2017
DOI: 10.1007/978-981-10-3966-9_49
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Multiple Watermarking Algorithm Based on Correlation Detection for Vector Geographic Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…Although the vector geographic data is very sensitive to sharing, most of current work on vector map security has neglected to efficiently protect it. Much of such work focuses on digital watermarking Peng et al (2018); Wang et al (2016), access control Ma et al (2010), data scrambling Van et al (2017); Jang et al (2014); Anbo et al (2016), and data encryption Jiang and Zhou (2018); Pham et al (2017b). These existing solutions can provide better confidentiality and integrity protection.…”
Section: Introductionmentioning
confidence: 99%
“…Although the vector geographic data is very sensitive to sharing, most of current work on vector map security has neglected to efficiently protect it. Much of such work focuses on digital watermarking Peng et al (2018); Wang et al (2016), access control Ma et al (2010), data scrambling Van et al (2017); Jang et al (2014); Anbo et al (2016), and data encryption Jiang and Zhou (2018); Pham et al (2017b). These existing solutions can provide better confidentiality and integrity protection.…”
Section: Introductionmentioning
confidence: 99%
“…Although the vector geographic data is very sensitive to sharing, most of current work on vector map security has neglected to efficiently protect it. Much of such work focuses on digital watermarking [8,9], access control [10], data scrambling [11][12][13], and data encryption [14,15]. These existing solutions can provide better confidentiality and integrity protection.…”
Section: Introductionmentioning
confidence: 99%
“…However, the algorithm in [7] has a limited applicability because it is weakness against cropping attacks. In [26], several watermarks are embedded in the same coordinates one by one by using additive embedding rule. In addition, the original data are required in detection process.…”
Section: Introductionmentioning
confidence: 99%