Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data
Abstract
:1. Introduction
2. Methodology
2.1. Multiple Sorting Mechanisms
2.2. Floating-Point Number and Watermark Embedding Position
2.3. Watermark Information Generation
2.4. Watermark Information Embedding
2.5. Watermark Information Extraction and Authentication
2.5.1. Addition Attack Authentication
2.5.2. Deletion Attack Authentication
3. Experiments
3.1. Datasets
3.2. Experiment Design and Implementation
3.2.1. Comparison Algorithm
3.2.2. Imperceptibility
3.2.3. Addition Attacks
3.2.4. Deletion Attacks
- Detection Coverage Area Rate (DCAR): This metric quantifies the relative size of the detection area, called the Detection Coverage Area (DCA), as a proportion of the area of the minimum bounding polygon of the original dataset. A lower DCAR indicates a more precise detection;
- Detection Coverage Rate (DCR): This metric represents the proportion of the actual deleted points that fall within the DCA. A higher DCR implies that the algorithm successfully covers more of the deleted points.
4. Results and Analyses
4.1. Results of Imperceptibility
4.2. Authentication Results of Addition Attacks
4.3. Authentication Results of Deletion Attacks
5. Discussion
5.1. Limitation and Extension
5.2. Combination Attacks
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Tareef, A.; Al-Tarawneh, K.; Sleit, A. Block-Based Watermarking for Robust Authentication and Integration of GIS Data. Eng. Technol. Appl. Sci. Res. 2024, 14, 16340–16345. [Google Scholar] [CrossRef]
- Ren, N.; Guo, S.; Zhu, C.; Hu, Y. A Zero-Watermarking Scheme Based on Spatial Topological Relations for Vector Dataset. Expert Syst. Appl. 2023, 226, 120217. [Google Scholar] [CrossRef]
- Qiu, Y.; Sun, J.; Zheng, J. A Self-Error-Correction-Based Reversible Watermarking Scheme for Vector Maps. ISPRS Int. J. Geo-Inform. 2023, 12, 84. [Google Scholar] [CrossRef]
- Dai, Q.; Wu, B.; Liu, F.; Bu, Z.; Zhang, H. Commutative Encryption and Reversible Watermarking Algorithm for Vector Maps Based on Virtual Coordinates. ISPRS Int. J. Geo-Inform. 2024, 13, 338. [Google Scholar] [CrossRef]
- Tantriawan, H.; Munir, R. Watermarking Study on The Vector Map. Indones. J. Artif. Intell. Data Min. 2023, 6, 84. [Google Scholar] [CrossRef]
- Wang, S.; Zhang, L.; Zhang, Q.; Li, Y. A Zero-Watermarking Algorithm for Vector Geographic Data Based on Feature Invariants. Earth Sci. Inform. 2023, 16, 1073–1089. [Google Scholar] [CrossRef]
- Qu, C.; Du, J.; Xi, X.; Tian, H.; Zhang, J. A Hybrid Domain-Based Watermarking for Vector Maps Utilizing a Complementary Advantage of Discrete Fourier Transform and Singular Value Decomposition. Comput. Geosci. 2023, 183, 105515. [Google Scholar] [CrossRef]
- Herrera Montano, I.; García Aranda, J.J.; Ramos Diaz, J.; Molina Cardín, S.; de la Torre Díez, I.; Rodrigues, J.J.P.C. Survey of Techniques on Data Leakage Protection and Methods to Address the Insider Threat. Clust. Comput. 2022, 25, 4289–4302. [Google Scholar] [CrossRef]
- Rawal, D.; Amaduzzi, S.; Seedorf, J. Crypto-Spatial: A New Direction in Geospatial Data. Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 2024, XLVIII-5-2024, 89–96. [Google Scholar] [CrossRef]
- Buccafurri, F.; De Angelis, V.; Lazzaro, S.; Pugliese, A. Enforcing Security Policies on Interacting Authentication Systems. Comput. Secur. 2024, 140, 103771. [Google Scholar] [CrossRef]
- Onoja, G.U. Robust Watermarking Techniques for the Authentication and Copyright Protection of Digital Images: A Survey. SLU J. Sci. Technol. 2023, 6, 100–112. [Google Scholar] [CrossRef]
- Abubahia, A.; Cocea, M. Advancements in GIS Map Copyright Protection Schemes—A Critical Review. Multimed. Tools Appl. 2017, 76, 12205–12231. [Google Scholar] [CrossRef]
- Zheng, L.; You, F. A Fragile Digital Watermark Used to Verify the Integrity of Vector Map. In Proceedings of the 2009 International Conference on E-Business and Information System Security, Wuhan, China, 23–24 May 2009; pp. 1–4. [Google Scholar]
- Yuan, T.; Zhu, C.; Chen, H.; Ren, N.; Lyu, X. Fragile Watermarking Algorithm for High Precision Map of OpenDRIVE Format. Geomat. Inf. Sci. Wuhan Univ. 2024, 11, 1–14. [Google Scholar] [CrossRef]
- Penard, W.; van Werkhoven, T. On the Secure Hash Algorithm Family. In Cryptography in Context; Wiley: Hoboken, NJ, USA, 2008; pp. 1–18. [Google Scholar]
- Sefid-Dashti, B.; Sartakhti, J.S.; Daghigh, H. Brand New Categories of Cryptographic Hash Functions: A Survey. J. Electr. Comput. Eng. Innov. 2023, 11, 335–354. [Google Scholar] [CrossRef]
- Wali, A.; Ravichandran, H.; Das, S. A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures. Adv. Mater. 2024, 36, e2400661. [Google Scholar] [CrossRef]
- Rivest, R. The MD5 Message-Digest Algorithm. RFC 1321; Internet Engineering Task Force (IETF): Fremont, CA, USA, 1992. [Google Scholar] [CrossRef]
- Jasim, A.H.; Hammood, D.A.; Al-Askery, A. Design and Implementation Secure Hash Algorithm 3 (SHA-3) Using FPGA. In Proceedings of the 2023 Third International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India,, 5 January 2023; Volume 3, pp. 1–5. [Google Scholar]
- Devi, S.S.; Jayasri, K. Esha-256: An Enhanced Secure Cryptographic Hash Algorithm for Information Security. In Proceedings of the 2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS), Pudukkottai, India, 11–13 December 2023; pp. 952–958. [Google Scholar]
- Butt, U.A.; Amin, R.; Mehmood, M.; Aldabbas, H.; Alharbi, M.T.; Albaqami, N. Cloud Security Threats and Solutions: A Survey. Wirel. Pers. Commun. 2023, 128, 387–413. [Google Scholar] [CrossRef]
- Yu, Y.; Zhang, Y.; Yu, J.; He, X. An Overview of the Application and Development of Data Integrity Verification Techniques. In Proceedings of the Second International Conference on Applied Statistics, Computational Mathematics, and Software Engineering (ASCMSE 2023), Kaifeng, China, 23 August 2023; Batista, P., Zhang, Y., Eds.; SPIE: Bellingham, DC, USA; Volume 12784, p. 34. [Google Scholar]
- Wang, N. Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps. Int. J. Digit. Crime Forensics 2016, 8, 25. [Google Scholar] [CrossRef]
- Elsoud, M.W.A.; Melhim, L.B. A New Digital Watermarking Scheme of Content Authentication of Vector Maps. Am. J. Eng. Res. (AJER) 2017, 6, 404–409. [Google Scholar]
- Hou, X.; Min, L.; Yang, H. A Fragile Watermarking Scheme for Vector Map Data Using Geographic Graticule Block-Wise Method. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/J. Comput. Des. Comput. Graph. 2018, 30, 2042–2048. [Google Scholar] [CrossRef]
- HOU, X.; MIN, L.; TANG, L. Fragile Watermarking Algorithm for Locating Tampered Entity Groups in Vector Map Data. Geomat. Inf. Sci. Wuhan Univ. 2020, 45, 309–316. [Google Scholar] [CrossRef]
- Kozieł, G.; Malomuzh, L. 3D Model Fragile Watermarking Scheme for Authenticity Verification. Adv. Sci. Technol. Res. J. 2024, 18, 351–365. [Google Scholar] [CrossRef] [PubMed]
- Zheng, L.; Feng, L.; Chen, R.; Cheng, X. Research and Implementation of Fragile Watermark for Vector Graphics. Appl. Res. Comput. 2010, 28, 3820–3822. [Google Scholar] [CrossRef]
- Li, S.; Wang, H.; Zhou, W.; Li, A. Fragile Watermarking Based Integrality Authentication for GIS Vector Data. Bull. Surv. Mapp. 2013, 0, 101–105. [Google Scholar]
- Ren, N.; Wu, W.; Zhu, C. An Accurate Authentication Algorithm Based on Point Constraint Block for Vector Geographic Data. J. Geo-Inf. Sci. 2015, 17, 166–171. [Google Scholar]
- Hough, D. Applications of the Proposed IEEE 754 Standard for Floating-Point Arithetic. Comput. (Long. Beach. Calif). 1981, 14, 70–74. [Google Scholar] [CrossRef]
- Boldo, S.; Jeannerod, C.-P.; Melquiond, G.; Muller, J.-M. Floating-Point Arithmetic. Acta Numer. 2023, 32, 203–290. [Google Scholar] [CrossRef]
- Bugayevskiy, L.M.; Snyder, J.P. Map Projections: A Reference Manual; CRC Press: London, UK, 1995. [Google Scholar]
- Turiño, C.E. Gauss Krüger Projection for Areas of Wide Longitudinal Extent. Int. J. Geogr. Inf. Sci. 2008, 22, 703–719. [Google Scholar] [CrossRef]
- Ren, N.; Wang, H.; Chen, Z.; Zhu, C.; Gu, J. A Multilevel Digital Watermarking Protocol for Vector Geographic Data Based on Blockchain. J. Geovisualization Spat. Anal. 2023, 7, 31. [Google Scholar] [CrossRef]
- Zhou, Q.; Ren, N.; Zhu, C.; Zhou, Q. Zero Watermarking Algorithm for BIM Data Based on Distance Partitioning and Local Feature. Ann. GIS 2024, 30, 251–265. [Google Scholar] [CrossRef]
Indicators | Min Change in x | Max Change in x | Min Change in y | Max Change in y | Min Change in Distance | Max Change in Distance |
---|---|---|---|---|---|---|
Values/m | 6.98 × 10−10 | 7.03 × 10−6 | 4.19 × 10−9 | 2.97 × 10−5 | 4.00 × 10−8 | 2.97 × 10−5 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhou, Q.; Ren, N.; Zhu, C. Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data. Symmetry 2024, 16, 1626. https://doi.org/10.3390/sym16121626
Zhou Q, Ren N, Zhu C. Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data. Symmetry. 2024; 16(12):1626. https://doi.org/10.3390/sym16121626
Chicago/Turabian StyleZhou, Qifei, Na Ren, and Changqing Zhu. 2024. "Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data" Symmetry 16, no. 12: 1626. https://doi.org/10.3390/sym16121626
APA StyleZhou, Q., Ren, N., & Zhu, C. (2024). Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data. Symmetry, 16(12), 1626. https://doi.org/10.3390/sym16121626