Abstract
This paper presents a blind and robust watermark approach for authentication 2D Map based on polar coordinates mapping and support vector machine is presented. The proposed system is composed of three phases. Firstly, in the preprocessing phase, the proposed algorithm mapped all vertices into polar coordinate system. Then, in the support vector machine phase, the watermark portable points will be chosen using support vector machine to reduce the number of these points which increases the imperceptibility without any effect on the robustness of the watermark. Afterwards, in the watermarking algorithm phase, the watermark is embedded into the map vertices using the random table of the decimal valued of the polar coordinates through the digit substitution of the decimal part. Finally, in the theoretical analysis and experimental results shows that the presented approach is robust against a various attacks including rotation, scaling, and translation. The proposed approach attained high imperceptibility.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Shao, C., Wang, X., Xu, X., Niu, X.: Study on lossless data hiding algorithm for digital vector maps. Journal of Image and Graphics 12(2), 206–211 (2007)
Peng, F., Lei, Y., Long, M., Sun, X.: A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Computer-Aided Design 43(8), 1018–1024 (2011)
Anusudha, K., Sangeetha, A.: Digital Watermarking of Satellite Images Using Secured Spread Spectrum Technique. International Journal of Recent Trends in Engineering 1(1) (May 2009)
Wolthusen, S.D.: Proceedings of the IEEE Workshop on Information Assurance (2006)
Celik, M., Sharma, G., Tekalp, M.: Lossless generalized-LSB data embedding. IEEE Transactions on Image Processing 14(2), 253–266 (2005)
Gaurav, B., Jonathan Wu, Q.M., Balasubramanian, R.: New robust adjustable logo watermarking scheme. Computers and Security 3(1), 40–58 (2012)
Nana, W., Chaoguang, M.: Reversible fragile watermarking for 2-D vector map authentication with localization. Computer-Aided Design 44, 320–330 (2012)
Suk-Hwan, L., Ki-Ryong, K.: A watermarking for 3D mesh using the patch CEGIs. Digital Signal Processing 17, 396–413 (2007)
Fei, P., Re-Si, G., Chang-Tsun, L., Min, L.: A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Computer-Aided Design 42, 1207–1216 (2010)
Kitamura, I., Kanai, S., Kishinami, T.: Copyright protection of vector map using digital watermarking method based on discrete Fourier transform. In: IEEE Geoscience and Remote Sensing Symposium (IGARSS 2001), vol. 3, pp. 1191–1193 (2001)
Kang, H., Kim Kab, I., Choi, J.: A map data watermarking using the generalized square mask. In: Proceedings of IEEE International Symposium on Industrial Electronics (ISIE 2001), vol 3, pp. 1956-1958 (2001)
Solachidis, N., Nikolaidis, I.P.: Fourier Descriptors Watermarking of Vector Graphics Images. In: Proceedings of IEEE International Conference on Image Processing, vol. 3, pp. 9–12 (2001)
Solachidis, V., Pitas, I.: Watermarking polygonal lines using Fourier descriptors. IEEE Computer Graphics and Applications 24(3), 44–51 (2004)
Ohbuchi, R., Ueda, H., Endoh, S.: Watermarking 2D vector maps in the mesh-spectral domain. In: Proceeding of Shape Modeling International, pp. 216–225 (2003)
Yuanyuan, L., Luping, X.: A blind watermarking of vector graphics images. In: Proceedings of Fifth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2003), pp. 424–429 (2003)
Zhang, W., Ren, X., Zhang, G.L.: An robust object locating method based on log polar transform and affine transform. Journal of Image and Graphics 11(9), 1255–1259 (2006)
Jungyeop, K.: Robust Vector Digital Watermarking Using Angles and a Random Table. Advances in Information Sciences and Service Sciences 2(4) (December 2010)
Syed, F.T., Asifullah, K.A., Anwar, M.M.: Support Vector Machine based Intelligent Watermark Decoding for Anticipated Attack. World Academy of Science, Engineering and Technology 21, 1001–1006 (2008)
Chapelle, O., Vapnik, V., Bousquet, O., Mukherjee, S.: Choosing Multiple Parameters for Support Vector Machines. Machine Learning 46(1-3), 131–159 (2002)
Hsu, C.W., Chang, C.C., Lin, C.J.: A practical guide to support vector machines. Technical report, Department of Computer Science and Information Engineering, National Taiwan University (2003)
Staelin, C.: Parameter selection for support vector machines. Technical report, HP Labs, Israel (2002)
Moghaddam, B., Yang, M.H.: Learning Gender with support faces. IEEE Transaction on Pattern Analysis and Machine Learning 24 (2002)
Mourad, R., Mouhamed, A.M., Hassanien, A.: Blind 2D Vector Data Watermarking Approach Using Random Table and Polar Coordinates. In: International Conference on Uncertainty Reasoning and Knowledge Engineering, pp. 67–70 (2012)
Wu, Q., Zhou, D.-X.: Analysis of support vector machine classification. Journal of Computer Analysis and Applications 8, 99–119 (2006)
Oracle® Spatial Developer’s Guide, 11g Release 2 (11.2) E11830-11
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mouhamed, M.R., Zawbaa, H.M., Al-Shammari, E.T., Hassanien, A.E., Snasel, V. (2013). Blind Watermark Approach for Map Authentication Using Support Vector Machine. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds) Advances in Security of Information and Communication Networks. SecNet 2013. Communications in Computer and Information Science, vol 381. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40597-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-40597-6_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40596-9
Online ISBN: 978-3-642-40597-6
eBook Packages: Computer ScienceComputer Science (R0)