Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (9)

Search Parameters:
Keywords = vector map copyright protection

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
30 pages, 5698 KB  
Article
A Blockchain Copyright Protection Model Based on Vector Map Unique Identification
by Heyan Wang, Nannan Tang, Changqing Zhu, Na Ren and Changhong Wang
ISPRS Int. J. Geo-Inf. 2025, 14(2), 53; https://doi.org/10.3390/ijgi14020053 - 30 Jan 2025
Viewed by 1232
Abstract
Combining blockchain technology with digital watermarking presents an efficient solution for safeguarding vector map files. However, the large data volume and stringent confidentiality requirements of vector maps pose significant challenges for direct registration on blockchain platforms. To overcome these limitations, this paper proposes [...] Read more.
Combining blockchain technology with digital watermarking presents an efficient solution for safeguarding vector map files. However, the large data volume and stringent confidentiality requirements of vector maps pose significant challenges for direct registration on blockchain platforms. To overcome these limitations, this paper proposes a blockchain-based copyright protection model utilizing unique identifiers (BCPM-UI). The model employs a distance ratio-based quantization watermarking algorithm to embed watermark information into vector maps and then generates unique identifiers based on their topological and geometric parameters. These identifiers, rather than the vector maps themselves, are securely registered on the blockchain. To ensure reliable copyright verification, a bit error rate (BER)-based matching algorithm is introduced, enabling accurate comparison between the unique identifiers of suspected infringing data and those stored on the blockchain. Experimental results validate the model’s effectiveness, demonstrating the high uniqueness and robustness of the identifiers generated. Additionally, the proposed approach reduces blockchain storage requirements for map data by a factor of 200, thereby meeting confidentiality standards while maintaining practical applicability in terms of copyright protection for vector maps. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

17 pages, 12355 KB  
Article
Zero-Watermarking for Vector Maps Combining Spatial and Frequency Domain Based on Constrained Delaunay Triangulation Network and Discrete Fourier Transform
by Xu Xi, Yang Hua, Yi Chen and Qiande Zhu
Entropy 2023, 25(4), 682; https://doi.org/10.3390/e25040682 - 19 Apr 2023
Cited by 15 | Viewed by 2346
Abstract
With its lossless properties, zero-watermarking has attracted a lot of attention in the field of copyright protection for vector maps. However, the common zero-watermarking algorithm puts too much emphasis on mining for global features, making it vulnerable to cropping attacks, and the robustness [...] Read more.
With its lossless properties, zero-watermarking has attracted a lot of attention in the field of copyright protection for vector maps. However, the common zero-watermarking algorithm puts too much emphasis on mining for global features, making it vulnerable to cropping attacks, and the robustness is not comprehensive enough. This study provides a vector map zero-watermarking scheme that utilizes spatial statistical information and frequency domain transformation methods in an effort to solve the aforementioned issue. In order to make the scheme more resistant to cropping and compression, it is constructed on the basis of feature point extraction and point constraint blocking of the original vector map. Within each sub-block, feature points are used to build constraint Delaunay triangulation networks (CDTN), and the angular values within the triangle networks are then extracted as spatial statistics. The angle value sequence is further transformed by discrete Fourier transform (DFT), and the binarized phase sequence is used as the final feature information to build a zero watermark by executing an exclusive disjunction operation with the encrypted copyright watermark image, both of which contribute to the scheme’s robustness and security. The results of the attack experiments show that the proposed vector map zero-watermarking can restore identifiable copyright images under common geometric attacks, cropping attacks, and coordinate system transformations, demonstrating a high level of robustness. The theoretical basis for the robustness of this watermarking scheme is the stability of CDTN and the geometric invariance of DFT coefficients, and both theory and experiment validate the method’s validity. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

22 pages, 4431 KB  
Article
A Self-Error-Correction-Based Reversible Watermarking Scheme for Vector Maps
by Yinguo Qiu, Jiuyun Sun and Jiaojue Zheng
ISPRS Int. J. Geo-Inf. 2023, 12(3), 84; https://doi.org/10.3390/ijgi12030084 - 21 Feb 2023
Cited by 7 | Viewed by 2337
Abstract
The existing digital watermarking schemes for vector maps focus mainly on the process of watermark embedding, while few works have been conducted on the topic of the self-optimization of watermark data in the process of watermark detection. There is thus still much room [...] Read more.
The existing digital watermarking schemes for vector maps focus mainly on the process of watermark embedding, while few works have been conducted on the topic of the self-optimization of watermark data in the process of watermark detection. There is thus still much room for accuracy improvement in watermark detection. In this paper, a model of mixed watermark data construction is built first. It constructs the error-correction codes and checking code of the original copyright watermark data and combines them to generate the final watermark data. Additionally, a lossless compression algorithm is designed for watermark data to constrain the total watermark length. Based on the constructed model, a self-error-correction-based reversible watermarking scheme is put forward for vector maps. In this scheme, map vertices are divided into non-intersecting groups first according to stability, and mixed watermark data are then embedded with respective vertex groups. Simulation results demonstrate that the watermark capacity of this scheme is 1.0000, the coordinate error caused by the watermark embedding process can be limited to no more than 0.00001 when the strength of watermark embedding is set to five, and several watermark bits can be effectively detected and corrected after watermark extraction. Experimental results and analysis show that it can strike a good balance among reversibility, invisibility, capacity and robustness. It can provide a novel solution to improve the watermark detection accuracy of digital watermarking schemes for vector maps. Full article
Show Figures

Figure 1

30 pages, 11930 KB  
Article
Efficient Biomedical Signal Security Algorithm for Smart Internet of Medical Things (IoMTs) Applications
by Achraf Daoui, Mohamed Yamni, Hicham Karmouni, Mhamed Sayyouri, Hassan Qjidaa, Saad Motahhir, Ouazzani Jamil, Walid El-Shafai, Abeer D. Algarni, Naglaa F. Soliman and Moustafa H. Aly
Electronics 2022, 11(23), 3867; https://doi.org/10.3390/electronics11233867 - 23 Nov 2022
Cited by 29 | Viewed by 3788
Abstract
Due to the rapid development of information and emerging communication technologies, developing and implementing solutions in the Internet of Medical Things (IoMTs) field have become relevant. This work developed a novel data security algorithm for deployment in emerging wireless biomedical sensor network (WBSN) [...] Read more.
Due to the rapid development of information and emerging communication technologies, developing and implementing solutions in the Internet of Medical Things (IoMTs) field have become relevant. This work developed a novel data security algorithm for deployment in emerging wireless biomedical sensor network (WBSN) and IoMTs applications while exchanging electronic patient folders (EPFs) over unsecured communication channels. These EPF data are collected using wireless biomedical sensors implemented in WBSN and IoMTs applications. Our algorithm is designed to ensure a high level of security for confidential patient information and verify the copyrights of bio-signal records included in the EPFs. The proposed scheme involves the use of Hahn’s discrete orthogonal moments for bio-signal feature vector extraction. Next, confidential patient information with the extracted feature vectors is converted into a QR code. The latter is then encrypted based on a proposed two-dimensional version of the modified chaotic logistic map. To demonstrate the feasibility of our scheme in IoMTs, it was implemented on a low-cost hardware board, namely Raspberry Pi, where the quad-core processors of this board are exploited using parallel computing. The conducted numerical experiments showed, on the one hand, that our scheme is highly secure and provides excellent robustness against common signal-processing attacks (noise, filtering, geometric transformations, compression, etc.). On the other hand, the obtained results demonstrated the fast running of our scheme when it is implemented on the Raspberry Pi board based on parallel computing. Furthermore, the results of the conducted comparisons reflect the superiority of our algorithm in terms of robustness when compared to recent bio-signal copyright protection schemes. Full article
(This article belongs to the Special Issue Intelligent Detection Methods for Cybersecurity in Healthcare)
Show Figures

Figure 1

18 pages, 5190 KB  
Article
A Novel Invariant Based Commutative Encryption and Watermarking Algorithm for Vector Maps
by Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang
ISPRS Int. J. Geo-Inf. 2021, 10(11), 718; https://doi.org/10.3390/ijgi10110718 - 25 Oct 2021
Cited by 18 | Viewed by 2610
Abstract
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods for vector maps have good robustness in resisting geometric attacks [...] Read more.
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods for vector maps have good robustness in resisting geometric attacks but poor resistance to vertex attacks (e.g., addition, deletion, etc.). To solve this problem, here we propose a novel invariant-based CEW algorithm for vector maps, which consists of permutation-based encryption scheme and coordinates-based watermarking scheme. In the encryption scheme, the encryption key is generated via the Gaussian distribution method combined with the SHA-512 hash method; then, the double random position permutation strategy is applied to the vector map encryption. In watermarking embedding scheme, the original watermark image is scrambled via logistic chaotic encryption before embedding, and the coordinates of all the vertices are normalized. Then, the scrambled watermark image is embedded into the normalized coordinates. Results show that: proposed method is more robust to conventional attacks (e.g., vertex addition and deletion, reordering and data format conversion) and geometric attacks (e.g., scaling and translation). In addition, compared with the existing CEW methods for vector maps, the proposed method has higher security and stronger robustness against vertex attacks. Full article
(This article belongs to the Special Issue Cartographic Communication of Big Data)
Show Figures

Figure 1

15 pages, 8845 KB  
Article
Vector Map Encryption Algorithm Based on Double Random Position Permutation Strategy
by Xiaolong Wang, Haowen Yan and Liming Zhang
ISPRS Int. J. Geo-Inf. 2021, 10(5), 311; https://doi.org/10.3390/ijgi10050311 - 7 May 2021
Cited by 16 | Viewed by 4585
Abstract
Encryption of vector maps, used for copyright protection, is of importance in the community of geographic information sciences. However, some studies adopt one-to-one mapping to scramble vertices and permutate the coordinates one by one according to the coordinate position in a plain map. [...] Read more.
Encryption of vector maps, used for copyright protection, is of importance in the community of geographic information sciences. However, some studies adopt one-to-one mapping to scramble vertices and permutate the coordinates one by one according to the coordinate position in a plain map. An attacker can easily obtain the key values by analyzing the relationship between the cipher vector map and the plain vector map, which will lead to the ineffectiveness of the scrambling operation. To solve the problem, a vector map encryption algorithm based on a double random position permutation strategy is proposed in this paper. First, the secret key sequence is generated using a four-dimensional quadratic autonomous hyperchaotic system. Then, all coordinates of the vector map are encrypted using the strategy of double random position permutation. Lastly, the encrypted coordinates are reorganized according to the vector map structure to obtain the cipher map. Experimental results show that: (1) one-to-one mapping between the plain vector map and cipher vector map is prevented from happening; (2) scrambling encryption between different map objects is achieved; (3) hackers cannot obtain the permutation key value by analyzing the pairs of the plain map and cipher map. Full article
(This article belongs to the Special Issue Cartographic Communication of Big Data)
Show Figures

Figure 1

20 pages, 4285 KB  
Article
Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps
by Na Ren, Yazhou Zhao, Changqing Zhu, Qifei Zhou and Dingjie Xu
ISPRS Int. J. Geo-Inf. 2021, 10(5), 294; https://doi.org/10.3390/ijgi10050294 - 3 May 2021
Cited by 34 | Viewed by 5463
Abstract
Zero watermarking does not alter the original information contained in vector map data and provides perfect imperceptibility. The use of zero watermarking for data copyright protection has become a significant trend in digital watermarking research. However, zero watermarking encounters tremendous obstacles to its [...] Read more.
Zero watermarking does not alter the original information contained in vector map data and provides perfect imperceptibility. The use of zero watermarking for data copyright protection has become a significant trend in digital watermarking research. However, zero watermarking encounters tremendous obstacles to its development and application because of its requirement to store copyright information with a third party and its difficulty in confirming copyright ownership. Aiming at the shortcomings of the existing zero watermarking technology, this paper proposes a new zero watermarking construction method based on the angular features of vector data that store the zero watermarking and copyright information on the blockchain after an XOR operation. When the watermark is being extracted, the copyright information can be extracted with the XOR operation to obtain the information stored on the blockchain. Experimental results show that the combination of zero watermarking and blockchain proposed in this paper gives full play to the advantages of the two technologies and protects the copyright of data in a lossless fashion. Compared with the traditional zero watermarking algorithms, the proposed zero watermarking algorithm exhibits stronger robustness. Moreover, the proposed data copyright protection framework with a combination of zero watermarking and blockchain can also be applied to other data types, such as images, audio, video, and remote sensing images. Full article
Show Figures

Figure 1

13 pages, 618 KB  
Article
Genuine Reversible Data Hiding Technique for H.264 Bitstream Using Multi-Dimensional Histogram Shifting Technology on QDCT Coefficients
by Jinwoo Kang, Hyunjung Kim and Sang-ug Kang
Appl. Sci. 2020, 10(18), 6410; https://doi.org/10.3390/app10186410 - 14 Sep 2020
Cited by 5 | Viewed by 2489
Abstract
Video has become the most important medium for communication among people. Video has become the most important medium for communication among people. Therefore, reversible data hiding technologies for video have been developed so that information can be hidden in the video without damaging [...] Read more.
Video has become the most important medium for communication among people. Video has become the most important medium for communication among people. Therefore, reversible data hiding technologies for video have been developed so that information can be hidden in the video without damaging the original video in order to be used in the copyright protection and distribution field of video. This paper proposes a practical and genuine reversible data hiding method by using a multi-dimensional histogram shifting scheme on QDCT coefficients in the H.264/AVC bitstream. The proposed method defines the vacant histogram bins as a set of n-dimensional vectors and finds the optimal vector space, which gives the best performance, in a 4 × 4 QDCT block. In addition, the secret message is mapped to the optimal vector space, which is equivalent to embedding the information into the QDCT block. The simulation results show that the data hiding efficiency is the highest among the compared five existing methods. In addition, the image distortion and maximum payload capacity are measured quite high. Full article
Show Figures

Figure 1

20 pages, 5469 KB  
Article
Dual Zero-Watermarking Scheme for Two-Dimensional Vector Map Based on Delaunay Triangle Mesh and Singular Value Decomposition
by Xu Xi, Xinchang Zhang, Weidong Liang, Qinchuan Xin and Pengcheng Zhang
Appl. Sci. 2019, 9(4), 642; https://doi.org/10.3390/app9040642 - 14 Feb 2019
Cited by 24 | Viewed by 3518
Abstract
Digital watermarking is important for the copyright protection of electronic data, but embedding watermarks into vector maps could easily lead to changes in map precision. Zero-watermarking, a method that does not embed watermarks into maps, could avoid altering vector maps but often lack [...] Read more.
Digital watermarking is important for the copyright protection of electronic data, but embedding watermarks into vector maps could easily lead to changes in map precision. Zero-watermarking, a method that does not embed watermarks into maps, could avoid altering vector maps but often lack of robustness. This study proposes a dual zero-watermarking scheme that improves watermark robustness for two-dimensional (2D) vector maps. The proposed scheme first extracts the feature vertices and non-feature vertices of the vector map with the Douglas-Peucker algorithm and subsequently constructs the Delaunay Triangulation Mesh (DTM) to form a topological feature sequence of feature vertices as well as the Singular Value Decomposition (SVD) matrix to form intrinsic feature sequence of non-feature vertices. Next, zero-watermarks are obtained by executing exclusive disjunction (XOR) with the encrypted watermark image under the Arnold scramble algorithm. The experimental results show that the scheme that synthesizes both the feature and non-feature information improves the watermark capacity. Making use of complementary information between feature and non-feature vertices considerably improves the overall robustness of the watermarking scheme. The proposed dual zero-watermarking scheme combines the advantages of individual watermarking schemes and is robust against such attacks as geometric attacks, vertex attacks and object attacks. Full article
Show Figures

Figure 1

Back to TopTop