Skip to main content

Reversible Fragile Watermarking for Fine-Grained Tamper Localization in Spatial Data

  • Conference paper
  • First Online:
Databases Theory and Applications (ADC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10538))

Included in the following conference series:

Abstract

Spatial data has been widely used in many areas. Meanwhile, the increasingly simplified data access and manipulation methods in spatial data related applications make it important to verify data truthfulness. In this paper, we propose a reversible fragile watermarking scheme for the content authentication of spatial data. The proposed scheme embeds (detects) four kinds of watermarks, i.e., group, object, vertex-local and vertex-global watermarks, into (from) each object (vertex) by altering the digits of the coordinates after the LSD (Least Significant Digit). According to the detection results of those four kinds of watermarks, the scheme can not only locate tampers, but also recognize modification types on both object and vertex levels. In addition, the proposed scheme is reversible, that is the original data can be restored from the watermarked data. The feature of reversibility makes the scheme suitable for applications which require high-precision data.

Y. Peng—This work is supported by the National Natural Science Foundation of China under grant (No.61100019).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lin, C.E., Kao, C.M., Lai, Y.C., Shan, W.L., Wu, C.Y.: Application of integrated GIS and multimedia modeling on NPS pollution evaluation. Environ. Monit. Assess. 158(11), 319–331 (2009)

    Article  Google Scholar 

  2. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding: a survey. Proc. IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  3. Peng, F., Guo, R.S., Li, C.T., Long, M.: A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. CAD 12, 1207–1216 (2012)

    Google Scholar 

  4. Cao, L., Men, C., Gao, Y.: A recursive embedding algorithm towards lossless 2D vector map watermarking. DSP 23, 912–918 (2013)

    MathSciNet  Google Scholar 

  5. Guo, J.M., Liu, Y.F.: Continuous-tone watermark hiding in halftone images. In: Proceedings of the 16th International Asia-Pacific Web Conference on Web Technologies and Applications, pp. 411–414 (2010)

    Google Scholar 

  6. Guting, R.H.: An introduction to spatial database systems. VLDBJ 3(4), 357–399 (1994)

    Article  Google Scholar 

  7. Wu, C.-C., Chang, C.-C., Yang, S.-R.: An efficient fragile watermarking for web pages tamper-proof. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM -2007. LNCS, vol. 4537, pp. 654–663. Springer, Heidelberg (2007). doi:10.1007/978-3-540-72909-9_72

    Chapter  Google Scholar 

  8. Kee, E., Johnson, M.K., Farid, H.: Digital image authentication from JPEG headers. IEEE Trans. Inf. Forensics Secur. 6(3), 1066–1075 (2011)

    Article  Google Scholar 

  9. Sarreshtedari, S., Akhaee, M.A.: A source-channel coding approach to digital image protection and self-recovery. IEEE Trans. Image Process. 24(7), 2266–2277 (2015)

    Article  MathSciNet  Google Scholar 

  10. Li, W., Zhu, B., Wang, Z.: On the music content authentication. In: Proceedings of ACM International Conference on Multimedia, pp. 1101–1104 (2012)

    Google Scholar 

  11. Upadhyay, S., Singh, S.K.: Video authentication: issues and challenges. Int. J. Comput. Sci. 9(1–3), 409–418 (2012)

    Google Scholar 

  12. Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176, 1350–1378 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  13. Niu, X.M., Shao, C.Y., Wang, X.T.: A survey of digital vector map watermarking. Int. J. Innov. Comput. Inf. Control 2(6), 1301–1316 (2006)

    Google Scholar 

  14. Niu, X.M., Shao, C.Y., Wang, X.T.: GIS watermarking: hiding data in 2D vector maps. In: Pan, J.S., Huang, H.C., Jain, L.C., Fang, W.C. (eds.) Intelligent Multimedia Data Hiding. SCI, vol. 58, pp. 123–155. Springer, Heidelberg (2007). doi:10.1007/978-3-540-71169-8_6

    Chapter  Google Scholar 

  15. Rao, U.P., Patel, D.R., Vikani, P.M.: Relational database watermarking for ownership protection. Procedia Technol. 6, 988–995 (2012)

    Article  Google Scholar 

  16. Zheng, L., You, F.: A fragile digital watermark used to verify the integrity of vector map. In: Proceedings of IEEE International Conference on E-Business and Information System Security, pp. 1–4 (2009)

    Google Scholar 

  17. Wang, N., Men, C.: Reversible fragile watermarking for locating tampered blocks in 2D vector maps. In: Multimedia Tools and Applications, pp. 1–31 (2013)

    Google Scholar 

  18. Zhang, H., Gao, M.: A Semi-fragile digital watermarking algorithm for 2D vector graphics tamper localization. In: Proceedings of IEEE International Conference on Multimedia Information Networking and Security, vol. 1, pp. 549–552 (2009)

    Google Scholar 

  19. Zheng, L., Li, Y., Feng, L., Liu, H.: Research and implementation of fragile watermark for vector graphics. In: Proceedings of IEEE International Conference on Computer Engineering and Technology, vol. 1, pp. V1-522–V1-525 (2010)

    Google Scholar 

  20. Wang, N., Men, C.: Reversible fragile watermarking for 2-D vector map authentication with localization. Comput. Aided Des. 44(4), 320–330 (2012)

    Article  Google Scholar 

  21. Schneier, B.: Applied Cryptography. Wiley, Chichester (1996)

    MATH  Google Scholar 

  22. Cohen, S.D., Guibas, L.J.: Partial matching of planar polylines under similarity transformations. In: Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, pp. 777–786 (1997)

    Google Scholar 

  23. IEEE Standard for Binary Floating-point Arithmetic. ANSI/IEEE Standard 754–1985

    Google Scholar 

  24. Yue, M., Peng, Z., Peng, Y.: A fragile watermarking scheme for modification type characterization in 2D vector maps. In: Chen, L., Jia, Y., Sellis, T., Liu, G. (eds.) APWeb 2014. LNCS, vol. 8709, pp. 129–140. Springer, Cham (2014). doi:10.1007/978-3-319-11116-2_12

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuwei Peng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lan, H., Peng, Y. (2017). Reversible Fragile Watermarking for Fine-Grained Tamper Localization in Spatial Data. In: Huang, Z., Xiao, X., Cao, X. (eds) Databases Theory and Applications. ADC 2017. Lecture Notes in Computer Science(), vol 10538. Springer, Cham. https://doi.org/10.1007/978-3-319-68155-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68155-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68154-2

  • Online ISBN: 978-3-319-68155-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics