Current Issue Cover
DWT与VCS相结合的栅格地理数据水印算法 CACIS2019会议

房礼国,付正欣,孙万忠,郁滨(信息工程大学)

摘 要
目的 由于栅格地理数据的重要性和敏感性,在其使用过程中,数据的完整性需要引起关注,一旦数据被破坏、甚至篡改,会给用户带来巨大的安全隐患;此外,如果用户将数据恶意传播出去,导致很多未授权用户越权使用数据,同样会给数据的安全带来威胁。为防止数据被破坏、篡改,需要加强对数据的完整性进行检验;为防止数据被恶意传播,需要加强对数据版权信息的保护。由于完整性检验和版权保护对水印的要求不同,在栅格地理数据中只嵌入一重水印,很难达到同时实现完整性检验和版权保护要求。若将两者结合起来,对于栅格地理数据的保护将更加全面,双重水印技术可以同时实现完整性检验和版权保护。方法 论文利用基于异或的(2, 2)﹣VCS和DWT,对数字栅格地理数据嵌入双重水印,使用半脆弱性水印作为完整性检验的第一重水印,水印信息依据DWT变换后高频系数中水平分量HL之间的大小关系嵌入,能够正确区分偶然攻击和恶意破坏,同时对恶意破坏的位置精确定位;使用零水印作为版权保护的第二重水印,提取DWT变换后LL子带奇异值分解后的特征值生成特征份,利用基于异或的(2, 2)﹣VCS,根据特征份和水印信息生成版权份,版权水印有良好的视觉效果和较强的鲁棒性。结果 为验证算法的有效性,利用本文算法对具体的栅格地理数据进行实验分析。实验结果表明,本文算法中完整性水印能够正确区分偶然攻击和恶意破坏,同时对恶意破坏的位置精确定位;版权水印具有良好的视觉效果和较强的鲁棒性。结论 根据栅格地理数据完整性检验和版权保护需求,论文深入分析栅格地理数据特征、完整性检验及其版权保护技术特点,提出一种基于DWT和VCS 的栅格地理数据完整性检验和版权保护算法。算法利用DWT和异或(2, 2)﹣VCS,对数字栅格地理数据嵌入双重水印,使用半脆弱性水印作为完整性检验的第一重水印,使用零水印作为版权保护的第二重水印。实验表明,完整性水印能够对恶意破坏的位置精确定位;版权水印具有良好的视觉效果和较强的鲁棒性。
关键词
Raster geographic data watermarking algorithm based on DWT and VCS

FANG Liguo,FU Zhengxin,Sun Wanzhong,YU Bin(Information Engineering University,Henan Zhengzhou,450001)

Abstract
Objective Because of the importance and sensitivity of raster geographic data, the integrity of data needs to be paid attention in the use process. Once raster geographic data is destroyed or even tampered with, it will bring huge security risks to users. In addition, if users maliciously disseminate data, many unauthorized users will use data beyond their authority, which will also pose a threat to the security of data. In order to prevent data from being destroyed and tampered with, it is necessary to strengthen the integrity of data inspection; in order to prevent raster geographic data from being maliciously disseminated, it is necessary to strengthen the copyright protection of data. Due to the different requirements of integrity checking and copyright protection for watermarking, it is difficult to achieve the requirements of integrity checking and copyright protection at the same time by embedding only one watermarking information in raster geographic data. If the two technologies are combined, the protection of raster geographic data will be more comprehensive, and the dual watermarking technology can simultaneously achieve integrity checking and copyright protection. Method The paper uses XOR(2,2)-VCS and DWT to embed double watermarking into digital raster geographic data. Semi-fragile watermarking is used as the first watermarking for integrity test. The watermarking information is embedded according to the size relationship between the horizontal component HL in the high frequency coefficients after DWT transformation, which can correctly distinguish between accidental attacks and malicious attacks, and accurately locate the location of malicious attacks. Using zero-watermarking as the second watermarking for copyright protection, extracting the eigenvalues of LL sub band after DWT transform and singular value decomposition to generate feature copies, and using XOR-based (2,2) -VCS to generate copyright copies according to feature copies and watermarking information, the copyright watermarking has good visual effect and strong robustness. Result In order to verify the effectiveness of the algorithm, the specific raster geographic data are analyzed experimentally using the algorithm in this paper. The experimental results show that the integrity watermarking in this algorithm can correctly distinguish between accidental attack and malicious damage, and accurately locate the location of malicious damage. Copyright watermarking has good visual effect and strong robustness. Conclusion According to the requirement of integrity checking and copyright protection of raster geographic data, in the basis of deeply analyzing the characteristics of raster geographic data, integrity checking and copyright protection technology, an algorithm of integrity checking and copyright protection of raster geographic data is proposed based on DWT and VCS. The algorithm uses DWT and XOR (2,2)-VCS to embed double watermarking into raster geographic data. Semi-fragile watermarking is used as the first watermarking for integrity checking and zero watermarking is used as the second watermarking for copyright protection. Experiments show that the integrity watermarking can accurately locate the location of malicious damage, and the copyright watermarking has good visual effect and strong robustness.
Keywords
QQ在线


订阅号|日报