Vector map integrity authentication method for positioning tampered area
A vector map, authentication method technology, applied in the fields of information hiding and geographic information science, can solve problems such as inability to effectively indicate the original position of tampered vertices or primitives, serious or even catastrophic, inability to accurately locate all areas, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0044] Such as figure 1 As shown, a vector map integrity authentication method for locating tampered areas, the method is generally divided into two aspects: A, vector map watermark embedding algorithm; B, vector map watermark authentication algorithm.
[0045] A. Vector map watermark embedding algorithm, the steps are as follows:
[0046] (1) Primitive vertex classification;
[0047] The vertices of vector map (line or area) primitives are divided into three categories: information vertices, marker vertices and reference vertices. The information vertex is used to embed the authentication watermark of the data unit where the graphic element is located and the location information of its associated data unit; the marking vertex is used to mark the data unit where the graphic element is located; the reference vertex is used to assist the marking of each graphic element and its location The embedding of the authentication watermark of the data unit and the location information...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com