2020
DOI: 10.1109/access.2020.3043450
|View full text |Cite
|
Sign up to set email alerts
|

Commutative Encryption and Watermarking Algorithm Based on Feature Invariants for Secure Vector Map

Abstract: The existing commutative encryption and watermarking (CEW) methods based on feature invariants can achieve both the robustness of the watermarking algorithm and the security of the encryption algorithm. However, they are only applicable to the raster data such as images, videos, etc. In particular, the organization structure and storage structure of vector map have not been considered in these methods. Therefore, they cannot be used for vector map. This paper derives two feature invariants to solve this proble… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 38 publications
0
8
0
Order By: Relevance
“…Table 12 reflects the results of watermark extraction, it is obvious that the watermark can be extracted successfully and that the NC values are always 1, which shows that the extracted watermark is not affected by data format conversion. rithm is more robust in resisting vertex addition attack and vertex deletion attac shown in Figure 11c-f, the proposed algorithm has the same robustness as the exi methods [2,13,24] in resisting data format conversion, scaling and translation att whereas its robustness in resisting rotation attack is not as good as the existing met [2,13,24]. The above results show that the proposed algorithm is resistant to vertex att scaling and translation attacks, data format conversion attack.…”
Section: ) Watermark Robustnessmentioning
confidence: 78%
See 4 more Smart Citations
“…Table 12 reflects the results of watermark extraction, it is obvious that the watermark can be extracted successfully and that the NC values are always 1, which shows that the extracted watermark is not affected by data format conversion. rithm is more robust in resisting vertex addition attack and vertex deletion attac shown in Figure 11c-f, the proposed algorithm has the same robustness as the exi methods [2,13,24] in resisting data format conversion, scaling and translation att whereas its robustness in resisting rotation attack is not as good as the existing met [2,13,24]. The above results show that the proposed algorithm is resistant to vertex att scaling and translation attacks, data format conversion attack.…”
Section: ) Watermark Robustnessmentioning
confidence: 78%
“…Figure 11a-b reflect that the proposed algorithm is more robust in resisting vertex addition attack and vertex deletion attack. As shown in Figure 11c-f, the proposed algorithm has the same robustness as the existing methods [2,13,24] in resisting data format conversion, scaling and translation attacks, whereas its robustness in resisting rotation attack is not as good as the existing methods [2,13,24].…”
Section: Attack Type Attack Strength Ncmentioning
confidence: 95%
See 3 more Smart Citations