Abstract
With the progression of sea exploration and offshore engineering, electronic charts have come to see widespread use in many intelligent applications. Like other digital products, electronic charts are easy to duplicate and distribute. Some watermarking solutions have proven defective to prevent copying of electronic charts because it’s as easy to forge as it is to redistribute. If the problems of copyright infringement cannot be solved, the creation of these electronic charts will be limited. The most important characteristic of electronic charts is the topological relationships among vertices, but few algorithms can control this feature. A new watermarking algorithm is here proposed as a means of copyright protection, in which the watermarks will be hosted in the electronic chart by taking into account the preservation of the topology. Sometimes, additional vertices are inserted into the middle of two adjacent vertices, sometimes not, which are governed by the value of the watermark. Experiments show that the improved algorithm is better than similar algorithms; it was found to resist geometric attacks and format exchange attacks.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
In general, electronic charts are one kind of vector map, which is the core data in the electronic chart display and information system [1]. They are considered necessary to safe navigation. Raster charts are also used in these areas. Electronic charts have become a fundamental means of representing data structures in several marine navigational information systems. Especially, electronic charts, which have both land and marine coordinate systems (Fig. 1(c)), are more flexible than raster maps (Fig. 1(a)) and regular vector map (Fig. 1(b)). During the past twenty years, electronic charts have been widely used and distributed. This has raised concerns regarding the copyright protection of electronic charts. However, most existing algorithms can distort original maps after the watermarks are extracted [2]. This is highly undesirable because any disruption of the accuracy of the data will make the map unusable. It is difficult to recover the land and marine coordinate systems at the same time.
2 Features of the Watermarking Algorithm
Generally, the watermark can be embedded into the frequency domain or spatial domain. In spatial domain scenario, the watermark is directly embedded into the coordinate data, which visibly distorts the map. The map should be converted into the frequency domain, at which point the watermark is embedded into the frequency coefficients, which only slightly distorts the map.
There are few digital watermarking algorithms for electronic charts, but the digital watermarking methods for vector maps have been widely investigated in the last decade. Because of dual coordinate systems, not all algorithms for vector maps are capable of protecting the copyright of electronic charts. For example, by changing the vector data to embed the watermark in the spatial domain, the precision loss of land coordinate system is different from marine coordinate systems. To improve the watermarking of electronic charts, the topology of the maps was taken into account.
Few works have been proposed on topology: Lee et al. proposed the first watermarking algorithm for vector maps. It worked by modifying the vector coefficients in the DCT domain [3]. Considering the characteristic of vector geo-spatial data provided in two previous works, Zhang et al. presented a new watermarking scheme based on spectral coefficients in each factitious divided mesh [4]. With the goal of creating lossless watermarking for vector maps, Sun et al. proposed an algorithm based on recursive embedding [5]. Researchers also proposed several improved algorithms based on topological structure in frequency domains [6–8]. The topological characteristics of the map graphics are extracted, and then the relative coefficients of these vertices are calculated. Finally, the watermark is embedded into the coordinates. Lai and Zhang were the first to propose a solution to security issues regarding electronic charts [7]. In one study, they describe the methods they used to evaluate the performance of watermarking algorithms, and in another, they provided a security cryptography scenario to protect the content of electronic charts.
In general, the performance of digital watermarking for electronic charts means robustness, capacity, and invisibility. Information must be encoded into the watermark and embedded it into the electronic chart to indicate the copyright owner and allow detection of tampering.
A robust watermarking technique should be able to withstand different types of attacks and be easily read from the attacked map.
Producers generally prefer robust watermarking algorithms with high total information.
Invisibility is a key factor that determines the capability of the watermarking scenario to embed the watermarks. Sometimes, capacity and invisibility are mutually exclusive (Fig. 2).
3 Characteristics of the Vector Map
Generally, the broadcasted vector map consists of single points, lines, and regions, which make up three types of letters, sometimes the maps only contain two or three types of objects. This makes these maps more complex than other digital products, such as images, audio, and video.
The object in the map is described with three types of information, which are attribute, topology, and property. These instructions describe the location, name, color, and spatial relationships with other unities in the map.
Because vector maps are widely used across many areas, such as geographic information systems (GIS), military management systems, intelligent transportation systems, and similar systems. There are several storage formats, and .SHP (Table 1) is one of main standard structures for vector map. The software environment was an ArcGIS programming platform.
The details introductions of format files are as follows:
-
1.
Structural definition file .TAB: To define the la, basic layers, color rendering, and other patterns.
-
2.
Attribute description file .DAT: To describe the attribute information for every object in the map, including single vertexes, lines, and regions.
-
3.
Object index file .ID: To create the one-to-one match between the object and its attribute information, also named crossing index file.
-
4.
Topological description file .MAP: To record the characteristics of object in the topology space, for instance, geometric relation, shape features, and graphic data.
Typically, the base unit of the types of files given above is the data block. These blocks come in two sizes for a variety of software platforms: 512 bytes and 1024 bytes. As shown in Table 2, a data block consists of file heading, index block, definition block, and resource block. The label numbers of each block are marked as follows:
4 Proposed Watermarking Scheme
The watermarking scheme consists of three steps: pre-processing, embedding, and extraction.
4.1 Pre-processing
To prevent various types of attacks, before embedding the operation, the vertices to be used to embed watermark must first be chosen. This procedure is called pre-processing. Vertices will be selected using the topological characteristics of the host map.
As mentioned in Sect. 3, the vertex is described by data blocks for object definition and object attributes. By tracking the ID, some features including the name, location and attributes of the specified vertex were retrieved from the map file.
The algorithm used for pre-processing is as follows:
Input: vector map V, vertex v, the coordinate value of which is \( (v_{x} ,v_{y} ) \), connected relation R in the line, connected relation Q in the region;
Output: feature vertices set FS.
In the map V, all of connected vertices can be denoted linked list L i . The elements belonging to L i , are sorted connected vertex set \( \{ v_{1} ,v_{2} , \ldots ,v_{j} \} \).
-
1.
If vertices \( v_{i} ,v_{j} \) that make up the \( v_{i} Rv_{j} \) are established and \( v_{j} Rv_{i} \equiv v_{i} Rv_{j} \), then definite \( L_{i} = L_{i} \cup \{ v_{i} ,v_{j} \} \);
-
2.
Similarly, if some vertices connect to a closed area, such as a region in the map, denoting \( v_{i} \,Qv_{i + 1} \,Q \ldots v_{i + n - 1} \,Qv_{i + n} \,Qv_{i} \), then \( L_{i} = L_{i} \cup \{ v_{i} ,v_{i + 1} , \ldots ,v_{i + n - 1} ,v_{n + 1} \} \);
-
3.
As shown in Fig. 1(a), for some cross lines in the map, if \( L_{i} \cap L_{j} = v_{m} \), \( L_{l} \cap L_{k} = v_{n} \), \( v_{m} \,Rv_{n} \), indicating that some lines have common vertices. This defines \( L' = L_{i} \cap \{ v_{m} ,v_{n} \} \).
-
4.
As shown in Fig. 1(b) for some neighborhood regions, if \( L_{i} \cap L_{j} \ne\Phi \), then define \( L' = L_{i} \cap L_{j} \). Let L′ be \( L' \) the critical set shared by multiple adjacent regions.
-
5.
The linked list \( L' \) L′ is the result used to embed the watermark, and the elements of \( L' \) L′ also occupy the most important topological locations in the vector map.
-
6.
FS = \( L' \).
Before embedding, the map is pre-processed using the scenario given above, and one dataset FS is given to embed the watermark binary (Fig. 3).
4.2 Embedding Procedures
Restructure linked list \( L' \) L′: load the vertex elements from header of \( L' \) L′, and dived \( L' \) L′ into some sections by two vertices one pair. As shown in Fig. 4, every line curve consists of many micro-straight lines, so is the region in the map. And the pair of vertices is two terminal points of the straight line.
Define the coordinate values of two terminal vertices as \( (x_{a} ,y_{a} ),(x_{b} ,y_{b} ) \) (x a , y a ) and (x b , y b ) and the coordinate value of the medium position C denotes \( x_{c} = \frac{{\left| {x_{b} - x_{a} } \right|}}{2},\,\,y_{c} = \frac{{\left| {y_{b} - y_{a} } \right|}}{2} \).
The embedding process takes place as follows:
-
Step 1: Group the pair vertices from linked list.
-
Step 2: Select the specified pair of vertices, and compute the coordinate value of medium point C.
-
Step 3: Using the watermarking bit value, embed watermark by creating the new vertex C or not creating one. The process is carried out on the pre-processed vector map:
$$ \left\{ {\begin{array}{*{20}c} {creating\;C, if w_{i} = 1} \\ {unembedding, if w_{i} = 0} \\ \end{array} } \right. $$(1)Where \( w_{i} \) is the given i th watermark, C is the new vertex inserted into the middle of the line, to preserve invisibility, \( C(\frac{{\left| {x_{b} - x_{a} } \right|}}{2},\,\,\frac{{\left| {y_{b} - y_{a} } \right|}}{2}) \) is only created while watermark bit equals 1.
The embedding process is shown in Fig. 5.
4.3 Extraction Procedures
For a watermarked electronic chart, the procedure of watermark extraction and recovery can be demonstrated as follows:
-
Step 1: According to the topological distribution of the marked map, recover the feature dataset of vertices \( L_{ex} \) L ex , the elements are all critical to the topology, if vector map is available, then \( L_{ex} \approx L' \) L ex ≈ L′ is established.
-
Step 2: After keys grouped by the pair of vertices for linked list \( L_{ex} \) L ex , by secret key, the watermark bit could be extracted from every pair vertices.
-
Step 3: If there is one medium vertex C′ between one pair of vertices in the same line, then remove C′, and \( W_{ti} = 1 \), else, \( W_{ti} = 0 \).
5 Experimental Validation
To evaluate the performance of the proposed watermarking scheme, we use three .shp format maps, here called ‘Harbin Services map’, ‘Road map’ and ‘Urban map’. As shown in Fig. 6, the original maps used in the current experiments represent three types of topological maps: single vertex sets (Fig. 6(a)), linear vertex sets (Fig. 6(b)), and regional vertex sets (Fig. 6(c)).
Abbas et al. proposed the robust algorithm for vector map, in which additional vertex coordinates are inserted between adjacent vertices whose locations are governed by the value of the watermark data [9]. From the point of realization, it can be compared to the algorithm used in this paper. The watermark image is still 70 × 60 pixels in size, like the one used by Abbas et al., and also black and white. The vector maps are in .shp format files. The parameter described by Abbas et al. is here specified as 0.03.
The watermark image used is shown in Fig. 7.
The performance of the proposed algorithm was here measured using three criteria: robustness, watermarking capacity, and invisibility. The experiment exploits Visual Studio 6.0 and ArcGIS AO plug platform.
5.1 Robustness Evaluation
To assess the ability of the proposed algorithm to withstand attacks, the watermarked maps were here subjected to several rules. Then attempts were made to extract the watermark from the attacked host map. To quantify the extracted watermarks integrity, normalization correlation (NC) was calculated as described in Eq. 2 the algorithm.
Here n denotes the length of the watermark and \( W_{{t_{i} }} \) and \( W_{i} \) are the extracted and original watermark binary values, respectively.
Table 3 shows the results of geometric and format exchange attacks.
The results show that the proposed algorithm can preserve watermark information perfectly. It performed better when some of the topography was removed or changed.
Noise attacks made on the marked vector map, and the noise was applied to the vertices in the map. Two algorithms were used under the same experimental conditions (Table 4). The thresholds of noise attacks were specified as 0.015 and 0.03.
Because the algorithm proposed here has less information to be embedded into the vector map, the watermark does not distort the image as much as other watermarks do.
Sometimes, the map is simplified for convenient use. Here, a watermarked vector map was simplified using a compression algorithm [10]. By converting coordinates to different types, mapping the vector data, and then filtering the vertex on the curve from the map, the compression rate could exceed 40 %.
Table 5 shows the extracted watermarks after compressed attack on the vector map. The proposed algorithm performed visibly better than the one described by Abbas et al. [9]. Because the newly created vertices in the embedding algorithms were all redundant, any compression algorithm was prone to remove these non-terminal points in some straight lines. Because the Abbas algorithm requires embedding almost twice as many watermarks as the current algorithm doing, it showed extracted watermark images of poorer quality [9].
5.2 Watermarking Capacity
To evaluate the capacity of the algorithm to carry the watermarks, the proposed algorithm was compared to the existing algorithm under the same conditions in [9]. We chose the same watermark to embed them into maps for 2, 5, and 10 times.
As shown in Table 6, the proposed algorithm had a larger capacity and better performance than the earlier algorithm. The medium vertex in the map was created when the watermark bit was equal to 1, showing the current algorithm to have twice the theoretical capacity as the Abbas algorithm [9].
5.3 Invisibility
Figure 8 shows the original map (Fig. 8(a)) and watermarked map (Fig. 8(b)). As shown, the partial watermarks do not distort the map (Fig. 8(d)). Visually, the imperceptibility is very good. Figure 8(c) shows results produced using their algorithm in [9]. The fidelity is also perfect. However, as discussed, if the capacity is increased, the mark becomes more visible.
The coordinates of the regular vertices in the map showed no changes after the watermarks were embedded. None of the original vertices were moved. Only limited medium vertexes were created. For this reason, all changes were within the allowable range of distortion. The watermarked map is also shown, and has the same function as original map.
For vector maps, the precision of geographical coordinates is very important. That is, if the coordinates of some key vertices are wrong, the map cannot be used. For this reason, if the critical vertices are used to anchor the watermarks, the watermarked map can reach a sweet spot, striking a balance between performance of the algorithm and usability of the map. That is, if some watermarks are destroyed, the critical vertices that maintain the topology of the map are removed or changed, rendering the map useless.
6 Conclusion
In this paper, an improved robust embedding scheme is proposed for the electronic chart safety. Our method could keep the less distortion to the map and enhance the performance of the watermarking algorithm. To handle the first issue, we decrease the embedding amounts to preserve the topology space on the map, which results in the high invisibility and preserved topology for the watermarked map. To handle the second issue, we proposed one improved means, in which fewer vertices are created and embedded between two terminal points in some important straight lines or regions. We also provide analysis and experimental validation, we have shown that high capacity, and perfect invisibility and strong robustness all can be achieved based on the proposed scheme.
References
Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process. 6(12), 1673–1687 (1997)
Harrie, L., Sarjakoski, J.: Simultaneous graphic generalization of vector datasets. GeoInf. Comput. Environ. Urbansyst. 6(3), 233–261 (2012)
Lee, S.H., Kwon, K.-R.: Vector watermarking scheme for GIS vector map management. Multimedia Tools Appl. 63, 1–34 (2011)
Zhang, D., Qian, D.P., Han, P.: A new attributes-priority matching watermarking algorithm satisfying topological conformance for vector map. In: 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Kaohsiung, Taiwan, pp. 469–472 (2007)
Sun, J., Men, C.: Wavelet neural network based watermarking technology of 2D vector maps. High Technol. Lett. 17(3), 259–262 (2011)
Clementine, E., Difelice, P.: A comparison of methods for representing topological relationships. Inf. Sci. 80(1), 1–34 (2004)
Lai, M., Zhang, G.: A novel vector map watermarking evaluation based on electronic chart. Appl. Mech. Mater. 12(11), 622–627 (2014)
Zhao, Y., Li, G., Li, L.: Electronic chart encryption method based on chaotic stream cipher. J. Harbin Eng. Univ. 28(1), 60–64 (2007)
Abbas, T.A., Jawad, M.J., Sudirman, S.: Robust watermarking of digital vector maps for copyright protection, Liverpool, United Kingdom, pp. 1–6 (2013)
Xu, G., Tan, J., Zhong, J.: Adaptive efficient non-local image filtering. J. Image Graph. 17(4), 471–479 (2012)
Acknowledgements
We thank LetPub (www.letpub.com) for its linguistic assistance during the preparation of this manuscript.
This work was supported by the National Science Foundation of China under Grant No. 61202455, the National Science Foundation of China under Grant No. 61472096, Liaoning Science and Technology Project No. 2014302006 and the Specialized Foundation for the Basic Research Operating Expenses Program of Central College No. HEUCF100612, HEUCFT1202.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Sun, J. et al. (2016). Lossless and High Robust Watermarking of Electronic Chart for Copyright Protection. In: Che, W., et al. Social Computing. ICYCSEE 2016. Communications in Computer and Information Science, vol 623. Springer, Singapore. https://doi.org/10.1007/978-981-10-2053-7_39
Download citation
DOI: https://doi.org/10.1007/978-981-10-2053-7_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2052-0
Online ISBN: 978-981-10-2053-7
eBook Packages: Computer ScienceComputer Science (R0)