Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Vector map integrity authentication method for locating tampered graph tuples

A vector map and authentication method technology, applied in the fields of information hiding and geographic information science, can solve the problems of positioning tampering, insufficient accurate positioning of tampered graphics elements, and inability to accurately locate graphics elements, so as to ensure reliable application, good invisibility, and guarantee The effect of reliable application

Active Publication Date: 2020-09-15
XUZHOU NORMAL UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can accurately locate the added or modified primitives, but it cannot accurately locate the deleted primitives
[0005] To sum up, although people have proposed some vector map fragile watermarking methods to try to solve the problem of locating tampering while authenticating data integrity, these methods are still insufficient in accurately locating tampered primitives.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vector map integrity authentication method for locating tampered graph tuples
  • Vector map integrity authentication method for locating tampered graph tuples
  • Vector map integrity authentication method for locating tampered graph tuples

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Below in conjunction with accompanying drawing and example technical solution of the present invention is described further:

[0043] Such as figure 1 As shown, the flow chart of the vector map integrity authentication method for locating and tampering tuple groups of the present invention is generally divided into two aspects: A, vector map watermark embedding algorithm; B, vector map watermark authentication algorithm.

[0044] A. Vector map watermark embedding algorithm, the steps are as follows:

[0045] (1) Primitive vertex classification;

[0046] The vertices of vector map primitives are divided into two categories: labeled vertices and non-labeled vertices. The marked vertex is used to embed the group information (namely the mark) of the primitive group to which the primitive belongs, and the non-marked vertex can embed the authentication watermark. Treat the first and last vertices of each line primitive as its labeled vertices, and the other vertices as non...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a vector map integrity authentication method for tampered primitive set positioning. The method comprises steps of primitive vertex classification, adaptive primitive set division based on a simulated annealing method, authentication watermark generation, authentication watermark embedding, primitive marking, watermark authentication, and non-destructive original data restoration. With the simulated annealing method, vector map primitives are divided into different groups adaptively. On the premise that the precision error tolerance of the vector map is considered, watermark authentication and primitive set information embedding are realized by using a reversible information hiding method, so that the tampered primitive can be localized accurately, the invisibility is high, and no extra storage space is needed. In addition, with the vector map integrity authentication method, at the watermark authentication stage, the tampered primitive set can be localized accurately, the original vector map data can be restored in a non-destructive manner after watermark authentication to guarantee reliable application of the vector map data.

Description

technical field [0001] The invention relates to the fields of geographic information science and information hiding, in particular to a vector map integrity authentication method for locating and tampering graph element groups. Background technique [0002] With the rapid development of geographic information processing technology and communication technology, vector maps have been widely used in navigation, urban planning, transportation, cadastral management and other fields. Obtaining high-precision vector map data requires a lot of manpower and material resources, but with the help of powerful geographic information processing tools and public networks, people can easily and quickly copy, modify and publish these vector data. How to authenticate the integrity and authenticity of vector maps and ensure the safe application of vector maps is an urgent problem to be solved. [0003] Fragile watermarking method for vector maps is an effective method for authenticating data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06T1/00
CPCG06T1/0021G06T2201/0065
Inventor 王娜娜
Owner XUZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products