期刊文献+

基于脆弱水印的轨迹数据篡改检测方法

Tampering detection of trajectory data based on fragile watermarking
下载PDF
导出
摘要 轨迹数据是导航与位置服务系统的核心,是一种重要的数据资源。为验证轨迹数据的完整性,检验轨迹数据是否被篡改,提出一种基于脆弱水印的轨迹数据篡改检测方法。该方法包括水印嵌入算法和水印检测算法,其中水印嵌入算法和水印检测算法分别由组水印和轨迹点水印算法组成。嵌入水印时,首先将轨迹数据按照分组时间分为若干个组,然后将由组标识生成的组水印和由轨迹点坐标生成的轨迹点水印分别嵌入到轨迹点坐标的最低有效位与次最低有效位。水印检测时,首先分别对轨迹数据进行组水印和轨迹点水印检测,然后通过水印验证向量的结果来判定轨迹数据的完整性,最后统计篡改检测率并评估算法的脆弱性。结果表明,当轨迹数据以不同的分组和篡改幅度篡改时,其修改检测率均大于99%,而且该算法可以定位数据篡改并识别篡改类型,最后通过实验验证了这一点。该方法可为同类轨迹数据篡改检测算法的设计提供参考。 Trajectory data is the important infras tructure of Navigation and location service system, and is an important data resource. In order to verify the integrity of trajectory data and determine whether the trajectory data is tampered or not, a fragile watermarking scheme is proposed.The fragile watermarking scheme includes watermark embedding algorithm and watermark detection algorithm. The watermark embedding algorithm and the watermark detection algorithm are composed of the group algorithm watermark and the track point watermark algorithm respectively. When embedding watermark,first of all the trajectory data is divided into several groups by the group time, then trajectory point coordinates of least significant bit and next least significant bit are embedded by group watermark generated by group identification and the trajectory point watermark generated by a group of trajectory point coordinates. Watermark detection algorithm consists of group watermark detection algorithm and trajectory points watermark detection algorithm. When detecting the watermark, first of all the integrity of trajectory data can be verified by the watermark verification vector's result pattern, and then according to the result of watermark verification vector the detection rate can be revised and the vulnerability of the watermarking algorithm can be evaluated. The results demonstrate that when the trajectory data is tampered with by different group and tamper amplitude, all the modified detection rates are greater than 99%. What's more, the modifications made to trajectory points can be detected and localized,which is also checked by the experimental results. This method can provide a reference for the design of similar methods for trajectory data tamper detection.
作者 文春雷 汪传建 余晓平 王伟强 Wen Chunlei Wang Chuanjian Yu Xiaoping Wang Weiqiang(College of Information Science and Technology, Shihezi University, Shihezi, Xinjiang 832003, China Geospatial Information Engineering Research Center, Xinjiang Production and Construction Corps, Shihezi, Xinjiang 832000, China Geospatial Information Engineering Laboratory, Xinjiang Production and Construction Corps, Shihezi, Xinjiang 832003, China)
出处 《石河子大学学报(自然科学版)》 CAS 2017年第3期391-396,共6页 Journal of Shihezi University(Natural Science)
基金 国家自然科学基金项目(61262021 41361083)
关键词 轨迹数据 脆弱水印 数据完整性 篡改定位 篡改类型识别 trajectory data fragile watermarking data integrity locating tampering position identifying tampering type
  • 相关文献

参考文献5

二级参考文献70

  • 1朱长青,王奇胜.脆弱水印技术及其在矢量地理数据更新中的应用[J].测绘通报,2012(S1):687-689. 被引量:1
  • 2赵伟.中心城市功能与武汉城市圈发展[J].武汉大学学报(哲学社会科学版),2005,58(3):300-305. 被引量:30
  • 3潘晓,肖珍,孟小峰.位置隐私研究综述[J].计算机科学与探索,2007,1(3):268-281. 被引量:65
  • 4朱长青,杨成松,李中原.一种抗数据压缩的矢量地图数据数字水印算法[J].测绘科学技术学报,2006,23(4):281-283. 被引量:34
  • 5杨成松,朱长青.基于小波变换的矢量地理空间数据数字水印算法[J].测绘科学技术学报,2007,24(1):37-39. 被引量:23
  • 6Gruteser M, Grunwald D. Anonymous usage of locationbased services through spatial and temporal cloaking//Proceedings of the 1st International Conference on Mobile Sys tems, Applications, and Services (MobiSys 2003). San Fransisco, 2003: 31 -42.
  • 7Mokbel M F, Chow C Y, Aref W G. The newcasper: Query processing for location services withoutcompromising privacy//Proceedings of the 32nd Conference of Very Large Databases (VLDB 2006). Seoul, 2006: 763-774.
  • 8Bamba B, Liu L. Supporting anonymous location queries in mobile environments with privacy grid//Proceeding of the 17th International Conference on World Wide Web (WWW 2008). Beijing, 2008:237-246.
  • 9Pan X, Meng X, Xu J. Distortion-based anonymity for continuous queries in location-based mobile services//Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (GIS 2009). Washington, 2009:256-265.
  • 10Krumm J. A survey of computational location privacy. Personal and Ubiquitous Computing, 2009, 13(6): 391-399.

共引文献209

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部