息隐藏到地理数据中.水印检测算法分别进行组水印检测和元组水印检测,然后根据两次水印检测结果所呈现的模式来判定地理数据的完整性,对于不完整或被篡改的数据,可对被篡改的数据进行定位,并识别数据篡改的类型.实验结果表明,该方法具有良好的脆弱性,对常见的数据篡改非常敏感. To check the tamper of geographical data, we propose a fragile watermarking scheme. The fragile watermarking scheme con- sists of two components: watermark embedding algorithm and watermark detection algorithm. In the watermark embedding algorithm, group watermark and tuple watermark are embedded into the geographical data. The watermark detection algorithm consists of group watermark detection and tuple watermark detection. From the result scheme of group and tuple watermark detection, database owners can verify the integrity of geographical data, and localize and characterize any modifications made to tuples. Experimental results show that the method is very fragile, and is very sensitive to the typical tampers such as deletion, insertion and alteration of one or several geographical objects.
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第12期2628-2632,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61262021 31260291)资助
关键词 地理数据 弱水印 数据完整性 篡改定位 篡改类型识别 geographical data fragile watermarking scheme data integrity tamper localization tamper type identification
  • 相关文献

参考文献11

  • 1Guo Hui-ping , Li Ying-jiu , Liu An-yi , et al. A fragile watermarking scheme for detecting malicious modifications of database relations[J]. Information Sciences,2006,176(10) :1350-1378.
  • 2FridrichJ, Du M. Images with self-correcting capabilities[C] . Proc. of the IEEE Int. Conf. on Image Processing, Piscataway, NJ : IEEE, 1999: 792-796.
  • 3FridrichJ ,Goljan M, Du M. Invertible authentication[C] . Proc. of SPIE, Security and Watermarking of Multimedia Contents, SPIE, 2001: 197-208.
  • 4Lu C, Liao H, Chen L. Multipurpose audio watermarking[C] . Proc.15th Int. Conference on Pattern Recognition,2000:282-285.
  • 5Chen M, He Y, Lagendijk R. A fragile watermark error detection scheme for wireless video communications[J] , IEEE Trans. On Multimedia ,2003 ,8 :315-329.
  • 6Bhattacharya S ,Cortesi A. Database authentication by distortion-free watermarking[C] . Proceedings of the 5 th International Conference on Software and Data Technologies,NSTICC Press,2010:219-226.
  • 7Li Y ,Guo H P,Jajodia S. Tamper detection and localization for categorical data using fragile watermarks[C] . Proceedings of the 4 th ACM Workshop on Digital Rights Management ( DRM'04) .Washington,DC,USA. ACM Press,2004:73-82.
  • 8Kamel I. A schema for protecting the integrity of databases[J] . Computers & Security ,2009 ,28(7) :698-709.
  • 9KbataeimaraghebH, Rashidi Hassan. A novel watermarking scheme for detecting and recovering distortions in database tables[J] . InternationalJournal of Database Management Systems ,2010,2(3) :1-11.
  • 10Niu Xia-mu , et al. GIS watermarking: hiding data in 2D vector maps[J]. Studies in Computational Intelligence ,2007 ,58,123-155.

二级参考文献22

  • 1Cox I, Kilian J, Leighton T, et al. Secure spread spectrum watermarking for multimedia [J]. IEEE Trans on Image Processing, 1997, 6(12): 1673-1687.
  • 2Chen B, Gregory W W. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J]. IEEE Trans on Information Theory, 2001, 47(4): 1423-1443.
  • 3Kang H I I, Kim K I, Choi J U. A vector watermarking using the generalized square mask [C] //Proc of Int Symp on Information Technology : Coding and Computing. Piscataway, NJ: IEEE, 2001: 234-236.
  • 4Schulz G, Voigt M. A high capacity watermarking system for digital maps [C] //Proc of MM&Sec'04. New York: ACM, 2004: 180-186.
  • 5Ohbuchi R, Ueda H, Endoh S. Robust watermark of vector digital maps [C] //Proc of ICME'02. Los Alamitos, CA:IEEE Computer Society, 2002, 477-480.
  • 6Bazin C, Le Bars J M, Madclaine J. A Blind, Fast and robust method for geographical data watermarking [C]//Proc of ACM Symp on Information, Computer and Communications Security. New York: ACM, 2007:265-272.
  • 7Pu Y C, Jou I C. Blind and robust watermarking for street- network vector maps [J]. Information Technology Journal, 2010, 8(7): 982-989.
  • 8Shao Chengyong, Wang Hailong, Niu Xiamu, et al. A shape-preserving method for watermarking 2D vector maps based on statistic detection [J]. IEICE Trans on Information and Systems, 2006, E89 D(3):1290-1293.
  • 9Wang Chuanjian, Peng Zhiyong, Peng Yuwei, et al. Watermarking 2D vector maps on spatial topology domain [C] //Proc of the 2009 Int Conf on Multimedia Information Networking and Security. Piseataway, NJ: IEEE, 2009: 71- 74.
  • 10Wu Baiyan, Wang Wei, Miao Dandan. 2D vector map watermarking based on the spatial relations [C] //Proc of Int Conf on Earth Observation Data Processing and Analysis. Bellingham: SHE Press, 2008:1-7.

共引文献3

同被引文献14

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部