GIS (geographic information system) vector data copyright authentication method based on FCM (firmware control memory) clustering feature

A technology of copyright authentication and vector data, applied in the field of geographic information security, can solve problems such as data interference, distortion, and algorithm robustness that cannot meet copyright protection

Inactive Publication Date: 2014-06-11
NANJING NORMAL UNIVERSITY
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although relevant digital watermarking technology can be used for copyright certification of GIS vector data and has been applied to some extent, there are still two shortcomings in the following aspects: 1) Copyright marks embedded in geospatial data products are easily manipulated by software-GIS software operations such as coordinate transformation and projection transformation, the robustness of the algorithm is difficult to meet the needs of copyright protection; 2) the embedding of copyright marks will cause certain interference and distortion to the original carrier data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GIS (geographic information system) vector data copyright authentication method based on FCM (firmware control memory) clustering feature
  • GIS (geographic information system) vector data copyright authentication method based on FCM (firmware control memory) clustering feature
  • GIS (geographic information system) vector data copyright authentication method based on FCM (firmware control memory) clustering feature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Further detailed description will be given below in conjunction with the accompanying drawings and embodiments.

[0037] In this example, a typical shp surface layer data is selected, and the whole process of data reading, copyright mark generation, and copyright mark authentication is further described in detail. In this embodiment, the water system linear layer data of the United States (such as figure 1 ) as experimental data, figure 2 It is the data generated after the experimental data is subjected to the rotation attack. The key value is "10010101", and the recognition threshold is 0.85.

[0038] (1) Copyright mark generation process.

[0039] Step 1: Set the number of clusters c=8 and the weight parameter m=2.

[0040] Step 2: Open the US water system line layer file F; read the horizontal and vertical coordinate information of each element node in the file into the two-dimensional array D, and the number of nodes in this embodiment is 6473.

[0041] Step 3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a GIS (geographic information system) vector data copyright authentication method based on an FCM (firmware control memory) clustering feature. According to the GIS vector data copyright authentication method, a zero watermark for GIS vector data copyright authentication is constructed according to the FCM clustering feature of a geographic element by mainly aiming at the advantage that the space clustering feature of the geographic element in the GIS vector data is stable and the characteristic that the zero watermark constructs an original watermark signal by using an important feature of original work, so that the contradiction between the imperceptibility and the robustness of a GIS vector data watermark is better solved. The copyright authentication method disclosed by the invention cannot affect the data quality, various attacks such as data editing and tailoring can be effectively resisted, and higher robustness is realized.

Description

technical field [0001] The invention belongs to the field of geographic information security, and specifically relates to a method for extracting data clustering features based on a fuzzy c-means (FCM) clustering algorithm, and performing copyright authentication of GIS vector data based on the principle of zero-watermark copyright authentication . Background technique [0002] Facing the massive characteristics and high-fidelity requirements of GIS vector data, copyright certification based on traditional copyright marking algorithms is becoming more and more powerless. Although relevant digital watermarking technology can be used for copyright certification of GIS vector data and has been applied to some extent, there are still two shortcomings in the following aspects: 1) Copyright marks embedded in geospatial data products are easily manipulated by software-GIS software The robustness of the algorithm is difficult to meet the needs of copyright protection; 2) The embedd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/16G06F17/30
CPCG06F16/29G06F21/16
Inventor 李安波朱阿兴闾国年
Owner NANJING NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products