Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2482513.2482526acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Watermarking road maps against crop and merge attacks

Published: 17 June 2013 Publication History

Abstract

Past research on watermarking digital road maps has been focused on deterring common attacks such as adding noise to the whole map so as to destroy the embedded watermarks. This paper focuses on two less common but increasingly used types of attack: crop attacks and merge attacks. Crop attack crops a fragment of the original map and uses the fragment as a new map. When the new map is much smaller than the original map, it is called massive cropping. Merge attack merges maps from various sources together to form a new map. Conventional watermarking techniques fail against these attacks either because they require global information from the whole map or they must add too many local watermarks and affect the usability of the maps. This paper proposes a novel quad-tree based blind watermarking scheme that partitions the original map according to the quad-tree and plants just one single bit in each sub-region of the map. The approach achieves almost 100% detection accuracy for moderate crop and merge attacks, and over 80% accuracy with more than 95% of the original map cropped and removed. Furthermore, the method introduces very little distortion to the original map: to effectively protect a 23.5MB Minneapolis-St.Paul map against crop and merge as well as other common attacks, only 423 bits or 53 bytes of watermark is required.

References

[1]
MN/DOT. http://www.dot.state.mn.us/.
[2]
TIGER. http://www.census.gov/.
[3]
M. Abramowitz and I. Stegun. Handbook of mathematical functions: with formulas, graphs, and mathematical tables, volume 55. Dover publications, 1965.
[4]
R. Agrawal and J. Kiernan. Watermarking relational databases. In VLDB, pages 155--166, 2002.
[5]
S. Bird, C. Bellman, and R. v. Schyndel. A shape-based vector watermark for digital mapping. In Proceedings of the 2009 Digital Image Computing: Techniques and Applications, pages 454--461. IEEE Computer Society, 2009.
[6]
D. H. Douglas. Algorithms for the reduction of the number of points required to represent a line or its a caricature. The Canadian Cartographer, 10(2):112--122, 1973.
[7]
P. Han, J. Gong, and L. Cheng. An improved adaptive watermarking algorithm for vector digital maps. In Geoscience and Remote Sensing Symposium,IGARSS, pages 2844 --2847, 2006.
[8]
X.-J. Huo, T.-Y. Seung, B.-J. Jang, S.-H. Lee, and K.-R. Kwon. A watermarking scheme using polyline and polygon characteristic of shapefile. In ICINIS, 2010, pages 649 --652, 2010.
[9]
H. Kang, K. Kim, and J. Choi. A vector watermarking using the generalized square mask. In ITCC, pages 234--236. IEEE Computer Society, 2001.
[10]
J. Kim, S. Won, W. Zeng, and S. Park. Copyright protection of vector map using digital watermarking in the spatial domain. In Digital Content, Multimedia Technology and its Applications (IDCTA), 2011 7th International Conference on, pages 154 --159, aug. 2011.
[11]
I. Kitamura, S. Kanai, and T. Kishinami. Copyright protection of vector map using digital watermarking method based on discrete fourier transform. In Geoscience and Remote Sensing Symposium, 2001. IGARSS '01. IEEE 2001 International, volume 3, pages 1191 --1193 vol.3, 2001.
[12]
S.-H. Lee and K.-R. Kwon. Vector watermarking scheme for GIS vector map management. DOI10.1007/s11042-011-0894-y SpringerLink, 2011.
[13]
Y. Li and L. Xu. A blind watermarking of vector graphics images. In ICCIMA '03: Proceedings of the 5th International Conference on Computational Intelligence and Multimedia Applications, page 424, Washington, DC, USA, 2003. IEEE Computer Society.
[14]
X. Niu, C. Shao, and X. Wang. A survey of digital vector map watermarking. In 2006 International Journal of Innovative Computing,Information and Control Volume 2, 2006.
[15]
R. Ohbuchi, H. Ueda, and S. Endoh. Robust watermarking of vector digital maps. In ICME (1), pages 577--580, 2002.
[16]
R. Ohbuchi, H. Ueda, and S. Endoh. Watermarking 2d vector maps in the mesh-spectral domain. In Shape Modeling International, pages 216--228, 2003.
[17]
Y.-C. Pu, W.-C. Du, and I.-C. Jou. Toward blind robust watermarking of vector maps. In ICPR (3), pages 930--933, 2006.
[18]
G. Schulz and M. Voigt. A high capacity watermarking system for digital maps. In MM&Sec, pages 180--186, 2004.
[19]
R. Sion, M. J. Atallah, and S. Prabhakar. On watermarking numeric sets. In IWDW, pages 130--146, 2002.
[20]
R. Sion, M. J. Atallah, and S. Prabhakar. Rights protection for relational data. In SIGMOD Conference, pages 98--109, 2003.
[21]
V. Solachidis and I. Pitas. Watermarking polygonal lines using fourier descriptors. Computer Graphics and Applications, IEEE, 24(3):44 -- 51, may-jun 2004.
[22]
H. Sonnet, T. Isenberg, J. Dittmann, and T. Strothotte. Illustration watermarks for vector graphics. Computer Graphics and Applications, Pacific Conference on, 0:73, 2003.
[23]
M. Voigt and C. Busch. Feature-based watermarking of 2d-vector data. In SPIE,Security and Watermarking of Multimedia Content.Santa Clara, pages 359--366, 2003.
[24]
H. Yan, J. Li, and H. Wen. A key points-based blind watermarking approach for vector geo-spatial data. Computers, Environment and Urban Systems, 35(6):485--492, 2011.

Cited By

View all
  • (2019)TrajGuardProceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining10.1145/3292500.3330685(3060-3070)Online publication date: 25-Jul-2019
  • (2017)Advancements in GIS map copyright protection schemes - a critical reviewMultimedia Tools and Applications10.1007/s11042-016-3441-z76:10(12205-12231)Online publication date: 1-May-2017
  • (2015)Block-based Reversible Fragile Watermarking for 2D Vector Map AuthenticationInternational Journal of Digital Crime and Forensics10.4018/IJDCF.20150701047:3(60-80)Online publication date: 1-Jul-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec '13: Proceedings of the first ACM workshop on Information hiding and multimedia security
June 2013
242 pages
ISBN:9781450320818
DOI:10.1145/2482513
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 June 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. crop attack
  2. digital road map
  3. merge attack
  4. quad-tree
  5. watermark

Qualifiers

  • Research-article

Conference

IH&MMSec '13
Sponsor:

Acceptance Rates

IH&MMSec '13 Paper Acceptance Rate 27 of 74 submissions, 36%;
Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2019)TrajGuardProceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining10.1145/3292500.3330685(3060-3070)Online publication date: 25-Jul-2019
  • (2017)Advancements in GIS map copyright protection schemes - a critical reviewMultimedia Tools and Applications10.1007/s11042-016-3441-z76:10(12205-12231)Online publication date: 1-May-2017
  • (2015)Block-based Reversible Fragile Watermarking for 2D Vector Map AuthenticationInternational Journal of Digital Crime and Forensics10.4018/IJDCF.20150701047:3(60-80)Online publication date: 1-Jul-2015

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media