Abstract
Information hiding is an essential research topic in the theory of hybrid information security. 2D vector map contains a wealth of hybrid information, which requires verification of authenticity and integrity. This paper proposes a novel hybrid information security scheme for 2D vector map. The features in vector map are first divided into disjoint groups to ensure the accuracy of tamper localization. In order to locate the batch features deletion attack, we design a feature group correlation technique based on vertex insertion. And a fragile watermark is generated by combining with polar coordinate transformation and hash function, which is robust to resist rotation, uniform scaling and translation (RST) operations. And we embed the watermark with an RST invariant watermarking method. We construct two datasets for experimentation and the results compared with previous methods indicate that the proposed scheme has good invisibility and high tampering localization accuracy on the feature addition and deletion attack.






Similar content being viewed by others
References
Ding G, Wang J, Wu Q et al (2016) Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Selected Areas Commun 34(1):107–121
Ding G, Wang J, Wu Q et al (2014) Robust spectrum sensing with crowd sensors. IEEE Trans Commun 62(9):3129–3143
Lin Y, Wang C, Ma C, Dou Z, Ma X (2016) A new combination method for multisensor conflict information. J Supercomput 72(7):1–17
Wu Q, Li Y, Lin Y (2017) The application of nonlocal total variation in image denoising for mobile transmission. Multimed Tools Appl 76(16):17179–17191
Lin Y, Wang C, Wang J, Dou Z (2016) A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 16(10):1–22
Van BN, Lee SH, Ryong KK (2017) Selective encryption algorithm using hybrid transform for GIS vector map. J Inf Syst 13(1):68–82
Chen C (2016) QR code authentication with embedded message authentication code. Mobile Netw Appl 1–12
Ma B, Wang Y, Li C, Zhang Z, Huang D (2012) A robust watermarking scheme based on dual quantization of wavelet significant difference. Adv Multimed Inf Process – PCM 2012
Abubahia A, Cocea M (2015) A clustering approach for protecting GIS vector data. Adv Inf Syst Eng 133–147
Wu Q, Li Y, Lin Y, Yang X (2014) The nonlocal sparse reconstruction algorithm by similarity measurement with shearlet feature vector. Math Probl Eng 2014(1):1–8
Wang N, Zhao X, Xie C (2016) RST invariant reversible watermarking for 2d vector map. Int J Multimed Ubiquit Eng 11(2):265–276
Wang N, Men C (2012) Reversible fragile watermarking for 2-d vector map authentication with localization. Comput Aided Des 44(4):320–330
Boluk PS, Baydere S, Harmanci AE (2011) Robust image transmission over wireless sensor networks. Mobile Netw Appl 16(2):149–170
Wei HL, Chou CM, Wang SW (2016) An NFC anti-counterfeiting framework for id verification and image protection. Mobile Netw Appl 21(4):646–655
Weng L, Darazi R, Preneel B, Macq B (2012) Dooms robust image content authentication using perceptual hashing and watermarking. In: Pacific-rim conference on advances in multimedia information processing. Springer-Verlag, pp 315–326
Haojun FU, Zhu C, Jian M (2011) Multipurpose watermarking algorithm for digital raster map based on wavelet transformation. Acta Geodaetica Et Cartographica Sinica 40(3):397–400
Altun O, Sharma G, Celik M, Bocko M (2006) A set theoretic framework for watermarking and its application to semifragile tamper detection. IEEE Trans Inf Forens Secur 1(4):479–492
Liu S, Pan Z, Fu W et al (2017) Fractal generation method based on asymptote family of generalized Mandelbrot set and its application. J Nonlinear Sci Appl 10(3):1148–1161
Liu S, Zhang Z, Qi L et al (2016) A fractal image encoding method based on statistical loss used in agricultural image compression. Multimed Tools Appl 75(23):15525–15536
Li C, Ma B, Wang Y, Huang D, Zhang Z (2012) A secure semi-fragile self-recoverable watermarking algorithm using group-based wavelet quantization. Pacific-Rim Conf Multimed 327–336
Fujiyoshi M, Kiya H (2015) Histogram-based near-lossless data hiding and its application to image compression. Adv Multimed Inf Process – PCM 2015
Shi H, Li MC, Guo C, Tan R (2016) A region-adaptive semi-fragile dual watermarking scheme. Multimed Tools Appl 75(1):465–495
Peng Y, Lan H, Yue M, Xue Y (2017) Multipurpose watermarking for vector map protection and authentication. Multimed Tools Appl 2017(1):1–21
Nidya S (2013) Reversible fragile watermarking based on difference expansion using manhattan distances for 2D vector map. In: 4TH International conference on electrical engineering and informatics, pp 614–620
Neyman SN, Wijaya YH, Sitohang B (2015) A new scheme to hide the data integrity marker on vector maps using a feature-based fragile watermarking algorithm. Int Conf Data Softw Eng 1–6
Ren N, Wang QS, Zhu CQ (2014) Selective authentication algorithm based on semi-fragile watermarking for vector geographical data. In: International conference on geoinformatics, pp 1–6
Chou CM, Tseng DC (2009) Affine-transformation-invariant public fragile watermarking for 3d model authentication. IEEE Comput Graph Appl 29(2):72–79
Wang N, Bian J, Zhang H (2015) RST invariant fragile watermarking for 2d vector map authentication. Int J Multimed Ubiquit Eng 10(4):155–172
Wang N, Zhao X, Zhang H (2015) Block-based reversible fragile watermarking for 2D vector map authentication. Int J Digit Crime Forens (IJDCF) 7(3):60–80
Zhao Y, Hong Z, Luo Y et al (2017) Prediction-based spectrum management in cognitive radio networks. IEEE Syst J PP(99):1–12
Acknowledgments
This work was supported by project of NSFC of China (61472096, 61771154, 61202455, 61501132, 61301095).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Da, Q., Sun, J., Zhang, L. et al. A Novel Hybrid Information Security Scheme for 2D Vector Map. Mobile Netw Appl 23, 734–742 (2018). https://doi.org/10.1007/s11036-018-0997-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-0997-z