Next Article in Journal
Gain-Scheduled Energy-to-Peak Approach for Vehicle Sideslip Angle Filtering
Previous Article in Journal
Robustness of the Proxy-SU(3) Symmetry in Atomic Nuclei and the Role of the Next-Highest-Weight Irreducible Representation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data

by
Qifei Zhou
1,
Na Ren
2,3,4,5,* and
Changqing Zhu
3,4,5
1
School of Geoscience and Technology, Zhengzhou University, Zhengzhou 450001, China
2
Hunan Engineering Research Center of Geographic Information Security and Application, Changsha 410017, China
3
Key Laboratory of Virtual Geographic Environment, Ministry of Education, Nanjing Normal University, Nanjing 210023, China
4
State Key Laboratory Cultivation Base of Geographical Environment Evolution (Jiangsu Province), Nanjing 210023, China
5
Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
Submission received: 13 November 2024 / Revised: 4 December 2024 / Accepted: 5 December 2024 / Published: 7 December 2024
(This article belongs to the Section Computer)

Abstract

:
Symmetry-breaking in security mechanisms can create vulnerabilities which attackers may exploit to gain unauthorized access or cause data leakage, ultimately compromising the integrity and security of vector geographic data. How to achieve tamper localization remains a challenging task in the field of data authentication research. We propose a precise authentication watermarking algorithm for vector geographic data based on multiple sorting mechanisms. During the watermark embedding process, a sequence of points is initially extracted from the original data, followed by embedding watermarks into each coordinate point. The embedded watermark information consists of the self-identification and ordering information of each coordinate point. Ordering information is crucial for establishing relationships among points and enhancing tamper localization. During the authentication phase, the extracted watermark information is compared with the newly generated watermark information. Self-identification information is used to authenticate addition attacks, while ordering information is used to authenticate deletion attacks. Experimental results demonstrate that the proposed algorithm achieves high precision in detecting and localizing both addition and deletion attacks, significantly outperforming the comparison method.

1. Introduction

Digital geospatial information products are increasingly integrated into our daily lives. Vector geographic data, characterized by its high precision, rich informational content, ease of storage, and suitability for automated processing, is widely utilized in various fields, including urban planning, environmental monitoring, and disaster management [1,2,3,4]. However, alongside its extensive application in the geographic information industry, data leakage and infringement incidents have become increasingly frequent, drawing attention to critical vulnerabilities in the security mechanisms protecting these data [5,6,7,8,9]. A major concern is the potential for symmetry-breaking within these security mechanisms, which can introduce exploitable vulnerabilities, allowing attackers to alter the data undetected. For example, interactions within federated authentication systems can propagate such vulnerabilities if dependency systems adopt weaker security measures, highlighting challenges in indirect authentication [10]. This can severely compromise data integrity, leading to erroneous decision-making and, in some cases, jeopardizing national security. Consequently, data authentication for vector geographic data has consistently remained a focal point of research due to its critical role in ensuring data integrity and reliability [11,12,13,14].
Existing data authentication algorithms can be divided into two categories. The first is the global authentication method. This type of method is generally inspired by cryptographic research findings and is foundational to many data security practices. Numerous cryptographic hash functions [15,16,17] are employed to create message digests, such as the family of secure hash algorithms [18,19,20]. These methods are easy to implement and have high accuracy, making them popular choices for various applications. However, the data and the hash values used for comparison are stored separately, leading to vulnerabilities that introduce a risk of tampering with the hash values used for comparison [21,22]. That is, an attacker could modify the data and then change the comparison hash value to match the hash of the modified data, effectively bypassing the authentication process.
The second category is the regional authentication method, which typically employs fragile watermarking [23,24,25,26,27]. It involves dividing the data into spatial blocks and embedding fragile watermarks in each block, thereby enabling precise block-level data authentication. The fragile watermark in these algorithms integrates seamlessly with the data, addressing the separation issue of data and hash values in the first category. For instance, the literature [28] divides vector geographic data into blocks based on the number of data points and embeds watermarks in them. This method verifies the integrity of vector data and locates tampering down to the block level. Reference [29], combining chaotic mapping techniques with vector data characteristics in GIS (Geographic Information System), proposed a fragile watermarking-based integrity authentication method for vector data. This method also effectively verifies the integrity of vector data and can determine the location and extent of tampering, but it is limited to block-level localization. Reference [30] proposed a point-constrained, block-based precise verification algorithm for vector geographic data. In the authentication process, it uses point constraints to divide vector geographic data into blocks and sorts each block to establish relationships between features. However, the block division results are highly susceptible to deletion attacks. It is apparent that the main limitation of these algorithms is that they can only localize blocks, which is not precise enough.
In summary, leveraging cryptographic research, the global authentication algorithm is easy to implement but risks data and hash value tampering. Regional authentication algorithms using fragile watermarking technology eliminate the former’s risk, but can only localize to the block level, which may not be sufficient for scenarios requiring precise data integrity checks. The point is the smallest unit of presentation in vector geographic data. Therefore, the question of how to use fragile watermarking to establish connections between points is a scientific problem.
To address these issues, this paper introduces a novel fragile watermarking authentication algorithm based on multiple sorting mechanisms. Leveraging the IEEE 754 structure [31,32] of double-precision floating-point numbers, it uncovers more watermark embedding space, facilitating the establishment of connections between points. Section 2 presents the fundamental concepts and specifics of the algorithm. The experiments are set up in Section 3. Following that, Section 4 offers the experimental results and analysis, while Section 5 engages in further discussions. Section 6 summarizes the findings.

2. Methodology

The framework of the algorithm proposed in this paper is illustrated in Figure 1. It primarily comprises two components: (1) watermark embedding and (2) watermark extracting and authentication. The process involves extracting a sequence of points from vector geographic data and embedding watermarks into each data point. The embedded watermark information includes self-identification and ordering information of the points. The self-identification information adds a unique identifier to each point, while the ordering information establishes connections among all points. Therefore, the self-identification information can determine whether a point has been subjected to an addition attack, and the ordering information can identify regions that have suffered deletion attacks.
Targeting ESRI Shapefile as the data format, storing point coordinates as double-precision floating-point numbers that provide potential space for embedding watermark information. This choice is particularly relevant given the widespread use of Shapefiles in GIS. However, the proposed algorithm is not constrained by the Shapefile format or any specific projection system. Since this method operates directly on the floating-point representation of coordinates (x, y) following the IEEE 754 standard, it is applicable to any vector geographic dataset containing floating-point coordinates. Furthermore, a projection system maps the (x, y) values from one coordinate system to another while preserving their floating-point type. Ordering information includes the sorting information of the x coordinates and y coordinates, which can confine the area of deleted points within a series of rectangular regions, thereby improving the algorithm’s effectiveness in tamper localization.

2.1. Multiple Sorting Mechanisms

The proposed algorithm employs multiple sorting mechanisms as a fundamental approach to improve the accuracy of tampering authentication in vector geographic data. Specifically, the multiple sorting mechanisms involve sorting the data points by x coordinates and y coordinates. These sorting processes constitute the foundation of the algorithm’s capability to authenticate deletion attacks.
In detail, after sorting the data points by their x coordinates, each point is embedded with information about the preceding point in the sorted sequence. Similarly, after sorting by y coordinates, each point also embeds information about the preceding point in the sorted sequence. This process establishes two chains of relationships: one in the x direction and the other in the y direction. When a point is deleted, both chains are disrupted at that location, enabling the algorithm to accurately detect and localize deletion attacks. Moreover, because disruptions occur simultaneously in both the x and y directions, their intersection naturally identifies the affected region, making the authentication of deletion attacks more accurate. This dual relationship forms the basis for the algorithm’s precise tampering authentication and represents a novel contribution to the field of vector geographic data security. Further details on the implementation of the multiple sorting mechanisms are elaborated in the subsequent subsections.

2.2. Floating-Point Number and Watermark Embedding Position

According to the IEEE 754 standard, the double-precision floating-point number consists of the sign, the exponent, and the fraction, occupying 1 bit, 11 bits, and 52 bits, respectively. This structure is fundamental for representing a wide range of values with high precision, making it ideal for geographic coordinate storage. In conjunction with analyzing the characteristics of vector geographic data, this paper uses the 1st to 16th bits of the fraction of x and y coordinates for watermark embedding. This approach ensures that the watermarking process does not significantly alter the original data representation. The structure of the floating-point number and the selection of watermark embedding positions are depicted in Figure 2.
The organization of Shapefile vector geographic data is fundamentally based on coordinate points, and different types of data arise from the various organizational rules for points. Each point contains at least x and y coordinates, stored as double-precision floating points. Vector geographic data have a certain accuracy tolerance when in use. Within the bounds of reasonable tolerance, the redundant space that does not affect data precision provides an opportunity for watermark embedding. Moreover, the choice of embedding within the floating-point representation minimizes the risk of noticeable distortion, ensuring that the embedded watermark remains imperceptible to end users and thus preserves the usability of the vector data for practical applications.

2.3. Watermark Information Generation

The generation of watermark information involves two primary components: self-identification information and sorting information. This paper calculates the self-identification information for each point using its own x and y coordinates. The self-identification information involves converting specific bits of the coordinates into a unique identifier for each point, which is vital for detecting addition attacks. Assuming the watermark length is N, the 17th to 52nd bits of the fraction of x and y coordinates are converted to uint64 integers, denoted as a and b, respectively. This conversion is essential for facilitating the manipulation of bits to embed watermark information effectively. The watermark information can be generated using the following formula:
w = m o d ( b i t x o r ( a , b ) , 2 N )
where m o d ( ) represents the modulo operation, and b i t x o r ( ) is the bitwise XOR operation. The value range of w is [0, 2 N −1]. When generating self-identification information, the watermark length N is set to 16. When generating sorting information, the watermark length N is set to 8. The process of generating watermark information ensures that each point retains a unique identification, which is vital for subsequent authentication phases.
Regarding addition attacks, the proposed method significantly improves the accuracy in detecting added points. This improvement is achieved by utilizing 16 bits for self-identification, embedding the information directly into the binary representation of the coordinates. In contrast, traditional methods, which often operate on textual representations and embed watermark information into specific decimal places, typically have a much lower watermark capacity (e.g., 1 bit per digit). Such limited capacity makes it challenging for these methods to achieve the precision of the proposed approach, which utilizes 216 unique possibilities for self-identification.

2.4. Watermark Information Embedding

The primary task of watermark information embedding is to embed the generated watermark information into the embedding position. For the x coordinate, its embedding position is used to embed 16-bit length self-identification information, while for the y coordinate, it is used to embed sorting information. This dual-purpose embedding approach optimizes the use of available bit space, maximizing the watermark’s effectiveness.
The embedding of sorting information involves sorting by x coordinates and y coordinates. Specifically, for the embedding position of y coordinates, the 1st to 8th bits are used to embed watermark information sorted by x, and the 9th to 16th bits are used to embed watermark information sorted by y. This embedding strategy differs significantly from traditional watermarking algorithms, which typically process coordinate values as text and embed watermark information into specific decimal places. Instead, the proposed algorithm embeds the watermark directly into the binary representation of coordinate values. This approach minimizes the impact of watermark embedding on the data’s precision. It is important to note that the watermark embedding process involves converting the watermark information into binary digits and replacing the corresponding bits in the floating-point representation of the coordinate values. This sorting mechanism is crucial, as it establishes a relational framework among the data points, enhancing the ability to detect any alterations. The embedding operation uses bit replacement. For a point (x, y), where its self-identification information is denoted as w 1 , then
x = b i t s e t x , 1 , 16 , w 1
where b i t s e t ( ) sets the bits at a range of specific bits, with the second and third parameters being the starting and ending positions of the bit, respectively.
For embedding sorting information, it is a precondition to sort the data first. After sorting by x from smallest to largest, the y of each coordinate point is embedded with the sorting information denoted as w 2 from the previous coordinate point.
y = b i t s e t y , 1 , 8 , w 2
Similarly, the sorting information of the previous point, sorted by y, is denoted as w 3 . After sorting by y from smallest to largest, the watermarked y can be expressed by the following equation.
y = b i t s e t y , 9 , 16 , w 3

2.5. Watermark Information Extraction and Authentication

Watermark extraction is the reverse process of watermark embedding. The authentication process involves comparing the extracted watermark information with the re-calculated watermark information. For a coordinate point ( x , y ), this paper classifies the types of attacks based on the position changes of each point in the vector geographic data into two categories: addition attacks and deletion attacks. Other types of attacks can be considered combinations of these two types. For example, a modification attack can be regarded as a combination of deletion followed by addition.

2.5.1. Addition Attack Authentication

Extract the self-identification information w 1 by the following formula.
w 1 = b i t g e t x , 1 , 16
Like b i t s e t (   ) , b i t g e t (   ) retrieves bits at a specific range from a double-precision floating-point number and interprets them as an integer.
If w 1 is equal to w 1 , then the point ( x , y ) is an original point. Otherwise, ( x , y ) is an added point. Therefore, the authentication of addition attacks can be precise down to the individual point.

2.5.2. Deletion Attack Authentication

This mainly involves extracting the sorting information from the points, taking into account the points that have passed the addition attack authentication. For the point ( x , y ) sorted by x, extract the sorting information w 2 of its previous point ( x p r e , y p r e ) by the following equation.
w 2 = b i t g e t y , 1 , 8
If w 2 is identical to w 2 , it can be inferred that no deletion attack has occurred between the lines x = x p r e and x = x . Conversely, any discrepancy between w 2 and w 2 indicates the presence of a deletion attack.
Similarly, for the sorting information w 3 that is sorted by y can extracted as below.
w 3 = b i t g e t y , 9 , 16
If w 3 is identical to w 3 , it can be concluded that no deletion attack has occurred between the lines y = y p r e and y = y . Conversely, any discrepancy between w 3 and w 3 would indicate the presence of a deletion attack.
Finally, the rectangular block where points have been deleted can be pinpointed by intersecting the horizontal and vertical intervals. This allows for the precise localization of tampering within the data. As shown in Figure 3, the deletion attack occurred in the textured area. Additionally, if multiple rectangular blocks with adjacent boundaries are detected, they can be merged into a single larger rectangular block for a more comprehensive identification of the tampered area.

3. Experiments

3.1. Datasets

To validate the effectiveness of the proposed algorithm, this section uses point data in the ESRI Shapefile format for verification. Since the fundamental storage form inside point, polyline, and polygon features is the point, the principle of processing them in the watermarking algorithm is the same. The dataset contains 1000 point features, as shown in Figure 4. Its geographic coordinate system is the China Geodetic Coordinate System 2000. The data employ the 3-degree Gauss–Krüger projection [33,34], centered at 111° E longitude, and are with the China Geodetic Coordinate System 2000 as the geographic coordinate system.

3.2. Experiment Design and Implementation

The evaluation focuses on three main aspects: imperceptibility, addition attack authentication, and deletion attack authentication. Hou’s method [26] was chosen as a benchmark for comparison due to its established use in geospatial data watermarking.

3.2.1. Comparison Algorithm

Hou’s method serves as a key benchmark for our experiments. This method embeds watermark information by altering the text-based representation of coordinates, focusing specifically on decimal places. It employs an optimized k-means clustering approach to group points into clusters, referred to as entity groups, which serve as units for watermark embedding. The watermarking process uses the LSB (Least Significant Bit) technique to modify coordinates within each cluster. The parameters q and k are critical to Hou’s method. The parameter q is the position of decimal place to be adjusted for watermark embedding. In our experiments, it is set to 4, indicating that the 4th decimal places is altered to embed the watermark. The parameter k is the number of clusters used in the k-means clustering process and is set to 10.
Each entity group receives a unique watermark generated using secure integrity features combined with chaotic mappings. During the watermark detection phase, the embedded watermarks are extracted from each group and compared to detect any tampering. Figure 5 illustrates the clustering results obtained using Hou’s method, which was applied to the experimental point dataset described in Section 3.1.

3.2.2. Imperceptibility

Imperceptibility can be seen as the perceptual similarity between the watermarked vector geographic data and the original data [35,36], that is, the invisibility of the watermark. Here, changes between the watermarked data and the original data at corresponding coordinates are statistically analyzed. The corresponding vertices are denoted as ( x i , y i ) and ( x i , y i ). The minimum and maximum values (absolute values) of changes in the x and y coordinates, as well as the minimum and maximum distance, are calculated. The distance d can be expressed by the formula below.
d = x i x i 2 + y i y i 2

3.2.3. Addition Attacks

Regarding addition attacks, a certain number of vertices are randomly added, ranging from 1% to 10% of the total number of points, with an interval of 1%. We used Precision, Recall, and F1-score as the performance metrics for evaluating detection accuracy. The definitions and calculation formulas for these metrics are as follows:
Precision   = T P T P + F P
Recall   = T P T P + F N
F 1 - score   = 2 ×   Precision   ×   Recall     Precision   +   Recall  
where TP is True Positive, FP is False Positive, and FN is False Negative. Precision measures the proportion of correctly detected added points among all detected points, indicating the accuracy of the algorithm. Recall measures the proportion of correctly detected added points among all actually added points, reflecting the algorithm’s sensitivity. The F1-score is the harmonic mean of Precision and Recall, ranging from 0 to 1, where 1 indicates perfect detection performance and 0 indicates a complete failure in detection.

3.2.4. Deletion Attacks

For deletion attacks, points were removed starting from the data center, with deletion rates set from 1% to 10% at 1% intervals. Due to the nature of deletion attacks, where the exact coordinates of removed points cannot be directly detected, the tampering localization is constrained to an area. This experiment aimed to test the algorithm’s ability to accurately localize and identify areas where points were removed. We used two metrics:
  • Detection Coverage Area Rate (DCAR): This metric quantifies the relative size of the detection area, called the Detection Coverage Area (DCA), as a proportion of the area of the minimum bounding polygon of the original dataset. A lower DCAR indicates a more precise detection;
  • Detection Coverage Rate (DCR): This metric represents the proportion of the actual deleted points that fall within the DCA. A higher DCR implies that the algorithm successfully covers more of the deleted points.
Hou’s method only provides localization down to the level of clusters, as it identifies the deletion within the group of points but cannot specify the exact tampered region. To make a fair comparison, we adapted Hou’s method to use the minimum bounding polygon (convex hull) of each cluster as its DCA.

4. Results and Analyses

4.1. Results of Imperceptibility

The imperceptibility results are shown in Table 1. All of the indicators show very low values. For instance, the maximum change in y and the maximum change in the distance are both 2.97 × 10−5 m, which equates to 29.7 μm and is considered negligible. These values fall within acceptable limits for practical geospatial data applications, ensuring that the watermark remains imperceptible.

4.2. Authentication Results of Addition Attacks

Figure 6 presents a visual comparison between the proposed method and Hou’s method in detecting addition attacks at various ratios. The graph shows how the performance of both methods varies as more points are added to the original dataset. Specifically, the proposed method maintains consistent accuracy across all tested addition ratios, while Hou’s method exhibits a relatively low level in precision and F1-score as the addition ratio increases.
Specifically, the proposed method accurately identifies all added points without misclassifying any original points, resulting in perfect precision and recall. The detection performance remains stable even when the addition ratio reaches 10%, highlighting the method’s effectiveness in distinguishing added points from the original dataset. On the other hand, Hou’s method suffers from a considerable number of false positives, especially at higher addition ratios. The clustering-based approach leads to several original points being incorrectly flagged as added. This limitation reduces the method’s precision and demonstrates its inherent weakness in handling dense tampering scenarios where fine-grained accuracy is crucial.
To further illustrate these findings, Figure 7 and Figure 8 provide examples of the 1% addition ratio. Figure 7 shows that the proposed method successfully detects all ten added points, marked in red, with no false positives, confirming its precise detection capabilities. In contrast, Figure 8 reveals that Hou’s method misclassifies several original points, resulting in numerous false positives. This example underscores the impact of clustering granularity on detection accuracy.

4.3. Authentication Results of Deletion Attacks

Figure 9 illustrates the overall performance of the proposed method and Hou’s method in detecting deletion attacks, comparing both DCR and DCAR. The graph shows that both methods consistently achieve a DCR of 100%, indicating that they are able to detect all deleted points effectively. However, a clear distinction emerges in their DCAR values: the proposed method exhibits a controlled and gradual increase, maintaining a relatively low DCAR, while Hou’s method experiences significant fluctuations and higher DCAR values, reflecting less precise localization.
Focusing on the details, the DCAR reveals localization accuracy. At a deletion ratio of 3%, Hou’s method’s DCAR sharply rises to 100%, indicating that deletions affect the entire clustering structure, causing a significant expansion of the detection area. This result suggests that Hou’s method is more prone to inaccuracies as deletion intensity increases. In contrast, the proposed method maintains a controlled and smaller DCAR, demonstrating better precision in localizing deleted areas, even under higher tampering levels.
To illustrate these findings further, Figure 10 and Figure 11 provide a specific example of the 1% deletion ratio. Figure 10 shows that the proposed method tightly confines the detection area, covering all deleted points while minimizing unnecessary coverage. On the other hand, Figure 11 reveals that Hou’s method generates a much larger detection area, extending beyond the actual tampered regions and underscoring the limitations of its approach.
Overall, the proposed algorithm exhibits strong imperceptibility and accurately authenticates addition attacks with perfect precision. For deletion attacks, it achieves precise localization with a smaller detection area compared to Hou’s method, which suffers from significant false detection regions due to its cluster-based limitations.

5. Discussion

5.1. Limitation and Extension

The proposed algorithm employs a sorting-based approach for watermark embedding, which has both strengths and inherent limitations. One significant advantage is the algorithm’s robust capability to detect and localize deletion attacks by maintaining the ordering of data points. However, this approach is particularly sensitive to deletions that occur near the boundaries of the data’s bounding box. Deleting these critical boundary points can severely impact the reference information needed for sorting, thereby reducing the accuracy of tampering detection. However, this issue is not unique to the proposed algorithm but is a common challenge for all reference-dependent methods. Because the authentication of deletion attacks inherently relies on reference points to determine the region of tampering. Despite this, the proposed algorithm demonstrates significant improvements over existing methods by effectively reducing the authenticated area, as shown in Figure 10 and Figure 11. This limitation underscores the need for careful data management when applying the algorithm to datasets where boundary points are susceptible to change.
Moreover, to further improve the precision of tampering localization, an extension of the sorting mechanism could be considered. By incorporating additional sorting along diagonal directions, such as y = x and y = x , the algorithm could narrow the detection area even further. This would involve sorting points along the straight lines y = x or y = x and embedding the corresponding self-identification and ordering information. However, this improvement would come at the cost of additional precision loss in the data. Thus, there is a trade-off between achieving finer localization and maintaining data accuracy. If a higher tolerance for data precision loss is acceptable, this extension could be beneficial, but it would require careful evaluation of the specific application needs.

5.2. Combination Attacks

As mentioned in Section 2.5, any attack on vector geographic data can be seen as a combination of addition and deletion attacks. Thus, we have focused on evaluating the algorithm’s performance against both addition and deletion attacks in the experiments. Here, we append a discussion on combination attacks. Its core steps involve first authenticating the addition attack, then removing the points identified as added to avoid interference with the subsequent deletion authentication, and finally authenticating the deletion attack. As shown in Figure 12, we modified 28 points by moving them from the bottom-left corner to the top-right corner. This process can be considered as first deleting these 28 points and then adding 28 new points, representing a combination attack of both addition and deletion.
The results of authenticating the addition attacks are shown in Figure 13. The algorithm successfully identified all 28 added points in the top-right corner, demonstrating its effectiveness in detecting addition attacks. After removing the authenticated added points, the algorithm was then used to detect the deletion attacks. As shown in Figure 14, the algorithm correctly identified all 28 deleted points in the bottom-left corner, further validating its capability to handle deletion attacks. In summary, the proposed algorithm is effective in authenticating combination attacks by sequentially addressing addition and deletion operations. These results confirm its effectiveness in handling complex tampering scenarios.

6. Conclusions

This paper presents a fragile watermarking algorithm for vector geographic data, utilizing multiple sorting mechanisms to embed delicate watermark information. The algorithm integrates self-identification and ordering information, ensuring that each data point has a unique identity and establishing structured relationships among all points. The experimental results demonstrate that the proposed method achieves high accuracy in detecting and precisely localizing both addition and deletion attacks, significantly outperforming the comparison method by minimizing false detections. The algorithm’s effectiveness makes it well-suited for practical applications in data monitoring, version control, and copyright protection of vector geographic datasets. Future research could explore enhancements, such as incorporating additional sorting directions, including y = x and y = x , to further narrow detection areas. These enhancements should carefully balance the trade-offs between localization precision and potential data accuracy loss.

Author Contributions

Conceptualization, Q.Z. and N.R.; methodology, Q.Z., N.R. and C.Z.; validation, Q.Z.; formal analysis, Q.Z. and N.R.; writing—original draft preparation, Q.Z. and C.Z.; writing—review and editing, Q.Z. and C.Z.; visualization, Q.Z.; supervision, N.R. and C.Z.; funding acquisition, Q.Z. and N.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China under Grant 2023YFB3907100, the National Natural Science Foundation of China under Grant 42301482, the Open Topic of Hunan Engineering Research Center of Geographic Information Security and Application under Grant HNGISA2023002, and Hunan Provincial Natural Science Foundation of China under Grant 2024JJ8365.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Tareef, A.; Al-Tarawneh, K.; Sleit, A. Block-Based Watermarking for Robust Authentication and Integration of GIS Data. Eng. Technol. Appl. Sci. Res. 2024, 14, 16340–16345. [Google Scholar] [CrossRef]
  2. Ren, N.; Guo, S.; Zhu, C.; Hu, Y. A Zero-Watermarking Scheme Based on Spatial Topological Relations for Vector Dataset. Expert Syst. Appl. 2023, 226, 120217. [Google Scholar] [CrossRef]
  3. Qiu, Y.; Sun, J.; Zheng, J. A Self-Error-Correction-Based Reversible Watermarking Scheme for Vector Maps. ISPRS Int. J. Geo-Inform. 2023, 12, 84. [Google Scholar] [CrossRef]
  4. Dai, Q.; Wu, B.; Liu, F.; Bu, Z.; Zhang, H. Commutative Encryption and Reversible Watermarking Algorithm for Vector Maps Based on Virtual Coordinates. ISPRS Int. J. Geo-Inform. 2024, 13, 338. [Google Scholar] [CrossRef]
  5. Tantriawan, H.; Munir, R. Watermarking Study on The Vector Map. Indones. J. Artif. Intell. Data Min. 2023, 6, 84. [Google Scholar] [CrossRef]
  6. Wang, S.; Zhang, L.; Zhang, Q.; Li, Y. A Zero-Watermarking Algorithm for Vector Geographic Data Based on Feature Invariants. Earth Sci. Inform. 2023, 16, 1073–1089. [Google Scholar] [CrossRef]
  7. Qu, C.; Du, J.; Xi, X.; Tian, H.; Zhang, J. A Hybrid Domain-Based Watermarking for Vector Maps Utilizing a Complementary Advantage of Discrete Fourier Transform and Singular Value Decomposition. Comput. Geosci. 2023, 183, 105515. [Google Scholar] [CrossRef]
  8. Herrera Montano, I.; García Aranda, J.J.; Ramos Diaz, J.; Molina Cardín, S.; de la Torre Díez, I.; Rodrigues, J.J.P.C. Survey of Techniques on Data Leakage Protection and Methods to Address the Insider Threat. Clust. Comput. 2022, 25, 4289–4302. [Google Scholar] [CrossRef]
  9. Rawal, D.; Amaduzzi, S.; Seedorf, J. Crypto-Spatial: A New Direction in Geospatial Data. Int. Arch. Photogramm. Remote Sens. Spat. Inf. Sci. 2024, XLVIII-5-2024, 89–96. [Google Scholar] [CrossRef]
  10. Buccafurri, F.; De Angelis, V.; Lazzaro, S.; Pugliese, A. Enforcing Security Policies on Interacting Authentication Systems. Comput. Secur. 2024, 140, 103771. [Google Scholar] [CrossRef]
  11. Onoja, G.U. Robust Watermarking Techniques for the Authentication and Copyright Protection of Digital Images: A Survey. SLU J. Sci. Technol. 2023, 6, 100–112. [Google Scholar] [CrossRef]
  12. Abubahia, A.; Cocea, M. Advancements in GIS Map Copyright Protection Schemes—A Critical Review. Multimed. Tools Appl. 2017, 76, 12205–12231. [Google Scholar] [CrossRef]
  13. Zheng, L.; You, F. A Fragile Digital Watermark Used to Verify the Integrity of Vector Map. In Proceedings of the 2009 International Conference on E-Business and Information System Security, Wuhan, China, 23–24 May 2009; pp. 1–4. [Google Scholar]
  14. Yuan, T.; Zhu, C.; Chen, H.; Ren, N.; Lyu, X. Fragile Watermarking Algorithm for High Precision Map of OpenDRIVE Format. Geomat. Inf. Sci. Wuhan Univ. 2024, 11, 1–14. [Google Scholar] [CrossRef]
  15. Penard, W.; van Werkhoven, T. On the Secure Hash Algorithm Family. In Cryptography in Context; Wiley: Hoboken, NJ, USA, 2008; pp. 1–18. [Google Scholar]
  16. Sefid-Dashti, B.; Sartakhti, J.S.; Daghigh, H. Brand New Categories of Cryptographic Hash Functions: A Survey. J. Electr. Comput. Eng. Innov. 2023, 11, 335–354. [Google Scholar] [CrossRef]
  17. Wali, A.; Ravichandran, H.; Das, S. A 2D Cryptographic Hash Function Incorporating Homomorphic Encryption for Secure Digital Signatures. Adv. Mater. 2024, 36, e2400661. [Google Scholar] [CrossRef]
  18. Rivest, R. The MD5 Message-Digest Algorithm. RFC 1321; Internet Engineering Task Force (IETF): Fremont, CA, USA, 1992. [Google Scholar] [CrossRef]
  19. Jasim, A.H.; Hammood, D.A.; Al-Askery, A. Design and Implementation Secure Hash Algorithm 3 (SHA-3) Using FPGA. In Proceedings of the 2023 Third International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India,, 5 January 2023; Volume 3, pp. 1–5. [Google Scholar]
  20. Devi, S.S.; Jayasri, K. Esha-256: An Enhanced Secure Cryptographic Hash Algorithm for Information Security. In Proceedings of the 2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS), Pudukkottai, India, 11–13 December 2023; pp. 952–958. [Google Scholar]
  21. Butt, U.A.; Amin, R.; Mehmood, M.; Aldabbas, H.; Alharbi, M.T.; Albaqami, N. Cloud Security Threats and Solutions: A Survey. Wirel. Pers. Commun. 2023, 128, 387–413. [Google Scholar] [CrossRef]
  22. Yu, Y.; Zhang, Y.; Yu, J.; He, X. An Overview of the Application and Development of Data Integrity Verification Techniques. In Proceedings of the Second International Conference on Applied Statistics, Computational Mathematics, and Software Engineering (ASCMSE 2023), Kaifeng, China, 23 August 2023; Batista, P., Zhang, Y., Eds.; SPIE: Bellingham, DC, USA; Volume 12784, p. 34. [Google Scholar]
  23. Wang, N. Reversible Fragile Watermarking for Locating Tampered Polylines/Polygons in 2D Vector Maps. Int. J. Digit. Crime Forensics 2016, 8, 25. [Google Scholar] [CrossRef]
  24. Elsoud, M.W.A.; Melhim, L.B. A New Digital Watermarking Scheme of Content Authentication of Vector Maps. Am. J. Eng. Res. (AJER) 2017, 6, 404–409. [Google Scholar]
  25. Hou, X.; Min, L.; Yang, H. A Fragile Watermarking Scheme for Vector Map Data Using Geographic Graticule Block-Wise Method. Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/J. Comput. Des. Comput. Graph. 2018, 30, 2042–2048. [Google Scholar] [CrossRef]
  26. HOU, X.; MIN, L.; TANG, L. Fragile Watermarking Algorithm for Locating Tampered Entity Groups in Vector Map Data. Geomat. Inf. Sci. Wuhan Univ. 2020, 45, 309–316. [Google Scholar] [CrossRef]
  27. Kozieł, G.; Malomuzh, L. 3D Model Fragile Watermarking Scheme for Authenticity Verification. Adv. Sci. Technol. Res. J. 2024, 18, 351–365. [Google Scholar] [CrossRef] [PubMed]
  28. Zheng, L.; Feng, L.; Chen, R.; Cheng, X. Research and Implementation of Fragile Watermark for Vector Graphics. Appl. Res. Comput. 2010, 28, 3820–3822. [Google Scholar] [CrossRef]
  29. Li, S.; Wang, H.; Zhou, W.; Li, A. Fragile Watermarking Based Integrality Authentication for GIS Vector Data. Bull. Surv. Mapp. 2013, 0, 101–105. [Google Scholar]
  30. Ren, N.; Wu, W.; Zhu, C. An Accurate Authentication Algorithm Based on Point Constraint Block for Vector Geographic Data. J. Geo-Inf. Sci. 2015, 17, 166–171. [Google Scholar]
  31. Hough, D. Applications of the Proposed IEEE 754 Standard for Floating-Point Arithetic. Comput. (Long. Beach. Calif). 1981, 14, 70–74. [Google Scholar] [CrossRef]
  32. Boldo, S.; Jeannerod, C.-P.; Melquiond, G.; Muller, J.-M. Floating-Point Arithmetic. Acta Numer. 2023, 32, 203–290. [Google Scholar] [CrossRef]
  33. Bugayevskiy, L.M.; Snyder, J.P. Map Projections: A Reference Manual; CRC Press: London, UK, 1995. [Google Scholar]
  34. Turiño, C.E. Gauss Krüger Projection for Areas of Wide Longitudinal Extent. Int. J. Geogr. Inf. Sci. 2008, 22, 703–719. [Google Scholar] [CrossRef]
  35. Ren, N.; Wang, H.; Chen, Z.; Zhu, C.; Gu, J. A Multilevel Digital Watermarking Protocol for Vector Geographic Data Based on Blockchain. J. Geovisualization Spat. Anal. 2023, 7, 31. [Google Scholar] [CrossRef]
  36. Zhou, Q.; Ren, N.; Zhu, C.; Zhou, Q. Zero Watermarking Algorithm for BIM Data Based on Distance Partitioning and Local Feature. Ann. GIS 2024, 30, 251–265. [Google Scholar] [CrossRef]
Figure 1. The framework of the proposed method.
Figure 1. The framework of the proposed method.
Symmetry 16 01626 g001
Figure 2. Floating-point number and watermark embedding position.
Figure 2. Floating-point number and watermark embedding position.
Symmetry 16 01626 g002
Figure 3. Demonstration of deletion region.
Figure 3. Demonstration of deletion region.
Symmetry 16 01626 g003
Figure 4. Experimental point dataset.
Figure 4. Experimental point dataset.
Symmetry 16 01626 g004
Figure 5. Results of clustering.
Figure 5. Results of clustering.
Symmetry 16 01626 g005
Figure 6. Authentication of addition attacks.
Figure 6. Authentication of addition attacks.
Symmetry 16 01626 g006
Figure 7. 1% addition authentication of the proposed method.
Figure 7. 1% addition authentication of the proposed method.
Symmetry 16 01626 g007
Figure 8. 1% addition authentication of Hou’s method.
Figure 8. 1% addition authentication of Hou’s method.
Symmetry 16 01626 g008
Figure 9. Authentication of deletion attacks.
Figure 9. Authentication of deletion attacks.
Symmetry 16 01626 g009
Figure 10. 1% deletion authentication of the proposed method.
Figure 10. 1% deletion authentication of the proposed method.
Symmetry 16 01626 g010
Figure 11. 1% deletion authentication of Hou’s method.
Figure 11. 1% deletion authentication of Hou’s method.
Symmetry 16 01626 g011
Figure 12. Setup of combination attacks.
Figure 12. Setup of combination attacks.
Symmetry 16 01626 g012
Figure 13. Authentication results for addition attacks.
Figure 13. Authentication results for addition attacks.
Symmetry 16 01626 g013
Figure 14. Authentication results for deletion attacks.
Figure 14. Authentication results for deletion attacks.
Symmetry 16 01626 g014
Table 1. Imperceptibility experimental results.
Table 1. Imperceptibility experimental results.
IndicatorsMin Change in xMax Change in xMin Change in yMax Change in yMin Change in DistanceMax Change in Distance
Values/m6.98 × 10−107.03 × 10−64.19 × 10−92.97 × 10−54.00 × 10−82.97 × 10−5
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhou, Q.; Ren, N.; Zhu, C. Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data. Symmetry 2024, 16, 1626. https://doi.org/10.3390/sym16121626

AMA Style

Zhou Q, Ren N, Zhu C. Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data. Symmetry. 2024; 16(12):1626. https://doi.org/10.3390/sym16121626

Chicago/Turabian Style

Zhou, Qifei, Na Ren, and Changqing Zhu. 2024. "Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data" Symmetry 16, no. 12: 1626. https://doi.org/10.3390/sym16121626

APA Style

Zhou, Q., Ren, N., & Zhu, C. (2024). Precise Authentication Watermarking Algorithm Based on Multiple Sorting Mechanisms for Vector Geographic Data. Symmetry, 16(12), 1626. https://doi.org/10.3390/sym16121626

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop