中山大学学报自然科学版 ›› 2018, Vol. 57 ›› Issue (4): 1-8.

• 论文 •    下一篇

基于零水印与脆弱水印的矢量地理数据多重水印算法

梁伟东1,张新长2,1,奚旭1,张鹏程3   

  1. 1.中山大学地理科学与规划学院,广东 广州 510275;
    2.广州大学地理科学学院,广东 广州 510006;
    3. 广州市城市规划勘测设计研究院,广东 广州 510060
  • 收稿日期:2017-09-19 出版日期:2018-07-25 发布日期:2018-07-25
  • 通讯作者: 张新长(1957年生),男;研究方向:地理空间信息多源数据融合集成、智能化管理与数据库自动更新;E-mail: eeszxc@mail.sysu.edu.cn

A multiple watermarking algorithm for vector geographic data based on zero watermarking and fragile watermarking

LIANG Weidong1, ZHANG Xinchang2,1, XI Xu1,ZHANG Pengcheng3   

  1. 1. School of Geography and Planning, Sun Yat-sen University, Guangzhou 510275, China;
    2. School of Geographical Sciences, Guangzhou University, Guangzhou 510006, China;
    3. Guangzhou Urban Planning and Design Survey Research Institute, Guangzhou 510060, China
  • Received:2017-09-19 Online:2018-07-25 Published:2018-07-25

摘要:

为了兼顾矢量地理数据的版权保护与内容认证,同时保证数据的精度,提出一种基于零水印与脆弱水印的无损嵌入的多重水印算法。该算法以矢量图元节点数据为基础,根据需求对数据进行不同程度的点约束数据分块,针对数据版权保护,利用道格拉斯算法和Delaunay三角网提取特征点和特征信息,结合Arnold置乱算法,构造大容量的零水印;针对数据内容认证,通过空间排序与零比特动态扩展,设计一种无损嵌入的用于精确认证的脆弱水印。实验结果表明,本研究提出的零水印算法可对常见的地图攻击与组合攻击具有较强鲁棒性;脆弱水印算法能对数据进行有效认证,并精确标记出被篡改的要素。

关键词: 矢量地理数据, 多重水印, 零水印, 脆弱水印, 无损嵌入

Abstract:

In order to give consideration to the copyright protection and content authentication of vector geographic data, and ensure the accuracy of data, a multiple watermarking algorithm is proposed, which has no effect on the data accuracy and includes zero-watermarking and fragile watermarking. Based on vector element nodes, the algorithm divides the vector geographic data into different degrees of blocks by point constraint according to requirements. A large capacity zero-watermarking algorithm with two main processes is put forward to protest the copyright of data, The Douglas algorithm and the Delaunay triangulation network are adopted to extract feature points and feature information from the data, and then the watermarking image scrambled by Arnold algorithm does xor with the feature information. By spatial sorting and zero-bit dynamic expansion, a non-destructive embedded fragile watermarking algorithm is used to authenticate data content. The experimental results show that the zero-watermarking algorithm can resist robustly against the common map attacks and combination attacks; the fragile watermarking algorithm can effectively achieve accurate authentication and accurately locate and mark the modified elements.

Key words: vector geographic data, multiple watermarking, zero-watermarking, fragile watermarking, non-destructive embedded

中图分类号: