Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vector map integrity authentication method for positioning tampered area

A vector map, authentication method technology, applied in the fields of information hiding and geographic information science, can solve problems such as inability to effectively indicate the original position of tampered vertices or primitives, serious or even catastrophic, inability to accurately locate all areas, etc.

Active Publication Date: 2017-06-23
XUZHOU NORMAL UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These results can detect and locate tampered data units, but cannot effectively indicate the original location of tampered vertices or primitives
That is, being able to indicate a tampered primitive or vertex as tampered, and its original area as usable, does not accurately locate all areas affected by tampering
Once these tampered areas indicated as usable are applied, especially in some application scenarios that have strict requirements on available areas, such as emergency response and site selection analysis, it will cause extremely serious or even catastrophic consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vector map integrity authentication method for positioning tampered area
  • Vector map integrity authentication method for positioning tampered area
  • Vector map integrity authentication method for positioning tampered area

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Such as figure 1 As shown, a vector map integrity authentication method for locating tampered areas, the method is generally divided into two aspects: A, vector map watermark embedding algorithm; B, vector map watermark authentication algorithm.

[0045] A. Vector map watermark embedding algorithm, the steps are as follows:

[0046] (1) Primitive vertex classification;

[0047] The vertices of vector map (line or area) primitives are divided into three categories: information vertices, marker vertices and reference vertices. The information vertex is used to embed the authentication watermark of the data unit where the graphic element is located and the location information of its associated data unit; the marking vertex is used to mark the data unit where the graphic element is located; the reference vertex is used to assist the marking of each graphic element and its location The embedding of the authentication watermark of the data unit and the location information...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vector map integrity authentication method for positioning a tampered area. The method comprises the steps of classifying primitive vertexes, dividing data units based on the simulated annealing method, associating the primitive vertexes with the data units, constructing the positioning information, generating an authentication watermark, embedding the positioning information and the authentication watermark, marking primitives, conducting the watermark authentication and positioning the tampered area. According to the technical scheme of the invention, based on the simulated annealing method, the primitives of a vector map are divided into different data units, and a mark is added into each primitive for indicating the data unit of the above primitive. An associated data unit is assigned to each data unit and then the positioning information is constructed. Meanwhile, according to the quantization-based information hiding method, the embedding of the authentication watermark and the embedding of the positioning information in the associated data unit are realized. As a result, a tampered data unit and the original area thereof are accurately positioned, and the reliable application of the vector map is ensured. Meanwhile, the rotation operation, the uniform scaling operation and the translation operation can be tolerated at the same time. The disturbance caused by the embedding of the information into the vector map can be effectively controlled, and the quality of the watermark-contained vector map is effectively controlled.

Description

technical field [0001] The invention relates to the fields of geographic information science and information hiding, and specifically relates to a vector map integrity authentication method for locating tampered areas. Background technique [0002] With the rapid development of communication technology and geographic information processing technology, vector maps have been widely used in various fields of national economy. Using the public network and geographic information processing tools, people can easily and quickly copy, modify and publish these high-precision vector data. At the same time, this also makes vector maps face the danger of illegal tampering and dissemination. How to effectively authenticate the authenticity and integrity of vector map data and ensure the reliable application of vector map has become an urgent problem to be solved. [0003] Fragile watermarking method is an effective way to authenticate data integrity. Compared with the traditional digi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06T1/00
CPCG06T1/0064G06T2201/0201
Inventor 赵向军王娜娜郭小荟
Owner XUZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products