Authentication of gis vector data based on zero-watermarking
Anbo Li,Bingxian Lin,Guonian Lü
2008-01-01
Abstract:GIS vector data is closely linked with the development of social economy and national defense, which is of high production cost and high precision, so the copyright protection of GIS vector data means a great deal and the copyright authentication of GIS vector data has become an increasingly complex topic. In recent years, researches about copyright protection of GIS vector data mainly focuses on copyright marking techniques delegated by watermarking, but it seems like the traditional watermarking are incapability. In this paper, a new copyright authentication method is presented. The watermark signal is constructed utilizing the original data's macroscopical topology characteristics and microcosmic topology characteristics, and then it is registered to authority organ for notarization and authentication. This method is applied to topography map, and the experiment results show that this method can avoid data distortion bringing by watermark embedding and can resolve conflict between imperceptibility and robustness of digital watermark. * Anbo Li. 1. INTRODUCTIOIN Geospatial data is a kind of strategic information resource and is widely used in economic, social and environmental applications. GIS vector data is closely related to the overall situation of socio-economic development and national security attributed to its high production cost and high precision characteristics. The issue on copyright protection makes significant sense to the construction of GIS digital production copyright protection system, the legislation draft on copyright protection, the construction of national information security, as well as the healthy development of geographic information system, electronic navigation, digital city and other geographic information industries. In recent years, researches about copyright protection of GIS vector data mainly focuses on copyright marking techniques delegated by watermarking. Copyright marking techniques allows user to embed auxiliary information into digital productions and the information embedded are imperceptible during normal use but could be readable by using some detection software. Copyright marking techniques are complementary approaches of encryption techniques, and it could maintain protection function even after the encrypted content is decrypted. Copyright protection techniques are used for copyright authentication, content secrecy and access control based on copyright markings. The single copyright marking technique is used for copyright authentication, and it hardly reaches the multiple copyright protection aims, but it is the necessary and precondition of copyright protection. The possibility of using copyright marking technologies for ensuring the security of data is intriguing and therefore put forward the researches on copyright marking technologies. In the last ten years, various copyright marking algorithms have been proposed. However, there are a few copyright marking algorithms for GIS vector data and they can be summed up to transform domain methods, frequency domain methods and space domain methods (Zhong Shangping, 2006). Kitamura I (2001) proposed a watermarking method for the vector map, where the watermark could be embedded in a set of polylines by using discrete Fourier transform (DFT); Solachidis V extracted vertex coordinates from vector data, and then embedded the information to DFT coefficient of these vertex coordinates, but this method might cause data distortion; Ohbuchi R (2002) proposed a digital watermarking algorithm for vector digital maps, and a watermark bit is embedded by displacing an average of coordinates of a set of vertices that lies in a rectangular area created on a map by adaptively subdividing the map; Li Yuanyuan (2004) improved Ohbuchi’s method, and in the algorithm presented, the strength of watermark is adaptively modulated according to the classification of density of vertices in each blocks, and a twovalue watermark image is embedded repeatedly by displacing the coordinates of vertices; Kutter proposed the secondgeneration of watermarking technology, the perceptive character are used for watermark embedding to enhance the robustness. Ohbuchi R (2003) treats vertices in the map as a point set, and imposes connectivity among the points by using Delaunay triangulation, and then computes the mesh-spectral coefficients from the mesh created. Modifications of the coefficients according to the message bits, and inverse transforming the coefficients back into the coordinate domain produces the watermarked map. Wang Xun (2004) presented a double embedded robust watermark scheme for vector digital mapping, as an extension to the MQUAD algorithm. The vector map is subdivided into two layers by the character of objects in the map, and a watermark bit is embedded by two different methods in two layers of the same map. Zhang Haitao (2004) probed into the issue of watermark attack from the aspects of