A copyright authentication method for gis vector data based on fcm clustering features

A technology for copyright authentication and vector data, applied in the field of geographic information security, which can solve the problems of algorithm robustness difficult to meet copyright protection, distortion, data interference, etc.

Inactive Publication Date: 2016-09-14
NANJING NORMAL UNIVERSITY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although relevant digital watermarking technology can be used for copyright certification of GIS vector data and has been applied to some extent, there are still two shortcomings in the following aspects: 1) The copyright mark embedded in geospatial data products is easy to be manipulated by the software - GIS software operations such as coordinate transformation and projection transformation, the robustness of the algorithm is difficult to meet the needs of copyright protection; 2) the embedding of copyright marks will cause certain interference and distortion to the original carrier data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A copyright authentication method for gis vector data based on fcm clustering features
  • A copyright authentication method for gis vector data based on fcm clustering features
  • A copyright authentication method for gis vector data based on fcm clustering features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Further detailed description will be given below in conjunction with the accompanying drawings and embodiments.

[0037] This example selects a typical shp surface layer data, and further describes the present invention in detail for the entire process of data reading, copyright mark generation, and copyright mark authentication. This embodiment selects the water system linear layer data of the United States (such as figure 1 ) as experimental data, figure 2 It is the data generated after the experimental data is subjected to the rotation attack. The key value is "10010101", and the recognition threshold is 0.85.

[0038] (1) Copyright mark generation process.

[0039] Step 1: Set the number of clusters c=8 and the weight parameter m=2.

[0040] Step 2: Open the US water system line layer file F; read the horizontal and vertical coordinate information of each element node in the file into the two-dimensional array D, and the number of nodes in this embodiment is 64...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a GIS (geographic information system) vector data copyright authentication method based on an FCM (firmware control memory) clustering feature. According to the GIS vector data copyright authentication method, a zero watermark for GIS vector data copyright authentication is constructed according to the FCM clustering feature of a geographic element by mainly aiming at the advantage that the space clustering feature of the geographic element in the GIS vector data is stable and the characteristic that the zero watermark constructs an original watermark signal by using an important feature of original work, so that the contradiction between the imperceptibility and the robustness of a GIS vector data watermark is better solved. The copyright authentication method disclosed by the invention cannot affect the data quality, various attacks such as data editing and tailoring can be effectively resisted, and higher robustness is realized.

Description

technical field [0001] The invention belongs to the field of geographic information security, and specifically relates to a method for extracting data clustering features based on a fuzzy c-means (FCM) clustering algorithm, and performing copyright authentication of GIS vector data based on the principle of zero-watermark copyright authentication . Background technique [0002] Facing the massive characteristics and high-fidelity requirements of GIS vector data, copyright certification based on traditional copyright marking algorithms is becoming more and more powerless. Although the relevant digital watermarking technology can be used for copyright authentication of GIS vector data and has been applied to some extent, there are still two shortcomings in the following aspects: 1) The copyright mark embedded in the geospatial data product is easy to be manipulated by the software - GIS software The robustness of the algorithm is difficult to meet the needs of copyright prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/16G06F17/30
CPCG06F16/29G06F21/16
Inventor 李安波朱阿兴闾国年
Owner NANJING NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products