Uploaded by Jerry Chou

Rich-information reversible watermarking scheme of vector maps

advertisement
Multimedia Tools and Applications (2019) 78:24955–24977
https://doi.org/10.1007/s11042-019-7681-6
Rich-information reversible watermarking scheme
of vector maps
Yinguo Qiu 1 & Hongtao Duan 1 & Jiuyun Sun 2 & Hehe Gu 2
Received: 18 June 2018 / Revised: 11 February 2019 / Accepted: 24 April 2019 /
Published online: 16 May 2019
# Springer Science+Business Media, LLC, part of Springer Nature 2019
Abstract
With the increasing rampant infringements of vector maps, rich-information watermarking
technology is being more and more essential for forceful copyright declaration. Most of the
existing watermarking algorithms of vector maps, however, cannot embed abundant copyright
information. In this paper, a rich-information and reversible watermarking scheme is proposed
for vector maps based on the ideas of compression coding of watermarking image and
decimal-hex conversion of vertex coordinates. It recodes the original watermarking image to
shorten the length of the final watermark data and groups map vertices to choose cover data for
watermark embedding. And the reversible embedding is then carried out by modifying the
polar coordinates of map vertices. While the proposed compression coding method of
watermarking image and the decimal-hex conversion of map vertices guarantee the embedding
of rich-information watermark data, the reversible watermarking method provides recovery of
the original map content. Comprehensive experimental results show that the proposed scheme
is suitable for vector map applications where abundant copyright information is required while
the number of map vertices is limited.
Keywords Rich-information watermarking . Reversible watermarking . Vector map . Copyright
protection
1 Introduction
Big spatial data, the main data set of big data, forms the basic framework and spatial datum for
describing various geo-objects and phenomena in the era of big data. As the basic component of big
* Hehe Gu
qiuyinguo@foxmail.com
1
Key Laboratory of Watershed Geographic Sciences, Nanjing Institute of Geography and Limnology,
Chinese Academy of Sciences, Nanjing 210008, China
2
School of Environment Science and Spatial Informatics, China University of Mining and Technology,
Xuzhou 221116, China
24956
Multimedia Tools and Applications (2019) 78:24955–24977
spatial data, vector maps are playing a more and more important role in all walks of life in the
construction of national economy [26]. On the one hand, vector maps need to make breakthroughs
in data opening and sharing to make full use of their own value [24]. On the other hand, the content
of vector maps is of both high positioning precision and high production cost [22], and the rights of
map owners, the sharing of map data and even the national security will be affected in the event of
piracy, tampering, illegal dissemination, etc. Accordingly, it is an urgent problem to realize copyright
protection of vector maps in the environment of data sharing.
In the past decades, steganography [1–5, 9, 10, 12–16] and digital watermarking [6, 7, 11,
17–21, 23, 25] have been widely employed for security protection of various digital products.
Traditional methods, however, may cause distortion to the original data and affect its value in
use to a certain extent. Consequently, reversible watermarking, also known as lossless
watermarking, has been considered as a promising solution for copyright protection of digital
products. Under this background, reversible watermarking technology has been applied to the
area of copyright protection of vector maps, and lots of efficient algorithms have been
proposed. The research emphases of current reversible watermarking schemes of vector maps
are algorithms of watermark embedding and extraction, while few works have been done
focusing on rich-information watermark generation and embedding. Voigt et al. [20] proposed
a reversible watermarking scheme, in which watermarks are embedded by modifying the
coefficients in the 8-point integer DCT domain. To improve the watermark capacity, Voigt
et al. [21] proposed another optimized algorithm, exploiting both a bit-shift method and a
distortion-limitation scheme to guarantee a maximal map difference after watermark embedding. Watermarking algorithms in [20, 21] focus on the selection of the best watermark
embedding position, which have been considered as two representative watermarking algorithms of vector maps. Another reversible watermarking algorithm was proposed for vector
maps by Yang et al. [25] based on coordinate mapping, which realizes the blind detection and
extraction of watermarks by constructing mapping relationship between embedding position
and watermark bits. Nevertheless, the watermark data of the scheme in [25] consists of only
several simple characters, and it cannot express efficaciously rich copyright information. Cao
et al. [6, 7] proposed two improved reversible watermarking algorithms for vector maps based
on nonlinear scrambling [6] and iterative embedding [7], and some progress has been made by
them in enhancing the robustness and capacity of watermarking algorithms. The performance
of their algorithms with regard to rich copyright information expression, however, is not
significantly improved. Qiu et al. [17] proposed a reversible watermarking algorithm of vector
maps, which focuses on the detection and correction of error bits after watermark extraction. In
the algorithm in [17], the final watermark data consists of both the copyright watermark data
and its corresponding ECC, which is conducive to the robustness improvement of the
watermarking algorithm. This scheme, however, has little contribution to rich-information
watermark embedding, and complex copyright information embedding is still not supported.
Another watermark algorithm was put forward by Sun et al. [19] based on BP neural network,
in which watermarks are converted to binary bits and manipulated as the coefficients of neural
network. The scheme in [19] is robust and with preferable invisibility, but its performance in
the respect of rich-information watermark embedding is not promoted obviously. With the
purpose of embedding more watermark bits, Xiao et al. [23] designed a reversible
watermarking algorithm for 2D CAD vector graphics based on an improved difference
expansion method. By improving the watermark embedding capacity, this scheme improves
the length of the original copyright information to a certain extent. Qiu et al. [18] presented a
high-payload reversible watermarking scheme of vector maps based on QR code, which
Multimedia Tools and Applications (2019) 78:24955–24977
24957
realizes the embedding of rich-information watermark embedding to some extent by taking a
QR code as the container of copyright information.
In summary, the existing watermarking schemes of vector maps mostly concentrate on the
methods of watermark embedding and extraction, while little attention has been paid to the
generation and embedding methods of rich-information watermark data. With the increasingly
rampant torts of vector maps, rich-information watermark data is being more and more
significant for powerfully declaring of ownership. In the case of a limited number of vertices,
researchers used to improve watermark capacity to the best of their ability, for the purpose of
embedding more watermark information into vector maps. The effect, however, is not ideal. In
some special applications, where the number of map vertices is limited and rich copyright
information is required, current watermarking algorithms cannot meet the demand.
To fill this gap, a novel rich-information reversible watermarking algorithm is put forward
for vector maps in this paper, based on the compression coding method of watermarking image
and the decimal-hex conversion of vertex coordinates. The original watermarking image,
containing rich copyright information, is firstly losslessly compression coded to shorten the
length of the final watermark data, so that the robustness of this scheme can be guaranteed
under the condition of rich-information watermark embedding. After watermark extraction, the
original watermarking image can be generated by decompressing the extracted watermark
data. The most important innovation of this paper is that the length of final watermark data is
reduced significantly exploiting the designed lossless compression coding method, which will
also be a certain reference for some other technically related applications, e.g., steganography,
data hiding, etc.
The rest of this paper is organized as follows. Section 2 describes the basic principle of
lossless compression coding of watermarking image. Then, the designed rich-information and
reversible watermarking scheme of vector maps is introduced in detail in Section 3. Finally,
performance study and conclusions are given in Section 4 and Section 5, respectively.
2 Compression & decompression coding of watermarking image
2.1 Compression coding of watermarking image
For a given meaning of copyright information, whether its type is text, sound, image or video,
it is generally required to be converted into a sequence of binary values (0 and 1, or 1 and − 1),
so that it can be embedded expediently into the host data. Accordingly, binary images are
usually exploited in common digital watermarking algorithms, as the carrier of copyright
information. Given a a × b (unit: pixel) watermarking image s, the process of compression
coding can be demonstrated as follows:
(1) Divide s into several 2 × 2 blocks. It is obviously that both a and b should be even
numbers, so that the division process can be successfully completed. Here, if a (resp. b) is
an odd number, a new column (resp. row) on the right (resp. bottom) side will be added
into s, and all the newly added pixels are set white.
(2) Replace every 2 × 2 block with a single value. It can be inferred that there are 16 (24)
possible values of 2 × 2 blocks in s, for the two-value characteristic of pixels. Therefore,
each 2 × 2 block can be expressed by a hex value. The correspondence established in this
paper between hex values and all possible 2 × 2 blocks is shown in Table 1.
Multimedia Tools and Applications (2019) 78:24955–24977
24958
Table 1 The correspondence between hex values and 2 × 2 blocks
Hex value
0
1
2
3
4
5
6
7
8
9
A
B
C
D
E
F
2×2 block
Hex value
2×2 block
(3) Generate a 2D array s′ based on s, replacing every 2 × 2 block with its corresponding
hex value. s′, the result of compression coding of s, is taken as the final watermark
data. It can be inferred that the size of s′ is a =2 b 2 . Here, ⟨∙⟩ means the
rounding function.
An example of watermark generation based on compression coding is shown in Fig. 1, where
Fig. 1a is the original binary watermarking image whose size is 22 × 17 (unit: pixel), Fig. 1b
represents the pretreated counterpart of Fig. 1a whose size is 22 × 18 (unit: pixel), and Fig. 1c
is the final generated watermark data whose size is 11 × 9.
2.2 Decompression coding of watermark extraction result
Let w ′ , a a ′ × b ′ 2D array, be the result of watermark extraction. The original
watermarking image can be generated by decompressing w′, the process of which can
be described as follows:
(1) Define a 2a′ × 2b′ blank image, named s′′.
(2) For each w′[i, j], exploit its corresponding 2 × 2 block (assumed M[i, j]) to assign s′′. Let
M[i, j]1 M[i, j]2, M[i, j]3 and M[i, j]4 denote the upper-left, upper-right, lower-left and
lower-right pixel of M[i, j], respectively. Then, order s′′[2i, 2j] = M[i, j]1, s′′[2i, 2j + 1] =
M[i, j]2, s′′[2i + 1, 2j] = M[i, j]3, s′′[2i + 1, 2j + 1] = M[i, j]4.
(3) For the assigned s′′, if the row (resp. column) at the bottom (resp. right) side is composed
of only white pixels, remove it from s′′.
(4) The processed s′′ is considered as the decompression result of w′, i.e., the obtained
watermarking image.
(a) The original binary image
(b) The pretreated counterpart of (a)
Fig. 1 An example of watermark generation
(c) The obtained watermark data
Multimedia Tools and Applications (2019) 78:24955–24977
24959
Figure 2 shows an example of decompression coding of watermark extraction result, where
Fig. 2(a) stands for the result of watermark extraction whose size is 11 × 9, Fig. 2(b) denotes
the generated binary image according to Fig. 2(a) whose size is 22 × 18 (unit: pixel), and Fig.
2(c) stands for the final obtained watermarking image whose size is 22 × 17 (unit: pixel).
3 The proposed scheme
The proposed watermarking scheme will be described in four stages in this section. The method of
map vertex grouping will be explained firstly in Section 3.1. Then, it will be represented in
Section 3.2 that how to generate watermark data. After that the procedure of watermark
embedding and extraction will be described in detail in Section 3.3 and Section 3.4, respectively.
3.1 Vertex grouping
Map vertices are grouped in this paper to enhance the robustness of the proposed scheme,
based on feature vertex extraction. Given a vector map, the procedure of vertex grouping can
be summarized as follows:
(1) Extract feature vertices exploiting the classic Douglas-Peucker algorithm [8]. Given a
polyline, the procedure of feature vertex extraction can be demonstrated as the
following steps:
Step 1: Make a dotted line which connects the starting and the finishing vertex of the
polyline.
Step 2: Calculate distances from each vertex to the made dotted line, and then select the
maximum distance value (assumed dmax).
Step 3: According to the given simplified threshold T, the extraction of feature vertices can
be summarized as follows:
If dmax < T: Ignore all vertices of the polyline, and there is no feature vertices.
If dmax ≥ T: Select the corresponding vertex of dmax, based on which the polyline can be
divided into two individual parts. Then, repeat the extraction operation for each part,
respectively.
An example of Douglas-Peucker algorithm is shown in Fig. 3.
(2) Determine the reference vertex of the given vector map, based on the extracted feature
vertices. The coordinate of the reference vertex can be calculated by Eq. 1, where (xr, yr)
represents the rectangular coordinate of the determined reference vertex, (x*i ; y*i ) denotes
(a) The extracted watermark data
(b) The assigned
Fig. 2 An example of decompression coding of watermark extraction result
(c) The obtained watermarking image
Multimedia Tools and Applications (2019) 78:24955–24977
24960
v3
v3
v1
v4
v2
v1
v5
v0
v4
v2
v6
v0
v5
v6
(a) Step 1
(b) Step 2
v3
v3
v1
v1
v2
v0
v6
(c) Step 3
v0
v6
(d) Step 4
Fig. 3 An example of feature vertex extraction
the integer portion of rectangular coordinate of the i − th feature vertex, n means the
number of feature vertices and ⟨∙⟩ stands for the rounding function.
8
n−1
>
> xr ¼ 1 ∑ x*i
<
n i¼0 ð1Þ
1 n−1 *
>
>
: yr ¼
∑ yi
n i¼0
Assume that vf = {v1, v2, v3, v4, v5} is the sequence of feature vertices, and (137.365467,
269.654654), (256.565845, 452.944654), (217.346216, 328.415594), (319.761462,
442.573615) and (618.721209, 411.436385) are the rectangular coordinates of v1, v2, v3, v4
and v5, respectively. Then,
1
ð137 þ 256 þ 217 þ 319 þ 618Þ ¼ h309:4i ¼ 309
xr ¼
5
yr ¼
1
ð269 þ 452 þ 328 þ 442 þ 411Þ ¼ h380:4i ¼ 380
5
(3) Group map vertices based on the obtained reference vertex. Make a number of concentric
circles, taking the determined reference vertex as the center. The vertices between every
two adjacent concentric circles form a vertex group. The diagram of vertex grouping is
shown in Fig. 4.
It is obvious that the result of vertex grouping is immune to geometric transformation,
which can improve theoretically the robustness of the proposed scheme to a certain
Multimedia Tools and Applications (2019) 78:24955–24977
24961
ĂĂ
Reference vertex
Map vertex
Fig. 4 The diagram of map vertex grouping
extent. It can be also concluded here that the value of radii of the concentric circles
determine directly the result of vertex grouping. Consequently, radii of the concentric
circles must be systematically chosen so that the result of vertex grouping can be
relatively stable. In this paper, radii of the concentric circles form an arithmetic progression, the common difference of which is calculated according to the vertex density of the
host vector map, i.e., the number of vertices per square kilometer. And the obtained
common difference of radii of the concentric circles is taken as secret key, which will be
exploited again in the watermark extraction phase.
3.2 Watermark generation
Given a D × D (unit: pixel) watermarking image, the procedure of watermark generation can
be summarized as the steps listed below:
(1) Scramble the given watermarking image exploiting Arnold transformation, so that the
security of the original copyright information can be further enhanced.
Eq. 2 shows the formula of Arnold transformation, where (x, y) and (x′, y′) denote the original
and the transformed coordinates of a pixel respectively.
x′
1 1
x
¼
mod D
ð2Þ
y′
1 2
y
An example of Arnold transformation is shown in Fig. 5, from which it can be seen that Arnold
transformation is cyclical. It can be thus inferred that the scrambling operation has a small secret key
space due to the periodicity of Arnold transformation. An optimized scrambling algorithm is
exploited in this paper to solve this problem, which can be demonstrated as the following two steps:
Step 1: Select four square sub-images Q0, Q1, Q2 and Q3 from the original image, satisfying
the condition that Q0 ∪ Q1 ∪ Q2 ∪ Q3 = P and Qi ∩ Qj ≠ ∅ (0 ≤ i ≤ 3, 0 ≤ j ≤ 3).
Multimedia Tools and Applications (2019) 78:24955–24977
24962
(a) Original image
(b) Once
(c) 12 times
(d) 24 times
(e) 48 times
Fig. 5 An example of Arnold transformation
Step 2: One after another, conduct Arnold transformation on Q0, Q1, Q2 and Q3 for t0, t1, t2
and t3 times, respectively.
Take the image shown in Fig. 5(a) as example, whose size is 64 × 64 (unit: pixel), the result of
sub-image selection is shown in Fig. 6. Here, the sizes of Q0, Q1, Q2 and Q3 are 40 × 40, 50 × 50,
55 × 55 and 45 × 45, respectively (unit: pixel). And t0, t1, t2 and t3 are assigned 10, 20, 26 and 40,
respectively. The scrambling result exploiting the optimized algorithm is shown in Fig. 7.
From the example shown in Fig. 6 and Fig. 7 it can be obviously seen that the security of
copyright information is doubly guaranteed. Firstly, the selection result of four sub-images is
secretive, it is accordingly difficult to break through the scrambling method. Moreover, the
confidentiality of both the times and the order of transformation of the four sub-images can
further enhance the security of original copyright information. Consequently, it is hardly
possible in theory for unauthorized users to break the optimized algorithm.
(2) Generate the final watermark data based on the scrambled watermarking image, as
described in Section 2.1. It can be inferred that the obtained watermark data is a 2D
array, the number of rows and columns of which is both D =2 . Here, ⟨∙⟩ means the
rounding function.
3.3 Watermark embedding
It is obvious that the final watermark data in this scheme is a sequence of hex values. To embed
watermarks, vertex coordinates are decimal-to-hex converted accordingly, and the
watermarked hex coordinates are converted into decimal ones after watermark embedding.
Given
the
original
vector
map
V
and
watermark
data
D D w ¼ w½i; j; 0≤i ≤ =2 −1; 0≤ j ≤ =2 −1 , the procedure of watermark embedding is
shown in Fig. 8, which can be demonstrated as the following steps:
Step 1: Group map vertices as described in Section 3.1.
Step 2: Group by group, convert rectangular coordinates of map vertices into polar ones,
taking the reference vertex as coordinate origin and any random direction as basic
axis. The formula of polar coordinate conversion is shown in Eq. 3, where (xi, yi) and
Q0
Q1
Fig. 6 The selection result of four sub-images
Q2
Q3
Multimedia Tools and Applications (2019) 78:24955–24977
(a) Result after scrambling
(b) Result after scrambling
24963
(c) Result after scrambling
(d) Result after scrambling
Fig. 7 An example of the optimized Arnold transformation
(ρi, θi) are the rectangular and the polar coordinate of the i − th vertex respectively,
(xr, yr) denotes the rectangular coordinate of the reference vertex.
8
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
>
< ρi ¼ ðxi −xr Þ2 þ ðyi −yr Þ2
y −y
>
:
θi ¼ tan−1 i r
xi −xr
ð3Þ
Step 3: Establish correspondence between watermark bits and map vertices. Take a vertex Vt
as example, the homologous watermark bit wt can be calculated by Eq. 4, where
Hash1(∙) and Hash2(∙) are two existing functions which transform an input with
arbitrary length into an output with a fixed length, x*t ; y*t denotes the integer
portion of the rectangular coordinate of Vt, and (xr, yr) means the rectangular coordinate of the reference vertex.
8
¼ w½ f ðxÞ; gðxÞ ffi
wtffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
>
q
>
>
>
2
2
<
f ðxÞ ¼ Hash1
mod D 2
x*t −xr þ y*t −yr
ð4Þ
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
>
>
D 2
2
>
>
mod
x*t −xr þ y*t −yr
: gðxÞ ¼ Hash2
2
Feature
vertices
Original vector
map V
Feature vertex
extraction
Non-feature
vertices
Vertex
grouping
Vertex
groups
Polar coordinate conversion
Decimal-to-hex conversion
Watermark
data w
Watermark
embedding
Watermarked
coordinates
Converted
coordinates
Hex-to-decimal
conversion
Fig. 8 The flow chart of watermark embedding procedure
Rectangular
coordinate
conversion
Watermarked
vector map V
Multimedia Tools and Applications (2019) 78:24955–24977
24964
Step 4: Embed watermark bits into polar coordinates of all map vertices. Take a vertex Vn as
example, let (ρn, θn) and wn be its polar coordinate and corresponding watermark bit,
respectively. The portion after the fifth digit after decimal point of ρn is firstly converted
into hex values and a new number (assumed ρn(h)) can be obtained, and wn is then
inserted into ρn(h), between the fifth and the sixth digit after decimal point. Finally,
0
0
convert the watermarked ρn(h) (assumed ρn ðhÞ) into a decimal value (assumed ρn ).
For example, assume that ρn = 693.52761263 and wn = 6, then,
ρn ðhÞ ¼ 693:52761107
↓
0
ρn ðhÞ ¼ 693:527616107
↓
0
ρn ¼ 693:5276124839
0
It can be obviously seen from this step that Δρ ¼ ρn −ρn < 1 10−5 . Moreover, it can be
0
0
inferred that Δx ¼ xn −xn < 1 10−5 and Δy ¼ yn −yn < 1 10−5 , in the light of the
relation between Cartesian and polar coordinates. Therefore, the integer portion of rectangular
coordinates of map vertices will not be changed during the watermark embedding process. It
can be accordingly concluded that the established mapping relation between map vertices and
watermark bits is constant during the watermark embedding procedure. Furthermore, the result
of vertex grouping will not be distorted during the watermark embedding procedure in theory.
Step 5: Convert the watermarked polar coordinates of map vertices into rectangular ones.
Taking a vertex Vn as example, the method of rectangular coordinate conversion is
0
0
0
shown in Eq. 5, where ρn ; θn and xn ; yn denote the watermarked polar and
rectangular coordinate of Vn respectively, (xr, yr) means the rectangular coordinate of
the reference vertex.
0
0
xn ¼ xr þ ρn •cosθn
0
0
yn ¼ yr þ ρn •sinθn
ð5Þ
From the aforementioned watermark embedding process it can be inferred that a watermark bit
can be embedded into several vertices simultaneously, which can improve the robustness of this
scheme under certain map attacks, e.g., vertex deleting, data compression, map clipping, etc.
3.4 Watermark extraction
As shown in Fig. 9, the watermark extraction procedure is the reverse procedure of watermark
embedding. Given a watermarked vector map V′, the procedure of watermark extraction can be
demonstrated as follows:
Step 1: Group map vertices and convert rectangular coordinates of map vertices into polar
ones, as described in Step 1 and Step 2 of Section 3.3.
0 0
0
Step 2: Extract watermark bits from map vertices. For each map vertex V n ρn ; θn , convert the
0
portion after the fifth digit after decimal point of ρn to hex values and a new number
0
(assumed ρn ðhÞ) can be obtained. Afterwards, extract the sixth digit after decimal point
Multimedia Tools and Applications (2019) 78:24955–24977
24965
Feature
vertices
Watermarked
vector map Vÿ
Feature vertex
extraction
Vertex
grouping
Vertex
groups
Non-feature
vertices
Polar coordinate conversion
Decimal-to-hex conversion
Converted
coordinates
Original
watermarking
image
Recovered
vector map Vā
Watermark
data wÿ
Decompression
Arnold inverse
transformation
Rectangular
coordinate
conversion
Watermark
extraction
Hex-to-decimal
conversion
Non-watermarked
coordinates
Fig. 9 The flow chart of watermark extraction procedure
0
0
0
0
of ρn ðhÞ as watermark bit wn . Then, remove wn from ρn ðhÞ, and another new value
0
(assumed ρn0 ðhÞ) can be generated. Finally, convert the portion after the fifth digit after
0
0
decimal point of ρn0 ðhÞ into decimal values, and a new number (assumed ρn0 ) can be
0 0
0
obtained. ρn0 ; θn is considered as the recovered polar coordinate of V n .
0
Take the data in Step 4 of Section 3.3 as example, i.e., ρn ¼ 693:5276124839, then,
0
ρn ðhÞ ¼ 693:527616107
↓
00
0
ρn ðhÞ ¼ 693:52761107; wn ¼ 6
↓
00
ρn ¼ 693:52761263
0
0
Step 3: Define a 2D array w ¼ w ½i; j; 0 ≤i≤ D =2 −1; 0≤ j ≤ D =2 −1 , and assign it
based on the extracted watermark bits. Correspondence between elements of w′
24966
Multimedia Tools and Applications (2019) 78:24955–24977
and the obtained watermark bits can be established by the same method with that in
Eq. 4. And a simple statistical strategy is used here for optimal value selection.
Step 4: Decompress w′ exploiting the method mentioned in Section 2.2. And a binary image
can be obtained, assumed c.
Step 5: Conduct Arnold inverse transformation on c. Firstly, select four square sub-images
0
0
0
0
Q0 , Q1 , Q2 and Q3 from c, as described in Section 3.2. Then, one after another,
0
0
0
0
conduct Arnold transformation on Q3 , Q2 , Q1 and Q0 for (T3 − t3), (T2 − t2), (T1 − t1)
and (T0 − t0) times, respectively. Here, T0, T1, T2 and T3 respectively stand for the
0
0
0
0
Arnold transformation cycle of Q0 , Q1 , Q2 and Q3 , and t0, t1, t2 and t3 are explained
in Section 3.2. The transformed c, assumed c’, is considered as the obtained
watermarking image.
4 Experiments and discussion
Fifty different vector maps (in .shp format) are adopted in this section as original data to test
the performance of the proposed watermarking scheme. Table 2 lists some basic properties of
the fifty maps, i.e., scale, number of features, number of vertices and coordinate range. The
experiments mentioned in this section are implemented on a PC with Intel Core i5 CPU
(2.9GHz), 4G RAM and Win7 Professional, exploiting ArcGIS 10.2, Visual Studio 2010 and
C# programming language.
The exploited watermarking image, a 60 × 54 (unit: pixel) binary image, is shown in Fig.
10. The watermark data is generated according to the method mentioned in Section 3.2, which
is then embedded into the fifty experimental vector maps respectively, exploiting the method
introduced in Section 3.3.
In addition, to evaluate further the ability of the proposed watermarking scheme in aspects
of robustness and rich copyright information expression, four representative watermarking
schemes are selected for contrast experiments. The basis for selecting schemes in this paper
contains two aspects, i.e., published in recent five years and has a preferable performance in
aspects of both robustness and rich copyright information expression.
4.1 Discussion about rich-information characteristic
It is a common goal for all watermarking algorithms to embed watermark bits into cover data
as more as possible, and a great deal of achievements have been obtained. The main purpose of
conventional schemes, however, is to increase the repeated embedding times of watermark bits
and thus enhance the robustness of watermarking algorithms, and watermark capacity is
generally exploited as the evaluating factor. Nevertheless, traditional evaluating methods
cannot be directly applied to estimate the rich-information characteristic of watermarking
schemes, for the essential difference between the total embedded watermark bits and the
length of copyright information contained in the watermark data. To evaluate effectively the
performance of watermarking algorithms in terms of rich-information watermark embedding,
watermark payload is exploited in this paper as the evaluating indicator, which means the ratio
of the length of copyright information and the total number of watermark bits.
The watermark payload of this scheme is higher in theory than traditional schemes, owing
to the significant reduction of the length of watermark data. To evaluate the performance of the
Scale
1:500,000
1:500,000
1:500,000
1:500,000
1:500,000
1:500,000
Vector map
map-0
map-1
map-2
map-3
map-4
Average of 50 maps
151
219
599
221
48
328.6
Number of features
Table 2 Properties of experimental vector maps
8757
9420
15,936
8106
7609
10,165.2
Number of vertices
Coordinate range (y)
2,375,444.14238~6,309,648.62964
4,641,428.40461~5,907,139.84753
3,594,108.59874~3,846,608.94995
516,977.54559~6,385,320.29008
1,574,799.81646~6,106,427.17171
2,434,361.75436~3,853,206.23831
Coordinate range (x)
−1,506,755.72638~2,041,078.07683
−2,543,657.93085~ − 693,356.65491
670,494.17024~976,724.06626
−1,878,821.94721~2,092,054.12033
−2,499,621.79553~1,962,910.54399
−3,240,483. 68,131~202,054.09658
Multimedia Tools and Applications (2019) 78:24955–24977
24967
Multimedia Tools and Applications (2019) 78:24955–24977
24968
Fig. 10 The watermarking image
proposed watermarking scheme in terms of rich-information characteristic, comparisons have
been made among this scheme and four state-of-the-art works. The comparison result is shown in
Table 3, from which it can be obviously seen that the length of watermark data in the proposed
scheme is shortened by a big margin without affecting evidently the expression of copyright. The
result in Table 3 indicates that the proposed watermarking scheme has a satisfying performance in
terms of rich-information characteristic, compared with conventional schemes.
4.2 Discussion about reversibility
The watermark extraction procedure explained in Section 3.4 shows that the embedded
watermark bits can be precisely removed from the watermarked vector maps. The proposed
algorithm is thus accurate reversible in theory. A set of experiments were carried out to verify
the reversibility of this scheme, exploiting the fifty watermarked vector maps. Firstly, extract
watermark bits and recover the original map content, as described in Section 3.4. Afterwards,
calculate coordinate difference between original map vertices and their recovered counterparts.
0
0
0
Taking an original vertex vi(xi, yi) and its recovered counterpart vi xi ; yi as example, the
corresponding coordinate difference can be calculated according to Eq. 6.
Erðvi Þ ¼
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
0 2
0 2
ðxi −xi Þ þ ðyi −yi Þ
ð6Þ
The experimental result shows that for each vi(0 ≤ i < n), Er(vi) = 0 (n denotes the amount of
map vertices). The reversibility of the proposed scheme is thus well validated.
Table 3 Comparison result of watermark payload
Watermarking scheme
The length of copyright
information (bit)
The length of watermark
data (bit)
Watermark payload
Scheme in [24]
Scheme in [6]
Scheme in [19]
Scheme in [18]
This scheme
16
232
328
688
320
2048
6400
2112
2401
810
0.0078
0.0363
0.1553
0.2865
0.3951
Multimedia Tools and Applications (2019) 78:24955–24977
24969
4.3 Discussion about invisibility
As discussed in Step 4 of Section 3.3, only the digits after the fifth digit after decimal point of
vertex coordinates are disturbed during the watermark embedding procedure. Accordingly, the
original vector maps will not change tremendously in sight after watermark embedding in
theory. Figure 11 shows one of the fifty experimental vector maps, as well as its watermarked
counterpart. Figure 11 verifies that it is difficult to distinguish the two vector maps from the
visual point of view.
Error analysis was then carried out between the original vector maps and their watermarked
counterparts to thoroughly test and verify the invisibility of this scheme. Max. Error and rootmean-square error (RMSE) were adopted here to express the distortion of the experimental
vector maps, which can be calculated by Eq. 7. Here, n means the total number of map
0
0
vertices, (xi, yi) and xi ; yi stand for the rectangular coordinate of the i − th vertex and its
watermarked counterpart, respectively.
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
8
0 2
0 2
>
>
ðxi −xi Þ þ ðyi −yi Þ ; 0≤i ≤n−1
>
< Max:Error ¼ Max
ffi
sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
>
1 n−1
0 2
0 2
>
>
∑ xi −xi þ yi −yi
; 0≤i ≤n−1
: RMSE ¼
n i¼0
ð7Þ
The result of error analysis is illustrated in Table 4, from which it can be seen that both Max.
Error and RMSE of the fifty experimental vector maps are acceptable (less than 1 × 10−5). A
conclusion can be thus drawn that the visualization of the fifty vector maps is not affected
during the watermark embedding procedure.
(a) The original vector map and its local magnification effect
(b) The watermarked vector map and its local magnification effect
Fig. 11 An example of watermark embedding
Multimedia Tools and Applications (2019) 78:24955–24977
24970
Table 4 Result of error analysis
Vector map
Max.Error
RMSE
map-0
map-1
map-2
map-3
map-4
Average of 50 maps
0.00000876
0.00000835
0.00000908
0.00000785
0.00000896
0.00000835
0.00000488
0.00000364
0.00000420
0.00000408
0.00000293
0.00000364
4.4 Discussion about robustness
As a kind of digital products, vector maps may be attacked during the process of both
transmission and application. According to the different types, the possible attacks that vector
maps frequently suffer can be classified into geometric attacks and non-geometric attacks.
While geometric attacks (e.g., translation, rotation, etc.) may change vertex coordinates
directly and thus affect the result of watermark extraction, non-geometric attacks (e.g.,
simplification, vertex reordering, etc.) disturb watermark extraction by changing the storage
order of vertices, increasing (decrease) the number of vertices, etc.
A series of simulating experiments were carried out in this section to evaluate the ability of
the designed algorithm in resisting common attacks, using BER (Bit error rate, the ratio of
error pixels to the total pixels of the obtained watermarking image) and NC (Normalized
Correction, the similarity between the original watermarking image and the extracted one) are
used to evaluate the effect of watermark extraction. Eq. 8 shows the calculation method of NC,
where w and w′ stand for the original and the extracted watermarking image respectively.
0
∑ wi; j wi; j
i; j
NC ¼ rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffisffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
0 2
2
∑ wi; j
∑ wi; j
i; j
ð8Þ
i; j
4.4.1 Vertex reordering
Vertex reordering, one of the common attacks of vector maps, may change the organization
structure of the watermarked vector maps, and thereby influence the result of watermark
extraction. In this scheme, both the vertex grouping result and the watermark embedding
procedure are independent of the result of vertex ordering, and it can be thus inferred that the
designed algorithm is immune to vertex reordering operation.
4.4.2 Map translation and rotation
It can be inferred from the angle of theoretical analysis that the proposed watermarking
algorithm is immune to map translation and rotation, due to the stability of both vertex
grouping result (described in Section 3.1) and polar coordinates of map vertices under
geometric transformation.
Multimedia Tools and Applications (2019) 78:24955–24977
24971
Afterwards, a set of simulating experiments were conducted to test the robustness of this scheme
under map translation and rotation. Table 5 shows the experimental results, where s (θ) means the
distance (angle) of translation (rotation). A conclusion can be drawn from Table 5 that the designed
watermarking algorithm is quite robust under map translation and rotation operations.
4.4.3 Vertex addition and deletion
Vertex addition and deletion are two common attacks that vector maps frequently suffer, which
may impact on the robustness of algorithms for vector maps. Vertex addition attack may draw
into some interference vertices which will affect the result of watermark extraction, while
vertex deletion operation will lead to the loss of a section of map vertices, as well as the
embedded watermarks. As described in Section 3.3, the mapping between watermark bits and
map vertices is a one-to-many relationship, which is theoretically helpful to enhance the
robustness of this scheme under vertex addition and deletion attacks. In addition, the statistical
method for optimal value selection exploited in the watermark extraction phase can further
help to prevent the result of watermark extraction from being affected by the introduced
interference vertices. Accordingly, the watermarking algorithm put forward in this paper is
robust under vertex addition and deletion attacks in theory.
To verify the robustness of this scheme from the angle of simulation experiment, a set of
experiments were designed and carried out in this section. Watermarks were firstly embedded
into the fifty experimental vector maps using the method mentioned in Section 3.3, and then
add (resp. delete) randomly some vertices into (resp. from) the watermarked vector maps.
Finally, extract watermarks from the fifty attacked vector maps based on the method introduced in Section 3.4. Table 6 shows the experimental results, where p and q denote the portion
of the added and deleted vertices, respectively. It can be obviously seen from Table 6 that the
algorithm presented in this paper has a satisfactory performance in resisting vertex addition/
deletion attacks.
4.4.4 Data compression
Data compression is another kind of operations which vector maps frequently suffer during the
process of data transmission and application. It is obviously that data compression will lead to
the loss of some watermarked vertices and thus influence on the result of watermark extraction.
Table 5 Results of watermark extraction after map translation/rotation
Vector map
map-0
map-1
map-2
Average of 50
maps
Translation (s)
Rotation (θ)
s=6.42365
s=58.374512
s=252.385407 θ=3.65°
θ=33.52°
θ=90°
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
BER = 0.00%
NC = 1.0000
Multimedia Tools and Applications (2019) 78:24955–24977
24972
Table 6 Results of watermark extraction after vertex addition/deletion attacks
Vector
map
Vertex addition
Vertex deletion
p=40%
p=50%
p=60%
q=40%
q=50%
q=60%
BER=1.85%
NC=0.9570
BER=3.15%
NC=0.9277
BER=6.27%
NC=0.8586
BER=2.01%
NC=0.9534
BER=3.24%
NC=0.9258
BER=6.48%
NC=0.8527
BER=1.79%
NC=0.9584
BER=2.99%
NC=0.9307
BER=6.02%
NC=0.8634
BER=1.88%
NC=0.9562
BER=3.09%
NC=0.9288
BER=6.14%
NC=0.8590
BER=1.70%
NC=0.9606
BER=2.84%
NC=0.9344
BER=5.59%
NC=0.8727
BER=1.67%
NC=0.9612
BER=2.90%
NC=0.9330
BER=5.77%
NC=0.8679
BER=1.77%
NC=0.9591
BER=2.95%
NC=0.9312
BER=5.98%
NC=0.8655
BER=1.84%
NC=0.9575
BER=3.03%
NC=0.9301
BER=6.03%
NC=0.8610
map-0
map-1
map-2
Average of
50 maps
Simulation experiments have been carried out in this section to evaluate the ability
of the proposed algorithm in resisting data compression operations. Watermarks were
firstly embedded into the fifty experimental vector maps exploiting the method
introduced in Section 3.3, and the classical Douglas- Peucker algorithm was then
conducted on the watermarked vector maps with different intensities. Finally, watermarks were extracted by the method mentioned in Section 3.4. To further validate the
performance of this scheme under data compression, comparisons have been made
among this scheme and four reprehensive schemes [6, 18, 19, 24] under the same
conditions.
The comparison result is illustrated in Table 7, indicating that the watermarking scheme
presented in this paper has a stronger ability than state-of-the-art works in resisting data
compression operations.
4.4.5 Map clipping
Map clipping refers to delete all vertices within the specified area in the original
vector maps. Similar to vertex deletion and data compression, map clipping will also
lead to the loss of some watermarked map vertices and thus have an effect on the
result of watermark extraction.
Another set of simulation experiments were designed and done in this section to test
the robustness of the proposed scheme under map clipping attacks. And to further
evaluate the performance of the proposed watermarking scheme in resisting map clipping
attacks, comparisons were made among this scheme and four reprehensive schemes [6,
18, 19, 24] under the same conditions. The comparison result shows that the
Multimedia Tools and Applications (2019) 78:24955–24977
24973
Table 7 Robustness comparison among this scheme and state-of-the-art works under data compression operations
Vector map
Scheme
40%
50%
60%
BER=2.10%
NC=0.9511
BER=3.12%
NC=0.9283
BER=6.57%
NC=0.8516
BER=2.90%
NC=0.9328
BER=4.20%
NC=0.9026
BER=8.58%
NC=0.8061
BER=2.96%
NC=0.9315
BER=4.29%
NC=0.9023
BER=8.80%
NC=0.8026
BER=3.06%
NC=0.9294
BER=4.44%
NC=0.8981
BER=9.20%
NC=0.7954
BER=2.78%
NC=0.9358
BER=4.01%
NC=0.9074
BER=8.21%
NC=0.8147
This scheme
BER=1.92%
NC=0.9553
BER=3.05%
NC=0.9293
BER=6.07%
NC=0.8613
Scheme in [2]
BER=2.78%
NC=0.9355
BER=4.09%
NC=0.9057
BER=8.44%
NC=0.8099
Scheme in [20]
BER=2.85%
NC=0.9342
BER=4.16%
NC=0.9043
BER=8.64%
NC=0.8068
Scheme in [23]
BER=2.94%
NC=0.9325
BER=4.30%
NC=0.9016
BER=9.02%
NC=0.7993
Scheme in [25]
BER=2.63%
NC=0.9389
BER=3.86%
NC=0.9114
BER=8.03%
NC=0.8191
This scheme
Scheme in [2]
map-0
Scheme in [20]
Scheme in [23]
Scheme in [25]
Average of 50
maps
watermarking scheme put forward in this paper has a stronger ability than state-of-the-art
works in resisting map clipping attacks. Table 8 illustrates the experimental result, taking
one of the fifty experimental vector maps as example.
Multimedia Tools and Applications (2019) 78:24955–24977
24974
Table 8 Robustness comparison among this scheme and state-of-the-art works against map clipping
Clip
ratio
Extraction result
Clip position
This scheme
Scheme in [2]
Scheme in [20]
Scheme in [23]
Scheme in [25]
BER =2.01%
NC=0.9537
BER =2.81%
NC=0.9352
BER =2.87%
NC=0.9337
BER=2.90%
NC=0.9327
BER=2.56%
NC=0.9404
BER =2.96%
NC=0.9320
BER =4.04%
NC=0.9068
BER =4.17%
NC=0.9043
BER=4.32%
NC=0.9005
BER=3.77%
NC=0.9136
BER =6.30%
NC=0.8560
BER =8.30%
NC=0.8118
BER =8.58%
NC=0.8066
BER=8.89%
NC=0.8043
BER=7.75%
NC=0.8259
40%
50%
60%
5 Conclusions
Aiming to realize powerful copyright declaration, this paper proposes a richinformation and reversible watermarking scheme of vector maps based on compression coding of watermarking image and decimal-hex conversion of vertex coordinates.
The proposed watermarking scheme is robust under both geometric attacks (i.e.
translation, rotation and vertex reordering) and common non-geometric attacks (i.e.
vertex addition, vertex deletion, data compression and map clipping). Both theoretical
analysis and simulation experiments have demonstrated the rich-information characteristic, reversibility, invisibility and robustness of the proposed scheme.
The main idea of this paper is to realize rich-information watermark embedding by
shortening the length of watermark data, and there are two kinds of work which are
valuable to be further studied in the future work. Firstly, one of the disadvantages of
this scheme is that it cannot resist map scaling attacks, for the instability of polar
coordinates of map vertices under scaling operations, which is the cover data for
watermark embedding. More efforts should be put in the near future to find geometric
invariants of vector maps and consider them as the carrier for watermark embedding,
so that the robustness of watermarking algorithms against geometric transformation
can be effectively enhanced. In addition, the method of shortening the length of the
final watermark data should be further investigated, and lossless compression methods
of images, e.g., Huffman coding, Run-length coding, etc., may provide novel
solutions.
Acknowledgements This research is supported by the National Natural Science Foundation of China (Grant
No. 41171343) and the Start-up Project for Talents of Nanjing Institute of Geography & Limnology, CAS (Grant
No. NIGLAS2018QD07).
Multimedia Tools and Applications (2019) 78:24955–24977
24975
References
1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and
determinate Array on RGB Indicator. International Journal of Signal and Image Processing 1:196–204
2. Al-Juaid N, Gutub A, Khan E (2018) Enhancing PC data security via combining RSA cryptography and
video based steganography. Journal of Information Security and Cybercrimes Research 1:8–18
3. Almazrooie M, Samsudin A, Gutub A, Salleh M, Omar M, Hassan S (2018) Integrity verification for digital
holy Quran verses using cryptographic hash function and compression. Journal of King Saud University Computer and Information Sciences. https://doi.org/10.1016/j.jksuci.2018.02.006
4. Al-Otaibi N, Gutub A (2014a) 2-Leyer security system for hiding sensitive text data on personal computers.
Lecture Notes on Information Theory 2:151–157
5. Al-Otaibi N, Gutub A (2014b) Flexible Stego-System for Hiding Text in Images of Personal Computers
Based on User Security Priority. Proceedings of 2014 International Conference on Advanced Engineering
Technologies. pp 243–250
6. Cao L, Men C, Ji R (2013) Nonlinear scrambling-based reversible watermarking for 2D-vector maps. Vis
Comput 29:231–237
7. Cao L, Men C, Ji R (2014) High-capacity reversible watermarking scheme of 2D-vector data. SIViP 9:
1387–1394
8. Douglas D, Peucker T (1973) Algorithms for the reduction of the number of points required to represent a
digitized line or its caricature. Can Cartogr 10:112–122
9. Gutub A (2010) Pixel Indicator technique for RGB image steganography. Journal of Emerging
Technologies in Web Intelligence 2:56–64
10. Gutub A, Al-Juaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user
security priority. Journal of Computer Hardware Engineering 1:1–9
11. Gutub A, Ghouti L, Amin A, Alkharobi T (2007) Utilizing Extension Character 'Kashida' With Pointed
Letters For Arabic Text Digital Watermarking. Proceedings of the International Conference on Security and
Cryptography
12. Gutub A, Ankeer M, Abu-Ghalioun M, Shaheen A, Alvi A (2008) Pixel Indicator high capacity Technique
for RGB image Based Steganography. 5th IEEE International Workshop on Signal Processing and its
Applications
13. Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: Secure RGB Image Steganography Based on
Randomization. AICCSA-2009 - The 7th ACS/IEEE International Conference on Computer Systems and
Applications. pp 400–403
14. Gutub A, Al-Juaid N, Khan E (2017) Counting-based secret sharing technique for multimedia applications.
Multimedia Tools & Applications. https://doi.org/10.1007/s11042-017-5293-6
15. Khan F, Gutub A (2007) Message Concealment Techniques using Image based Steganography. The 4th
IEEE GCC Conference and Exhibition. pp 11–14
16. Parvez M, Gutub A (2011) Vibrant color image steganography using channel differences and secret data
distribution. Kuwait Journal of Science and Engineering 38:127–142
17. Qiu Y, Gu H, Sun J (2018a) Reversible watermarking algorithm of vector maps based on ECC. Multimedia
Tools & Applications 77:23651–23672
18. Qiu Y, Gu H, Sun J (2018b) High-payload reversible watermarking scheme of vector maps. Multimedia
Tools & Applications 77:6385–6403
19. Sun J, Zhang G, Yao A, Wu J (2014) A reversible digital watermarking algorithm for vector maps.
International Journal of Network Security 16:40–45
20. Voigt M, Yang B, Busch C (2004) Reversible watermarking of 2d-vector data. In: Proc. Multimedia and
Security Workshop. pp 160–165
21. Voigt M, Yang B, Busch C (2005) High-capacity reversible watermarking for 2D vector data. In: Proc.
SPIE, International Society for Optical Engineering. pp 409–417
22. Vybornova Y, Sergeev V (2017) A new watermarking method for vector map data. Comput Opt 41:913–
919
23. Xiao D, Hu S, Zheng H (2015) A high capacity combined reversible watermarking scheme for 2-D CAD
engineering graphics. Multimedia Tools & Applications 74:2109–2126
24. Yan H, Zhang L, Yang W (2017) A normalization-based watermarking scheme for 2D vector map data.
Earth Sci Inf 10:471–481
25. Yang C, Zhu C, Tao D (2010) A blind watermarking algorithm for vector geo-spatial data based on
coordinate mapping. Journal of Image and Graphics 15:684–688
26. Yao X, Li G (2018) Big spatial vector data management: a review. Big Earth Data 2:108–129
24976
Multimedia Tools and Applications (2019) 78:24955–24977
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and
institutional affiliations.
Yinguo Qiu is currently a Research Assistant in Nanjing Institute of Geography and Limnology, Chinese
Academy of Sciences. He received his Ph.D. degree in University of Chinese Academy of Sciences in 2018.
His research interests include vector data watermarking and security of GIS data.
Hongtao Duan is currently a professor and a Doctoral Tutor in Nanjing Institute of Geography and Limnology,
Chinese Academy of Sciences. He received his Ph.D. degree in University of Chinese Academy of Sciences in
2007. His main research directions are digital watermarking and remote sensing of lake water color. He is now a
reviewer of a number of International Journals. In recent years, he has published more than 50 papers that are
indexed by SCI/EI retrieval.
Multimedia Tools and Applications (2019) 78:24955–24977
24977
Jiuyun Sun is currently an associate professor and a Master Tutor in School of Environment Science & Spatial
Informatics of China University of Mining & Technology. His main research directions are security of GIS data
and photographic survey.
Hehe Gu is currently a professor and a Doctoral Tutor in School of Environment Science & Spatial Informatics
of China University of Mining & Technology. His main research directions are cadastral surveying, land use
monitoring and security protection of vector data. In recent years, he has published more than 50 papers that are
indexed by SCI/EI/ISTP retrieval.
Download