Skip to main content

Trajectory Data Semi-fragile Watermarking Algorithm Considering Spatiotemporal Features

  • Conference paper
  • First Online:
Spatial Data and Intelligence (SpatialDI 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14619))

Included in the following conference series:

  • 60 Accesses

Abstract

The high privacy and accuracy of trajectory data make data integrity and security critical. However, existing algorithms cannot ensure the integrity of temporal attributes and resist common operations in the normal use of data, which limits the use of data. For this reason, this paper proposes a semi-fragile water-marking algorithm for trajectory data that takes into account spatiotemporal features. The proposed algorithm utilizes the minimum area bounded rectangle (MABR) to group the trajectory data. Finally, the fragile watermarks generated from spatial and temporal attributes are embedded into an embedded domain with geometric invariance in stages using the multiple quantization index modulation (MQIM) technique. Experimental results show that the proposed algorithm is extremely robust to geometric attacks. Meanwhile, it can accurately identify whether the temporal and spatial attributes have been tampered with and the type of tampering. The proposed algorithm balances robustness and tampering detection capability, providing a feasible solution for the security protection of trajectory data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Disclosure of Interests

No conflict of interest exists relating to this article, which is approved by all authors for publication. The work described is original research that has not been published previously and is not under consideration for publication elsewhere, in whole or in part.

References

  1. Bao, L., et al.: Spatiotemporal clustering analysis of shared electric vehicles based on trajectory data for sustainable urban governance. J. Clean. Prod. 412, 137373 (2023). https://doi.org/10.1016/j.jclepro.2023.137373

    Article  Google Scholar 

  2. Xia, X., et al.: An automated driving systems data acquisition and analytics platform. Transp. Res. Part C Emerging Technol. 151, 104120 (2023). https://doi.org/10.1016/j.trc.2023.104120

    Article  Google Scholar 

  3. Wu, L., Qin, C., Xu, Z., Guan, Y., Lu, R.: TCPP: achieving privacy-preserving trajectory correlation with differential privacy. IEEE Trans. Inf. Forensics Secur. 18, 4006–4020 (2023). https://doi.org/10.1109/TIFS.2023.3290486

    Article  Google Scholar 

  4. Pan, Z.Y., Bao, J., Zhang, W.N., Yu, Y., Zheng, Y.: TrajGuard: a comprehensive trajectory copyright protection scheme. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, Anchorage, AK, USA, pp. 3060–3070. ACM (2019). https://doi.org/10.1145/3292500.3330685

  5. Peng, F., Long, B., Long, M.: A semi-fragile reversible watermarking for authenticating 3D models based on virtual polygon projection and double modulation strategy. IEEE Trans. Multimedia 25, 892–906 (2023). https://doi.org/10.1109/TMM.2021.3134159

    Article  Google Scholar 

  6. Zheng, L.B., Li, Y., Feng, L.P., Liu, H.Q.: Research and implementation of fragile watermark for vector graphics. In: 2010 2nd International Conference on Computer Engineering and Technology, pp. V1-522–V1-525 (2010). https://doi.org/10.1109/ICCET.2010.5485995

  7. Wang, N., Kankanhalli, M.: 2D vector map fragile watermarking with region location. ACM Trans. Spatial Algorithms Syst. 4, 12.1–12.25 (2018). https://doi.org/10.1145/3239163

  8. Hou, X., Min, L., Tang, L.: Fragile watermarking algorithm for locating tampered entity groups in vector map data. Geomat. Inf. Sci. Wuhan Univ. 45, 309–316 (2020). https://doi.org/10.13203/j.whugis20170404

  9. Zhang, H.L., Gao, M.: A semi-fragile digital watermarking algorithm for 2D vector graphics tamper localization. In: 2009 International Conference on Multimedia Information Networking and Security, Wuhan, China, pp. 549–552. IEEE (2009). https://doi.org/10.1109/MINES.2009.224

  10. Ren, N., Wang, Q.S., Zhu, C.Q.: Selective authentication algorithm based on semi-fragile watermarking for vector geographical data. In: 2014 22nd International Conference on Geoinformatics, Kaohsiung, Taiwan, pp. 1–6. IEEE (2014). https://doi.org/10.1109/GEOINFORMATICS.2014.6950830

  11. Hou, X., Min, L., Yang, H.: A fragile watermarking scheme for vector map data using geographic graticule block-wise method. J. Comput.-Aided Des. Comput. Graph. 30, 2042–2048 (2018)

    Google Scholar 

  12. Ren, N., Guo, S., Zhu, C., Hu, Y.: A zero-watermarking scheme based on spatial topological relations for vector dataset. Expert Syst. Appl. 226, 120217 (2023). https://doi.org/10.1016/j.eswa.2023.120217

    Article  Google Scholar 

  13. Ren, N., Zhao, M., Zhu, C., Sun, X., Zhao, Y.: Commutative encryption and watermarking based on SVD for secure GIS vector data. Earth Sci. Inf. 14, 2249–2263 (2021). https://doi.org/10.1007/s12145-021-00684-5

    Article  Google Scholar 

  14. Wang, Y., Yang, C., Ding, K.: Multiple watermarking algorithms for vector geographic data based on multiple quantization index modulation. Appl. Sci. 13, 12390 (2023). https://doi.org/10.3390/app132212390

    Article  Google Scholar 

  15. Zheng, Y., Xie, X., Ma, W.-Y.: GeoLife: a collaborative social networking service among user, location and trajectory. IEEE Data Eng. Bull. 33, 32–40 (2010)

    Google Scholar 

  16. Guo, S., Zhu, S., Zhu, C., Ren, N., Tang, W., Xu, D.: A robust and lossless commutative encryption and watermarking algorithm for vector geographic data. J. Inf. Secur. Appl. 75, 103503 (2023). https://doi.org/10.1016/j.jisa.2023.103503

    Article  Google Scholar 

  17. Zhou, Q., Zhu, C., Na Ren, Chen, W., Gong, W.: Zero watermarking algorithm for vector geographic data based on the number of neighboring features. Symmetry 13, 208 (2021). https://doi.org/10.3390/sym13020208

  18. Abubahia, A., Cocea, M.: Advancements in GIS map copyright protection schemes - a critical review. Multimed. Tools Appl. 76, 12205–12231 (2017). https://doi.org/10.1007/s11042-016-3441-z

    Article  Google Scholar 

  19. Ren, N., Zhou, Q., Zhu, C., Zhu, A.-X., Chen, W.: A lossless watermarking algorithm based on line pairs for vector data. IEEE Access 8, 156727–156739 (2020). https://doi.org/10.1109/ACCESS.2020.3017700

Download references

Acknowledgments

This work was supported by the National Key Research and Development Program of China (Grant No. 2022YFC3803600), the National Nature Science Foundation of China (Grant Nos. 41971338 and 42071362), and the Postgraduate Research & Practice Innovation Program of Jiangsu Province (Grant No. KYCX22_1584).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Changqing Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, Y., Zhu, C., Ren, N., Gu, J. (2024). Trajectory Data Semi-fragile Watermarking Algorithm Considering Spatiotemporal Features. In: Meng, X., Zhang, X., Guo, D., Hu, D., Zheng, B., Zhang, C. (eds) Spatial Data and Intelligence. SpatialDI 2024. Lecture Notes in Computer Science, vol 14619. Springer, Singapore. https://doi.org/10.1007/978-981-97-2966-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-2966-1_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-2965-4

  • Online ISBN: 978-981-97-2966-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics