Skip to main content

GIS Watermarking: Hiding Data in 2D Vector Maps

  • Chapter
Intelligent Multimedia Data Hiding

Part of the book series: Studies in Computational Intelligence ((SCI,volume 58))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. . http://www.thedigitalmap.com

  2. . Sakamoto, M., Matsuura, Y., and Takashima, Y. (2000): A scheme of digital watermarking for geographical map data. Symposium on cryptography and Information security

    Google Scholar 

  3. . Kang, H. (2001): A vector watermarking using the generalized square mask. Proc. International Symposium on Information Technology: Coding and Computing, 234-236

    Google Scholar 

  4. . Schulz, G. and Voigt, M. (2004): A high capacity watermarking system for digital maps. Proceedings of the 2004 multimedia and security workshop on Multimedia and security, 180-186

    Google Scholar 

  5. . Huber, B.: Gis & steganography - part 3: Vector steganography. Available: http://www.directionsmag.com/

  6. Voigt, M. and Busch, C. (2003): Feature-based watermarking of 2d-vector data. Proceedings of SPIE, Security and watermarking of Multimedia Content, 5020, 359-366

    Google Scholar 

  7. Ohbuchi, R., Ueda, H., and Endoh, S. (2002): Robust watermarking of vector digital maps. Proc. IEEE International Conference on Multimedia and Expo, (ICME ’02), 1, 577-580

    Article  Google Scholar 

  8. Voigt, M. and Busch, C. (2002): Watermarking 2d-vector data for geographical information systems. Proceedings of SPIE, Security and watermarking of Multimedia Content, 4675, 621-628

    Google Scholar 

  9. Nikolaidis, N., Pitas, I., and Solachidis, V. (2000): Fourier descriptors watermarking of vector graphics images. Proc. IEEE International Conference on Image Processing, 3, 9-12

    Google Scholar 

  10. . Solachidis, V., Nikolaidis, N. and Pitas I. (2000): Watermarking polygonal lines using Fourier descriptors. Proc. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP’2000), 1955-1958

    Google Scholar 

  11. Nikolaidis, N., Pitas, I., and Giannoula, A. (2002): Watermarking of sets of polygonal lines using fusion techniques. Proc. IEEE International Conference on Multimedia and Expo (ICME ’02), 2, 549-552

    Article  Google Scholar 

  12. Kitamura, I., Kanai, S. and Kishinami, T. (2001): Copyright protection of vector map using digital watermarking method based on discrete Fourier transform. Proc. IEEE International Geoscience and Remote Sensing Symposium (IGARSS ’01), 3, 1191-1193

    Google Scholar 

  13. . Li, Y. and Xu, L. (2003): A blind watermarking of vector graphics images. Proc. Fifth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2003), 424-429

    Google Scholar 

  14. . Ohbuchi, R., Ueda, H., and Endoh, S. (2003): Watermarking 2d vector maps in the mesh-spectral domain. Proc. International Conference on Shape Modeling and Applications, 216-225

    Google Scholar 

  15. . Ohbuchi, R., Takahashi, S., Miyazawa, T., and Mukaiyama, A. (2001): Watermarking 3d polygonal meshes in the mesh spectral domain. Proc. Graphics Interface, 9-17

    Google Scholar 

  16. Douglas, D.H. and Peucker, T.K. (1973): Algorithms for the reduction of the number of points required to represent a digitized line or its caricature. Canadian Cartographer, 10, 112-122

    Google Scholar 

  17. Honsinger, C., Jones, P., Rabbani, M., and Stoffel, J. (1999): Lossless recovery of an original image containing embedded data. U.S. Patent 6 278-791

    Google Scholar 

  18. Fridrich, J., Goljan, M., and Du, R. (2001): Invertible authentication. Proc. SPIE, Security and Watermarking of Multimedia Contents, 3971, pp. 197-208

    Google Scholar 

  19. . Ni, Z., Shi, Y., Ansari, N., and Su, W. (2003): Reversible data hiding. Proceedings IEEE of ISCAS’03, 2, II-912-II-915

    Google Scholar 

  20. Leest, A., Veen, M. and Bruekers, F. (2003): Reversible image watermarking. Proc. IEEE International Conference on Image Processing, 2, 731-734

    Google Scholar 

  21. . Tian, J. (2002): Reversible watermarking by difference expansion. Proc. of Workshop on Multimedia and Security, 19-22

    Google Scholar 

  22. Veen, M., Bruekers, F., Leest, A., and Cavin, S. (2003): High capacity reversible watermarking for audio. Proceedings of the SPIE, 5020, 1-11

    Article  Google Scholar 

  23. . Voigt, M., Yang, B., and Busch, C. (2004): Reversible watermarking of 2dvector data. Proceedings of the 2004 Multimedia and Security Workshop on Multimedia and Security, 160-165

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Niu, XM., Shao, CY., Wang, XT. (2007). GIS Watermarking: Hiding Data in 2D Vector Maps. In: Pan, JS., Huang, HC., Jain, L.C., Fang, WC. (eds) Intelligent Multimedia Data Hiding. Studies in Computational Intelligence, vol 58. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71169-8_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71169-8_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71168-1

  • Online ISBN: 978-3-540-71169-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics