Jungyeop Kim Department of Computer Science, Universit of Missouri, Columbia, USA, jyfloo@gmail.com
doi:10.4156/aiss.vol2. issue4.9
Abstract
In this paper I propose a new digital watermarking method using angles. Angles like distance are not changed easily in vector data. Because of this, the proposed method is robust to scaling. In previous methods there are distortion and topology change. However, this proposed method doesnt have distortion and topology change because I used intersection test. Therefore, the proposed method could be used in various fields to protect the copyright of vector map.
Keywords: Digital Watermarking, Vector Map Data, GIS, Angles, A Random Table 1. Introduction
The Internet and web growth is proceeding very rapidly and many digital contents are distributed by Internet. Although it has the pros that new information is created, pirate copies are generated at the same time [24, 28]. Thus, many people have looked to data embedding methods identifying digital data owners in order to protect copyright [8]. It is difficult to distinguish the pirate copies from the original because there is no difference between the original and the copies. Finally, it causes to violate an owner right of data. Therefore, copyright protection is essential in knowledge based societies [6]. There are encryption and security firewalls to protect copyright. However, if someone deciphers the code or gets through the firewall, it can be useless [8]. Although a digital watermarking adds watermarks which show copyright into the original data, the method doesnt damage the original data. Thus, it is a good method to protect copyright when an ownership dispute generates. Digital watermarking is the method of embedding information into a digital content to protect copyright [1, 4, 5, 10, 15, 18, 23, 25, 31]. Digital watermarking has several features. First, the embedding effectiveness is the probability of detection after embedding. Second, the fidelity is the similarity between the original and the watermarked data. Third, a false positive is the detection of watermarks in data that does not contain any watermarks. Fourth, the robustness is the ability to detect the watermarks in watermarked data after several operations [8]. We can classify digital watermarking methods according to several criteria. First, there are nonblind watermarking and blind watermarking method according to using the original data. Non-blind watermarking is the method that does not require original data for watermark extraction, while blind watermarking method does. Figures 1 and 2 show the blind watermarking method briefly.
- 79 -
Robust Vector Digital Watermarking Using Angles and a Random Table Jungyeop Kim
Figure 2. Watermark extraction process Second, there is frequency domain method and spatial domain method by embedding watermark method. Frequency domain method is to embed watermarks into frequency domain after changing the original data to frequency. This method is known to guarantee robustness. However, it happens not to extract watermark after geometrical attacks like rotation, scaling, and translation [31]. Moreover, it is not easy to control the distortion after embedding watermarks [9]. Third, spatial domain method is to embed watermarks into the original data directly. Although this method is known to be weaker than the frequency domain method in the robustness aspect, it has the advantage of controlling the distortion after embedding watermarks. Particularly, it can be a good method in vector map data because the distortion and position accuracy are very important in map field. Therefore, I proposed vector map digital watermarking in spatial domain. Vector map data are frequently used in GIS (Geographic Information Systems), navigation, and web map services [15]. Because coordinates are acquired only with expensive instruments, aerial photographs, vectorizing or other such means, the accumulation and management of vector map data are both costly and time-consuming processes [9, 19, 20]. GIS entails hardware, software, data, and human resources, among which data acquisition is the major cost. Indeed, this can account for 80% of an overall budget [16]. Vector data are used in several fields including government. And I expect that the value of the vector data is increased. However, illegally distribution and sale dont make a profit and cause distorted market system [17]. Therefore, as already stated, vector map copyright requires effective protection [9, 13, 19, 20, 21, 22]. Vector map data is various compared with other multimedia data such as image, video and audio file formats. Since the vector map data have a floating point data sequence with a precision, it is difficult to apply general multimedia watermarking methods to the vector map data directly [9]. In this paper, a new blind watermarking method for vector maps is proposed using interior angles. Because the angles are not changed easily, the proposed method can be robust and guarantees fidelity.
2. Related works
Generally, watermarking algorithms are categorized into two classes. Algorithms in the frequency domain embed watermarks in the transform coefficient. The main transforms are DFT(Discrete Fourier Transform), DWT(Discrete Wavelet Transformation), and DCT(Discrete Cosine Transform). These watermarking algorithms in the frequency domain are known to be robust to attacks. However, it remains difficult to correct distortions of data after watermarks are embedded. [9], [26] presented a new method by which the 2D (x, y) coordinates of each vertex are combined to construct a complex value (z=x+iy), after which DFT can be applied to that value. The watermarks embedded in Fourier descriptors can be extracted. These methods, however, have some defects. For example, after the embedding of watermarks, the original data is distorted. Also, these methods can extract watermarks only under specific attacks, not any or all attacks. There are other watermarking algorithms that embed watermarks by changing the DWT coefficients in the DWT domain [30]. Again, however, these methods can extract watermarks only under some attacks. [19] presented a blind watermarking algorithm that does not require original data to extract watermarks. The method embeds watermarks utilizing the coordinates within a single object that are highly correlated in the DCT domain. However, this method distorts the original map. Moreover, it, too, can extract watermarks only under certain attacks.
- 80 -
Advances in Information Sciences and Service Sciences Volume 2, Number 4, December 2010
Additionally, there are other algorithms that operate in the spatial domain. These algorithms embed watermarks by directly modifying the coordinates. These watermarking methods can, in comparison with algorithms operating in the frequency domain, more easily control the distortion incurred in the embedding of watermarks. [7] and [22] proposed such spatial-domain watermarking algorithms. The main idea behind this kind of algorithm is to partition data into several blocks and to embed watermarks in coordinates within those blocks using PSNR (Peak Signal to Noise Ratio). A watermarked map thus can be created by the direct alteration of those coordinates. [20] proposed a new method based on this principle. Their method partitions data into blocks and then embeds watermarks using the statistics of the coordinates within those blocks. All such methods, however, are limited in that they cannot extract watermarks under certain operations. [3] designed a novel watermarking method. First, coordinates are extracted by the Douglas-Peuker algorithm. Second, watermarks are embedded into coordinates as the correlation between them. Although this method shows good results under some operations, other generalization algorithms can easily remove watermarks generated using this method. Also, rotation and translation could destroy those watermarks. [14] proposed a new method using azimuth with the features of the vector map data. After calculating azimuth, it embedded watermarks into the azimuth. However, this method has the drawback that it requires the original data and preprocessing before extracting watermarks. In this paper, a novel method which doesnt need the original data and preprocessing is proposed. And the proposed method is robust to several attacks unlike other methods.
- 81 -
Robust Vector Digital Watermarking Using Angles and a Random Table Jungyeop Kim
- 82 -
Advances in Information Sciences and Service Sciences Volume 2, Number 4, December 2010
- 83 -
Robust Vector Digital Watermarking Using Angles and a Random Table Jungyeop Kim
with table 1. When SIK is used as a own value, the value is G(x) 228). Therefore, the watermark is calculated 93 through a formula (1), and then the angle is changed as 113.93. watermark = G(x) - P(x)%G(x) (1)
This changed angle makes the movement of the coordinates as the changed. That is, the difference between the original angle and the changed angle is bisected, and then the bisected-angle is reflected to coordinates. We can calculate the changed coordinates using formula (2). Figure 6 is example which is the part of the object. Figure 7 is to enlarge figure 6. We can the changed coordinates C as the same formula. The procedure of the embedding watermarks is below. Step 1. Calculate angles and a random table. Step 2. Calculate P(x) using a random table. Step 3. Calculate G(x) using the own values. Step 4. Change calculated angles to watermarked angles. Step 5. Calculate watermarked coordinates.
- 84 -
Advances in Information Sciences and Service Sciences Volume 2, Number 4, December 2010
of extracting watermarks proposed in this paper is similar to the process of embedding watermarks. After calculating the angle in watermarked data, one obtains new values using the random table. The watermarks are calculated using the users own value, P(x), and G(x). Finally, whether the calculated watermark is reflected in the angle between the three points is confirmed. If it is, in fact, reflected, the data can be regarded as watermarked data. We use CR (Correspondence Ratio) to validate the embedding effectiveness. The number of the objects in the data is the denominator in CR. The numerator, meanwhile, is set as the number of angles checked for an embedded watermark during the watermarking process.
CR the number of the extracted watermark the number of the objects
(3)
The procedure of the extracting watermarks is below. Step 1. Calculate angles in watermarked data. Step 2. Calculate P(x) and G(x) using a random table and an own value. Step 3. Calculate watermarks using formula (1). Step 4. Check if watermarks are embedded or not.
6. Experimental results
6.1. Experimental data and watermarking attacks
In this paper, we used the vector map file. These data, actually building data, are on the 1/1,000 scale. According to the National Geographic Information Institute of Korea, the maximal error allowed in a 1/1,000 scale map is 0.7m. Therefore, if the change is within this range, the proposed method preserves the integrity of maps. Because of this reason, we used a large scale map. An attack in watermarking is an intentional or unintentional operation generated when data is manipulated. Because the structure of the vector data is different from general multimedia data, the character of the attack is different [19]. The attack on vector data in GIS can be classified into three types: geometrical attacks, vertex attacks, and noise attacks [27]. However, almost no information would be lost in geometrical attacks such as rotation, translation, and scaling. On the other hand, vertex attacks make the vector map data unusable [3]. So, it is critical for a watermarking of vector map data to be able to withstand vertex attacks. In this paper, we experimented on vertex attacks with cropping, generalization, and adding objects. Noise attacks are to add noise on vector map. It is not frequent to generate and is not good attacks because these attacks can make loss of the position accuracy [27]. However, we examined noise attacks as adding noise separately in this paper.
- 85 -
Robust Vector Digital Watermarking Using Angles and a Random Table Jungyeop Kim
- 86 -
Advances in Information Sciences and Service Sciences Volume 2, Number 4, December 2010
Generalization 1
Generalization 2
Generalization 3
- 87 -
Robust Vector Digital Watermarking Using Angles and a Random Table Jungyeop Kim
Table 2. CR Results
Attack range Geometrical attacks 1 translation 10 100 Scaling factor 0.5 Scaling factor 0.8 scaling Scaling factor 1.2 Scaling factor 1.5 Vertex attacks 1 generalization 5 10 Adding objects Noise attacks 0.1 By rotation 0.01 0.001 0.1m By translation 0.01m 0.001m First Adding noise per area Second 100% 96% 99% 100% 100% 100% 100% 100% 85% 97% 84% 95% 100% 100% 100% 100% 100% 100% 100% CR
- 88 -
Advances in Information Sciences and Service Sciences Volume 2, Number 4, December 2010
spatial domain with reflecting the features of spatial objects. Through the intersection test, we can preserve the topology of the map data. This is a condition for a vector map digital watermarking method. However, this method has a weak point that we cannot extract watermarks if the interior angles are changed. Future work will include improving this weak point using several spatial features.
8. References
[1] A.A. Mohammad, and A.A, Sameer, An Improved SVD -based Watermarking Scheme for Protecting Rightful Ownership, Signal Processing, vol.88, no.9, pp.2158 -2180, 2008 [2] B.S.Kim and J.G.Choi, Image Watermarking Robust to Geometrical Attacks based on Normalizat ion using Invariant Centroid, Journal of KIISE, vol. 31, no. 3, pp.243 -251, 2004 [3] C.Y Shao, H.L. Wang, X.M. Niu, and X.T. Wang, A Shape -preserving Method for Watermarking 2D Vector Maps based on Statistic Detection, Proceedings of IEICE -Transactions on Information and Systems, pp. 1290-1293, 2006 [4] G. Voyatzis, and I. Pitas, Digital Image Wwatermarking using Mixing Systems, Computers & Graphics, vol.22, no.4, pp.405-416, 1998 [5] H.C. Wu, and C.C. Chang, A Novel Digital Image Watermarking Scheme based on the Vector Quantization Technique, Computers & Security, vol.24, no.6, pp.460 -471, 2005 [6] H.H. Song, Robust Image Watermarking Algorithm Using DWT and Fuzzy Inference, Doctor Thesis, Mokwon University, 2004. [7] H.I. Kang, K.I. Kim, and J.U. Choi, A vector watermarking using the generalized square mask, Proceedings of International Conference on Information Technology: Coding and Computing, pp.234-236, 2001 [8] H.S. Kim, Digital Watermarking. Green, Korea, 2005 [9] I. Kitamura, S. Kanai, and T. Kishinami, Copyright Protection of Vector map using Digital Watermarking Method based on Discrete Fourier Transform, Proceedings of the IEEE 2001 International Symposium on Geoscience and Remote Sensing Symposium, vol. 3, pp.1191-1193, 2001 [10] J. Cong, Affine Invariant Watermarking Algorithm using Feature Matching, Digital Signal Processing, vol.16, no.3, pp.247-254, 2006 [11] J.H.Lee, Blind watermarking using wavelet coefficient exchange, Doctor Thesis, Dongshin University, 2005 [12] J.K. Lee, Algorithm with C, SeHwa, Korea, 2000 [13] J.Y.Kim, Digital watermarking for 2D vector map data in spatial domain, Doctor Theis, Inha University, 2008 [14] J.Y. Kim and S.H. Park, Vector Map Data Watermarking Method using Binary Notation, The Journal of Geographic Information System Association of Korea, vol. 15, no. 4, pp.385-395, 2007 [15] K.S. Jonathan, H.Frank, and G.Bernd, Digital Wwatermarking of Text, Image, and Video Documents, Computers & Graphics, vol.22, no.6, pp.687 -695, 1998 [16] L. Carlos, Wetermarking of digital geospatial datasets: a review of technical, legal and copyright issues, International Journal of Geographical Information Science, vol. 16, no. 6, pp.589 -607, 2002 [17] M. Hu, A Study on the Application of Copyright of Digital Maps, Doctor Theis, Imha Iniversity, 2007 [18] M.C. Hu, D.C. Lou, and M.C. Chang, Dual-wrapped Digital Watermarking Scheme for Image Copyright Protection, Computers & Security, vol.26, no.4, pp.319 -330, 2007 [19] M. Voigt, B. Yang, and C. Busch, Reversible Watermarking of 2D -Vector Data, Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and security, pp.160-165, 2004 [20] M. Voigt, and C. Busch. Feature-based Watermarking of 2D Vector Data, Proceedings of the SPIE-Security and Watermarking of Multimedia Content, vol. 5020, pp. 359-366, 2003 [21] R. Ohbuchi, H. Ueda, S. Endoh, Watermarking 2D Vector Maps in the Mesh-Spectral Domain, Proceedings of International Conference on Shape Modeling and Applications, pp.216-225, 2003 [22] R. Ohbuchi, H. Ueda, and S. Endoh, Robust Watermarking of Vector Digital Maps, Proce edings of IEEE International Conference on Multimedia and Expo, vol. 1, pp. 577-580, 2002
- 89 -
Robust Vector Digital Watermarking Using Angles and a Random Table Jungyeop Kim
[23] S.H. Joo, Y.H. Suh, J.H. Shin, and H. Kikuchi, A New Robust Watermark Embedding into Wavelet DC Components, ETRI Journal, vol.24, no.5, pp.401 -404, 2002 [24] S.J.Jang, A robust watermarking algorithm for RST attacks, Doctor Thesis, Kangwon National University, 2003 [25] T.V. Nguyen, and J.C. Patra, A Simple ICA-based Digital Image Watermarking Scheme, Digital Signal Processing, vol.18, no.5, pp.762-776, 2008 [26] V. Solachidis, N. Nikolaidis, and I. Pitas, Fourier descriptors watermarking of vector graphics images, Proceedings of the International Conference on Image Processing, vol. 3, pp.9 -12, 2000 [27] X.M. Niu, A Survey of Digital Vector Map Watermarking, International Journa l of Innovative Computing, Information and Control, vol. 2, no. 6, pp.1301-1316, 2006 [28] Y.H.Kim, The adaptive digital watermarking using block -based statistical casting scheme, Doctor Thesis, Kwangwoon University, 2001 [29] Y.H. Ko, Object -oriented watermarking method based on PSADT(Polar coordinates Shape Adaptive Discrete Transform) and two-layer watermarking method, Doctor Thesis, Korea Advanced Institute of Science and Technology, 2002. [30] Y.Y. Li, and L.P. Xu, A Blind Watermarking of Vector Graphics Images, Proceedings of the Fifth International Conference on Computational Intelligence and Multimedia Applications, pp.424-429, 2003 [31] Z. Jian, and K. Eckhard, A Generic Digital Watermarking Model, Computer & GRaphics, vol. 22, no.4, pp.397-403, 1998
- 90 -