2010
DOI: 10.1007/s11042-010-0536-9
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking geographical data on spatial topological relations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(27 citation statements)
references
References 11 publications
0
27
0
Order By: Relevance
“…The traditional method embed secret information in some locations of vector map: [9][10][11] proposes certain rules, they help to select a set of coordinates of vertices, and editing them by using a certain range of precision; [12,13] modify coefficients in the frequency domain to complete watermarking hiding that is one of the important solution of watermarking algorithm, but the disturb to the vector map content is also existing, the resistance performance to data fitting, interpolation, scaling is poor. In summary, the existing methods of geospatial watermarking can be distributed as follows: algorithm uses DCT, DWT, and DFT domain, the algorithms in spatial domain, and algorithms inherited in 3D watermarking.…”
Section: Related Workmentioning
confidence: 99%
“…The traditional method embed secret information in some locations of vector map: [9][10][11] proposes certain rules, they help to select a set of coordinates of vertices, and editing them by using a certain range of precision; [12,13] modify coefficients in the frequency domain to complete watermarking hiding that is one of the important solution of watermarking algorithm, but the disturb to the vector map content is also existing, the resistance performance to data fitting, interpolation, scaling is poor. In summary, the existing methods of geospatial watermarking can be distributed as follows: algorithm uses DCT, DWT, and DFT domain, the algorithms in spatial domain, and algorithms inherited in 3D watermarking.…”
Section: Related Workmentioning
confidence: 99%
“…Table 2 outlines the major differences between vector data and image data in the context of digital watermarking applications [84,89,111,169].…”
Section: Gis Vector Data Structurementioning
confidence: 99%
“…A successful attack refers to the success in removing the embedded watermark while preserving the validity of the vector map data [111]. In literature, the attacks can be classified in two categories: (a) geometric attacks [30,170,181], and (b) signal operation attacks [158,169].…”
Section: Robustnessmentioning
confidence: 99%
See 2 more Smart Citations