Le et al., 2023 - Google Patents
A Robust Integrated Watermarking Algorithm for Vector Geographic Data Copyright ProtectionLe et al., 2023
View PDF- Document ID
- 14516219229347737778
- Author
- Le H
- Le H
- Nguyen D
- et al.
- Publication year
External Links
Snippet
Vector geographic data play an important role in the natural resources and environment sector and other location information services. This is also one of the types of data where the cost to create it is relatively large because of the difficulty in surveying, collecting, and …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/07—Indexing scheme relating to G06F21/10, protecting distributed programs or content
- G06F2221/0722—Content
- G06F2221/0737—Traceability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | Reversible fragile watermarking for 2-D vector map authentication with localization | |
Wang et al. | Reversible fragile watermarking for locating tampered blocks in 2D vector maps | |
Wang et al. | Watermarking geographical data on spatial topological relations | |
Wang et al. | Hamming code based watermarking scheme for 3D model verification | |
CN116805069B (en) | Track data zero watermark generation method, track data zero watermark detection device and storage medium | |
Tzeng et al. | An asymmetric subspace watermarking method for copyright protection | |
Jang et al. | A crypto-marking method for secure vector map | |
Li et al. | Copyright authentication of digital vector maps based on spatial autocorrelation indices | |
Nassar et al. | Reliable mark-embedded algorithm for verifying archived/encrypted image contents in presence different attacks with FEC utilizing consideration | |
Peng et al. | A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation | |
Wang et al. | RST invariant fragile watermarking for 2D vector map authentication | |
CN111242825A (en) | A zero-watermark method for ENC electronic nautical charts based on bathymetric features | |
Le et al. | A Robust Integrated Watermarking Algorithm for Vector Geographic Data Copyright Protection | |
AlShaikh | Robust and recovery watermarking approach based on SVD and OTP encryption | |
Madushanka et al. | SecureRights: A blockchain-powered trusted DRM framework for robust protection and asserting digital rights | |
Umar et al. | I-Marks: An iris code embedding system for ownership identification of multimedia content | |
Wang et al. | 2D vector map fragile watermarking with region location | |
CN116522289B (en) | Multi-view image copyright protection method, device and medium based on blockchain | |
Sion et al. | Power: A metric for evaluating watermarking algorithms | |
Liu et al. | A Cloud‐User Protocol Based on Ciphertext Watermarking Technology | |
Pham et al. | Perceptual encryption based on features of interpolating curve for vector map | |
CN103903218A (en) | Robust geographic data watermarking method for public ownership verification | |
Zhang et al. | Digital Image Copyright Protection Method Based on Blockchain and Perceptual Hashing | |
Tantriawan et al. | Watermarking Study on The Vector Map | |
Dadkhah et al. | Efficient image authentication and tamper localization algorithm using active watermarking |