Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A Vector Map Integrity Authentication Method

A vector map, authentication method technology, applied in the field of geographic information science and information hiding, which can solve the problems of insufficient accurate positioning of tampered areas, inability to accurately locate tampered areas, and inability to accurately locate all areas.

Active Publication Date: 2019-01-25
XUZHOU NORMAL UNIVERSITY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these results are not yet effective indicators of tampering with the original position of vertices or primitives
That is, being able to indicate a tampered primitive or vertex as tampered, and its original area as usable, does not accurately locate all areas affected by tampering
Once these tampered areas indicated as usable are applied, especially in some application scenarios that have strict requirements on available areas, such as emergency response and site selection analysis, it will cause extremely serious or even catastrophic consequences
[0004] In summary, although people have proposed some vector map fragile watermarking methods to try to solve the problem of locating tampering while authenticating data integrity, these methods are still insufficient in accurately locating tampered areas
[0005] In addition, the patent application number CN201210566500, titled "a multi-level authentication method for the integrity of shp line surface layer"; the patent application number CN201210189469, titled "a digital vector map integrity protection method"; the patent application number CN201210142896 , the Chinese patent document titled "A Fragile Watermarking Technology for Shp Line and Surface Layer Based on Chaotic Mapping" also involves the issue of vector map integrity authentication, but it is different from the method used in this patent application, and the tampered area cannot be accurately located

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Vector Map Integrity Authentication Method
  • A Vector Map Integrity Authentication Method
  • A Vector Map Integrity Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] Below in conjunction with accompanying drawing and example technical solution of the present invention is described further:

[0071] Such as figure 1 As shown, a flow chart of a vector map integrity authentication method of the present invention, the method is generally divided into two aspects: A, vector map watermark embedding algorithm; B, vector map watermark authentication algorithm.

[0072] A. Vector map watermark embedding algorithm, the steps are as follows:

[0073] (1) Primitive vertex classification;

[0074] The vertices of vector map (line or area) primitives are divided into two categories: marked vertices and non-marked vertices. The marked vertex is used to mark the data unit where the graphic element is located, and the non-marked vertex can embed authentication watermark and positioning information. Treats the first and last vertices of each line primitive as its flagged vertices and the others as non-flagged vertices; treats the second and penult...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vector map integrity authentication method. The method comprises the following steps of classifying primitive vertexes; dividing data units; associating the data units; constructing locating information; generating an authentication watermark; embedding the authentication watermark and the locating information; marking primitives; and performing watermark authentication and original data lossless recovery. According to the method, the primitives of a vector map (line or surface) are divided into different data units; the associated data units are allocated to the data units and the locating information of the data units is constructed; the embedding of the authentication watermark and the embedding of the locating information in the associated data units are realized by utilizing a reversible information hiding method; and the data units which the primitives belong to are marked, thereby ensuring accurate locating of the tampered data units and recovery of original data of the non-tampered data units. In addition, original regions of the tampered data units can be accurately located by utilizing the locating information stored in the associated data units of the tampered data units, thereby ensuring reliable application of vector map data.

Description

technical field [0001] The invention relates to the fields of geographic information science and information hiding, and specifically relates to a vector map integrity authentication method. Background technique [0002] With the rapid development of geographic information processing technology and the Internet, vector maps have been widely used in various fields of national economy. Vector maps accurately describe geographic information, but using existing geographic information processing tools and public networks, people can easily and quickly copy, modify, and publish these high-precision vector data. Effectively verifying the integrity and authenticity of vector maps to ensure the reliable application of vector maps has become an urgent problem to be solved. [0003] Fragile watermarking method for vector maps is an effective method for authenticating data integrity. At present, there have been some important research results on fragile watermarking algorithms for vec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/64G06T1/00
CPCG06F21/64G06T1/0042G06T2201/005
Inventor 王娜娜
Owner XUZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products