2012
DOI: 10.1007/978-3-642-27334-6_7
|View full text |Cite
|
Sign up to set email alerts
|

A Robust Blind Watermarking of Vector Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…It combines closely with the watermarking and vector data, thus to determine the copyright owner, as well as tracking the infringement, content authentication, integrity verification, providing additional information about the digital content, etc [20], as fig.2 [21][22][23][24] focus on the robust watermarking to confirm the copyright owner. [15] proposes a novelty algorithm: (1) when the authorized users using vector map dealt by the algorithm, it can recover original condition at the same time in the extraction of watermarking information vector data, and restore secrecy of vector map at the exit of using embedding watermark information automatically; (2) when the authorized users using the algorithm of vector map, due to the scrambling of random key is unpredictable, users who don't know the key are hard to crack, avoiding the illegal use of high precision data, and on the basis of the embedded watermarking can be realized under the condition of no attack source tracing.…”
Section: Copyright Decision Module/integrity Decision Modulementioning
confidence: 99%
“…It combines closely with the watermarking and vector data, thus to determine the copyright owner, as well as tracking the infringement, content authentication, integrity verification, providing additional information about the digital content, etc [20], as fig.2 [21][22][23][24] focus on the robust watermarking to confirm the copyright owner. [15] proposes a novelty algorithm: (1) when the authorized users using vector map dealt by the algorithm, it can recover original condition at the same time in the extraction of watermarking information vector data, and restore secrecy of vector map at the exit of using embedding watermark information automatically; (2) when the authorized users using the algorithm of vector map, due to the scrambling of random key is unpredictable, users who don't know the key are hard to crack, avoiding the illegal use of high precision data, and on the basis of the embedded watermarking can be realized under the condition of no attack source tracing.…”
Section: Copyright Decision Module/integrity Decision Modulementioning
confidence: 99%