A Fragile Watermarking Scheme for Modification Type Characterization in 2D Vector Maps

  • Mingliang Yue
  • Zhiyong Peng
  • Yuwei Peng
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8709)


As the most important geographical data, 2D vector maps have been widely used in various areas. Meanwhile, the increasingly simplified data access and manipulation methods in geographical data related applications make it important to verify data truthfulness. In this paper, we propose a fragile watermarking scheme for the content authentication of 2D vector maps. The scheme embeds (detects) two kinds of watermarks, i.e., group watermark and object watermark, into (from) each object. Based on the patterns extracted from the detection results, the scheme can not only detect and locate data modifications, but also characterize modification types. Both theoretical analysis and experimental evaluation are carried out to verify the fragility of the proposed scheme.


Vector maps Content authentication Fragile watermarking Modification characterization 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Lin, C.E., Kao, C.M., Lai, Y.C., Shan, W.L., Wu, C.Y.: Application of Integrated GIS and Multimedia Modeling on NPS Pollution Evaluation. Environmental Monitoring and Assessment 158(11), 319–331 (2009)CrossRefGoogle Scholar
  2. 2.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding: A Survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)CrossRefGoogle Scholar
  3. 3.
    Guo, J.M., Liu, Y.F.: Continuous-tone Watermark Hiding in Halftone Images. In: Proceedings of the 16th International Asia-Pacific Web Conference on Web Technologies and Applications, pp. 411–414 (2010)Google Scholar
  4. 4.
    Wu, C.-C., Chang, C.-C., Yang, S.-R.: An Efficient Fragile Watermarking for Web Pages Tamper-Proof. In: Chang, K.C.-C., Wang, W., Chen, L., Ellis, C.A., Hsu, C.-H., Tsoi, A.C., Wang, H. (eds.) APWeb/WAIM 2007. LNCS, vol. 4537, pp. 654–663. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  5. 5.
    Kee, E., Johnson, M.K., Farid, H.: Digital Image Authentication from JPEG Headers. IEEE Transactions on Information Forensics and Security 6(3), 1066–1075 (2011)CrossRefGoogle Scholar
  6. 6.
    Li, W., Zhu, B., Wang, Z.: On the music content authentication. In: Proc. of ACM International Conference on Multimedia, pp. 1101–1104 (2012)Google Scholar
  7. 7.
    Upadhyay, S., Singh, S.K.: Video Authentication: Issues and Challenges. International Journal of Computer Science 9(1-3), 409–418 (2012)Google Scholar
  8. 8.
    Guo, H., Li, Y., Liu, A., Jajodia, S.: A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations. Information Sciences 176, 1350–1378 (2006)CrossRefzbMATHMathSciNetGoogle Scholar
  9. 9.
    Niu, X.M., Shao, C.Y., Wang, X.T.: A Survey of Digital Vector Map Watermarking. International Journal of Innovative Computing, Information and Control 2(6), 1301–1316 (2006)Google Scholar
  10. 10.
    Guting, R.H.: An Introduction to Spatial Database Systems. The VLDBJ 3(4), 357–399 (1994)CrossRefGoogle Scholar
  11. 11.
    Zheng, L., You, F.: A Fragile Digital Watermark Used to Verify the Integrity of Vector Map. In: Proc. of IEEE International Conference on E-Business and Information System Security, pp. 1–4 (2009)Google Scholar
  12. 12.
    Wang, N., Men, C.: Reversible Fragile Watermarking for Locating Tampered Blocks in 2D Vector Maps. In: Multimedia Tools and Applications, pp. 1–31 (2013)Google Scholar
  13. 13.
    Zhang, H., Gao, M.: A Semi-fragile Digital Watermarking Algorithm for 2D Vector Graphics Tamper Localization. In: Proc. of IEEE International Conference on Multimedia Information Networking and Security, vol. 1, pp. 549–552 (2009)Google Scholar
  14. 14.
    Zheng, L., Li, Y., Feng, L., Liu, H.: Research and Implementation of Fragile Watermark for Vector Graphics. In: Proc. of IEEE International Conference on Computer Engineering and Technology, vol. 1, pp. V1-522–V1-525 (2010)Google Scholar
  15. 15.
    Wang, N., Men, C.: Reversible Fragile Watermarking for 2-D Vector Map Authentication with Localization. Computer-Aided Design 44(4), 320–330 (2012)CrossRefGoogle Scholar
  16. 16.
    Schneier, B.: Applied Cryptography. John Wiley and Sons (1996)Google Scholar
  17. 17.
    Cohen, S.D., Guibas, L.J.: Partial Matching of Planar Polylines under Similarity Transformations. In: Proc. of the ACM-SIAM Symposium on Discrete Algorithms, pp. 777–786 (1997)Google Scholar
  18. 18.
    IEEE Standard for Binary Floating-point Arithmetic. ANSI/IEEE Standard 754-1985Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Mingliang Yue
    • 1
  • Zhiyong Peng
    • 1
  • Yuwei Peng
    • 1
  1. 1.Computer SchoolWuhan UniversityWuhanChina

Personalised recommendations