一种矢量地图同态加密域可逆水印方法
吴柏燕(1980—),女,湖南衡阳人,副教授,博士,主要从事地理空间信息安全研究。E-mail: wby@hnust.edu.cn |
收稿日期: 2023-08-23
修回日期: 2023-12-09
网络出版日期: 2025-04-17
基金资助
地理信息安全与应用湖南省工程研究中心开放课题(HNGISA2024004)
湖南省自然科学基金项目(2025JJ80231)
版权
A reversible watermarking algorithm in homomorphic encrypted domain for vector map data
Received date: 2023-08-23
Revised date: 2023-12-09
Online published: 2025-04-17
Supported by
Open Research Project of Hunan Engineering Research Center for Geographical Information Security and Application(HNGISA2024004)
Natural Science Foundation of Hunan Province(2025JJ80231)
Copyright
加密技术可防止非授权用户浏览数据。可逆水印技术可用于对数据的一致性或来源进行认证,并可无损恢复原始数据。针对矢量地图数据的安全保护问题,结合加密技术和可逆水印技术,提出一种基于非对称公钥同态加密的矢量地图加密域可逆水印方法。所提算法,基于加密算法的同态特性,在地图数据密文域中实现了基于改进直方图平移的可逆水印嵌入机制。对3个不同类型的地图数据进行算法实验,实验结果验证了本文算法的可行性和有效性。通过对3个地图数据的水印嵌入性能的分析及与相关明文域和密文域矢量地图可逆水印算法的比较,发现本文算法具有更大的水印容量,更好的水印透明性及更安全的数据加密效果,是一种针对矢量地图的理想的非对称同态加密域可逆水印方案。
吴柏燕 , 柳范硕 , 刘曦 . 一种矢量地图同态加密域可逆水印方法[J]. 地理科学, 2025 , 45(4) : 699 -710 . DOI: 10.13249/j.cnki.sgs.20231149
Encryption serves as a safeguard against unauthorized access to data by unauthorized users. Reversible watermarking, on the other hand, can be employed to authenticate the integrity and origin of data, while enabling the lossless recovery of the original data. In light of the security requirements for vector map data protection, this study combines encryption and reversible watermarking techniques to present a novel reversible vector map watermarking algorithm within the asymmetric homomorphic encrypted domain. By capitalizing on the homomorphic characteristics of the encryption algorithm, the proposed approach devises a reversible watermark embedding mechanism grounded in an improved histogram shifting method, which is directly executed within the ciphertext domain. Upon decryption of the ciphertext map with a private key, the watermark can be retrieved from the resultant plaintext map. Subsequently, the original map can be restored through the implementation of inverse histogram shifting. The algorithm is implemented and evaluated using 3 distinct map datasets. The experimental results validate the feasibility and efficacy of the proposed algorithm. Through a comprehensive analysis of the watermarking performance on these 3 map datasets, along with a comparison with existing reversible watermarking algorithms in both the plaintext and ciphertext domains for vector maps, it is demonstrated that the proposed algorithm exhibits a larger payload capacity, higher imperceptibility, and a more secure encryption effect. Thus, it represents a practical and viable reversible watermarking solution in the asymmetric homomorphic encryption domain for vector maps.
表1 3个测试数据集信息Table 1 Information of 3 test datasets |
数据集 | 顶点数 | 比例尺 | 精度容忍度 | X方向顶点相对间距 | Y方向顶点相对间距 |
路网数据 | 1∶10万 | 10 m | 0.826 | 0.538 | |
居民地数据 | 1∶1万 | 1 m | 1.996 | 0.818 | |
POI数据 | 1∶5万 | 5 m | 6.471 | 4.368 |
表3 数据加解密运行时间/msTable 3 Running time of data encryption and decryption/ms |
操作 | 文献[33]算法 | 本文算法 | |||||
路网数据 | 居民地数据 | POI数据 | 路网数据 | 居民地数据 | POI数据 | ||
加密 | 487 | 263 | 220 | 469 | 234 | ||
解密 | 471 | 236 | 211 | 563 | 219 |
表4 3个测试数据加密前后顶点空间分布指数σTable 4 σ of 3 test datasets before and after encryption |
数据集 | 加密前 | 加密后 | 加密后 |
文献[33] | 本文算法 | ||
路网数据 | 78.45 | 39.36 | |
居民地数据 | 127.32 | 20.51 | 13.79 |
POI数据 | 46.24 | 6.32 | 4.82 |
[1] |
朱长青, 任娜, 徐鼎捷. 地理信息安全技术研究进展与展望[J]. 测绘学报, 2022, 51(6): 1017-1028.
Zhu Changqing, Ren Na, Xu Dingjie. Geo-information security technology: Progress and prospects. Acta Geodaetica et Cartographica Sinica, 2022, 51(6): 1017-1028.
|
[2] |
Xi Xu, Zhang Xinchang, Sun Ying et al. Topology-preserving and geometric feature-correction watermarking of vector maps[J]. IEEE Access, 2020, 8: 33428-33441.
|
[3] |
Yan Haowen, Zhang Liming, Yang Weifang. A normalization-based watermarking scheme for 2D vector map data[J]. Earth Science Informatics, 2017, 10(4): 471-481.
|
[4] |
Yang Chengsong, Zhu Changqing, Wang Yingying et al. A robust watermarking algorithm for vector geographic data based on QIM and matching detection[J]. Multimedia Tools and Applications, 2020, 79: 30709-30733.
|
[5] |
Peng Yuwei, Lan Hai, Yue Mingliang. Multipurpose watermarking for vector map protection and authentication[J]. Multimedia Tools and Applications, 2018, 77(6): 7239-7259.
|
[6] |
侯翔, 闵连权, 杨辉. 利用地理坐标网分块的矢量地图脆弱水印方案[J]. 计算机辅助设计与图形学学报, 2018, 30(11): 2042-2048.
Hou Xiang, Min Lianquan, Yang Hui. A fragile watermarking scheme for vector map data using geographic graticule block-wise method. Journal of Computer-Aided Design & Computer Graphics, 2018, 30(11): 2042-2048.
|
[7] |
侯翔, 闵连权, 唐立文. 定位篡改实体组的矢量地图脆弱水印算法[J]. 武汉大学学报(信息科学版), 2020, 45(2): 309-316.
Hou Xiang, Min Lianquan, Tang Liwen. Fragile watermarking algorithm for locating tampered entity groups in vector map data. Geomatics and Information Science of Wuhan University, 2020, 45(2): 309-316.
|
[8] |
Wang Nana, Bian Jilong, Zhang Han. RST invariant fragile watermarking for 2d vector map authentication[J]. International Journal of Multimedia and Ubiquitous Engineering, 2015, 10(4): 155-172.
|
[9] |
王奇胜, 朱长青, 符浩军. 利用数据点定位的矢量地理数据数字水印算法[J]. 测绘学报, 2013, 42(2): 310-316.
Wang Qisheng, Zhu Changqing, Fu Haojun. The digital watermarking algorithm for vector geographic databased on point positioning. Acta Geodaetica et Cartographica Sinica, 2013, 42(2): 310-316.
|
[10] |
Wang Nana, Zhao Xiangjun, Zhang Han. Block-based reversible fragile watermarking for 2D vector map authentication[J]. International Journal of Digital Crime and Forensics, 2015, 7(3): 60-80.
|
[11] |
Lin Zixing, Peng Fei, Long Min. A reversible watermarking for authenticating 2D vector graphics based on bionic spider web[J]. Signal Processing: Image Communication, 2017, 57: 134-146.
|
[12] |
Qiu Yinguo, Duan Hongtao. A novel multi-stage watermarking scheme of vector maps [J]. Multimedia Tools and Applications, 2021, 80(1): 877-897.
|
[13] |
Peng Fei, Chen Li, Long Min. A reversible watermark scheme for 2D vector map based on reversible contrast mapping[J]. Security and Communication Networks, 2013, 6(9): 1117-1125.
|
[14] |
Wang Nana, Men Chaoguang. Reversible fragile watermarking for locating tampered blocks in 2D vector maps[J]. Multimedia Tools and Applications, 2013, 67(3): 709-739.
|
[15] |
Wang Nana. Reversible fragile watermarking for locating tampered polylines/polygons in 2D vector maps[J]. International Journal of Digital Crime and Forensics, 2016, 8(1): 1-25.
|
[16] |
Lin Zixing, Peng Fei, Long Min. A low-distortion reversible watermarking for 2D engineering graphics based on region nesting[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2372-2382.
|
[17] |
Peng Fei, Lin Zixing, Zhang Xiang et al. A semi-fragile reversible watermarking for authenticating 2D engineering graphics based on improved region nesting[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2021, 31(1): 411-424.
|
[18] |
Wang Nana, Zhang Han, Men Chaoguang. A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates[J]. Computer-Aided Design, 2014, 47: 108-117.
|
[19] |
Xiao Di, Hu Shulei, Zheng Hongying. A high capacity combined reversible watermarking scheme for 2D CAD engineering graphics[J]. Multimedia Tools and Applications, 2015, 74: 2109-2126.
|
[20] |
Wang Nana. Reversible watermarking for 2D vector maps based on normalized vertices[J]. Multimedia Tools and Applications, 2017, 76: 20935-20953.
|
[21] |
Wang Nana, Kankanhalli Mohan. 2D vector map fragile watermarking with region location[J]. ACM Transactions on Spatial Algorithms and Systems, 2018, 4(4)12.1-12.25.
|
[22] |
Peng Fei, Liu Yan, Long Min. Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting[J]. Computer-Aided Design, 2014, 49: 42-50.
|
[23] |
Wang Xiaotong, Shao Chengyong, Xu Xiaogang et al. Reversible data-hiding scheme for 2D vector maps based on difference expansion[J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3): 311-320.
|
[24] |
Wang Nana, Men Chaoguang. Reversible fragile watermarking for 2D vector map authentication with localization[J]. Computer-Aided Design, 2012, 44(4): 320-330.
|
[25] |
Peng Fei, Lei Yuzhou, Long Min et al. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion[J]. Computer-Aided Design, 2011, 43(8): 1018-1024.
|
[26] |
孙鸿睿, 李光强, 朱建军. 改进的差值扩张和平移矢量地图可逆水印算法[J]. 武汉大学学报(信息科学版), 2012, 37(8): 1004-1007.
Sun Hongrui, Li Guangqiang, Zhu Jianjun. Improved reversible watermarking algorithm for vector map based on difference expansion and shifting. Geomatics and Information Science of Wuhan University, 2012, 37(8): 1004-1007.
|
[27] |
Jang Bong Joo, Lee Suk Hwan, Lee Eung Joo et al. A crypto-marking method for secure vector map[J]. Multimedia Tools and Applications, 2017, 76(14): 16011-16044.
|
[28] |
Ren Na, Zhu Changqing, Tong Deyu et al. Commutative encryption and watermarking algorithm based on feature invariants for secure vector map[J]. IEEE Access, 2020, 8: 221481-221493.
|
[29] |
Ren Na, Tong Deyu, Cui Hanchuan et al. Congruence and geometric feature-based commutative encryption-watermarking method for vector maps[J]. Computers and Geosciences, 2022, 159: 1-14.
|
[30] |
Ren Na, Zhao Ming, Zhu Changqing et al. Commutative encryption and watermarking based on SVD for secure GIS vector data[J]. Earth Science Informatics, 2021, 14: 2249-2263.
|
[31] |
Li Yu, Zhang Liming, Wang Xiaolong et al. A novel invariant based commutative encryption and watermarking algorithm for vector maps[J]. ISPRS International Journal of Geo-information, 2021, 10(11): 1-18.
|
[32] |
Peng Fei, Lin Zixing, Zhang Xiang et al. Reversible data hiding in encrypted 2D vector graphics based on reversible mapping model for real numbers[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(9): 2400-2411.
|
[33] |
Peng Fei, Jiang Wenyan, Qi Ying et al. Separable robust reversible watermarking in encrypted 2D vector graphics[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8): 2391-2405.
|
[34] |
Paillier Pascal. Public-key cryptosystems based on composite degree residuosity classes[C]. Prague: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, 1999: 233-238.
|
/
〈 |
|
〉 |