[go: up one dir, main page]

Le et al., 2023 - Google Patents

A Robust Integrated Watermarking Algorithm for Vector Geographic Data Copyright Protection

Le et al., 2023

View PDF
Document ID
14516219229347737778
Author
Le H
Le H
Nguyen D
et al.
Publication year

External Links

Snippet

Vector geographic data play an important role in the natural resources and environment sector and other location information services. This is also one of the types of data where the cost to create it is relatively large because of the difficulty in surveying, collecting, and …
Continue reading at www.preprints.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0063Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/07Indexing scheme relating to G06F21/10, protecting distributed programs or content
    • G06F2221/0722Content
    • G06F2221/0737Traceability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0202Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Similar Documents

Publication Publication Date Title
Wang et al. Reversible fragile watermarking for 2-D vector map authentication with localization
Wang et al. Reversible fragile watermarking for locating tampered blocks in 2D vector maps
Wang et al. Watermarking geographical data on spatial topological relations
Wang et al. Hamming code based watermarking scheme for 3D model verification
CN116805069B (en) Track data zero watermark generation method, track data zero watermark detection device and storage medium
Tzeng et al. An asymmetric subspace watermarking method for copyright protection
Jang et al. A crypto-marking method for secure vector map
Li et al. Copyright authentication of digital vector maps based on spatial autocorrelation indices
Nassar et al. Reliable mark-embedded algorithm for verifying archived/encrypted image contents in presence different attacks with FEC utilizing consideration
Peng et al. A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
Wang et al. RST invariant fragile watermarking for 2D vector map authentication
CN111242825A (en) A zero-watermark method for ENC electronic nautical charts based on bathymetric features
Le et al. A Robust Integrated Watermarking Algorithm for Vector Geographic Data Copyright Protection
AlShaikh Robust and recovery watermarking approach based on SVD and OTP encryption
Madushanka et al. SecureRights: A blockchain-powered trusted DRM framework for robust protection and asserting digital rights
Umar et al. I-Marks: An iris code embedding system for ownership identification of multimedia content
Wang et al. 2D vector map fragile watermarking with region location
CN116522289B (en) Multi-view image copyright protection method, device and medium based on blockchain
Sion et al. Power: A metric for evaluating watermarking algorithms
Liu et al. A Cloud‐User Protocol Based on Ciphertext Watermarking Technology
Pham et al. Perceptual encryption based on features of interpolating curve for vector map
CN103903218A (en) Robust geographic data watermarking method for public ownership verification
Zhang et al. Digital Image Copyright Protection Method Based on Blockchain and Perceptual Hashing
Tantriawan et al. Watermarking Study on The Vector Map
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking