A dual watermarking algorithm for trajectory data based on robust watermarking and fragile watermarking

IF 4.2 2区 地球科学 Q1 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Computers & Geosciences Pub Date : 2024-06-13 DOI:10.1016/j.cageo.2024.105655
Yuchen Hu , Xingxiang Jiang , Changqing Zhu , Na Ren , Shuitao Guo , Jia Duan , Luanyun Hu
{"title":"A dual watermarking algorithm for trajectory data based on robust watermarking and fragile watermarking","authors":"Yuchen Hu ,&nbsp;Xingxiang Jiang ,&nbsp;Changqing Zhu ,&nbsp;Na Ren ,&nbsp;Shuitao Guo ,&nbsp;Jia Duan ,&nbsp;Luanyun Hu","doi":"10.1016/j.cageo.2024.105655","DOIUrl":null,"url":null,"abstract":"<div><p>Digital watermarking technology plays a crucial role in securing trajectory data. However, as trajectory data usage scenarios continue to expand, the security requirements for it have changed from a single copyright protection to one that takes into account data integrity. Existing digital watermarking algorithms for trajectory data can only choose between implementing copyright protection or ensuring integrity, unable to simultaneously achieve both functionalities. This limitation impedes the sharing and utilization of trajectory data. A dual watermarking algorithm that combines robust and fragile watermarking was innovatively proposed to solve this problem based on the geometric domain. Firstly, a set of feature points is extracted from the trajectory, and the farthest point pair of the minimum convex hull of the feature points is set as fixed points. The robust watermark is then embedded in the angles constructed by the feature points and the fixed points using quantization index modulation. Meanwhile, the trajectory points are grouped based on the angle and distance ratio constructed from the trajectory points to the fixed points. In each group, the spatiotemporal attributes of the trajectory points are mapped to the fragile watermark, which is then embedded into the distance ratios constructed by the trajectory points. Experimental results show that the proposed algorithm achieves both copyright protection and integrity verification for trajectory data and exhibits stronger robustness and tampering localization ability. This research can provide security and privacy protection for trajectory data and contribute positively to the application of trajectory data.</p></div>","PeriodicalId":55221,"journal":{"name":"Computers & Geosciences","volume":"191 ","pages":"Article 105655"},"PeriodicalIF":4.2000,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Geosciences","FirstCategoryId":"89","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0098300424001389","RegionNum":2,"RegionCategory":"地球科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0

Abstract

Digital watermarking technology plays a crucial role in securing trajectory data. However, as trajectory data usage scenarios continue to expand, the security requirements for it have changed from a single copyright protection to one that takes into account data integrity. Existing digital watermarking algorithms for trajectory data can only choose between implementing copyright protection or ensuring integrity, unable to simultaneously achieve both functionalities. This limitation impedes the sharing and utilization of trajectory data. A dual watermarking algorithm that combines robust and fragile watermarking was innovatively proposed to solve this problem based on the geometric domain. Firstly, a set of feature points is extracted from the trajectory, and the farthest point pair of the minimum convex hull of the feature points is set as fixed points. The robust watermark is then embedded in the angles constructed by the feature points and the fixed points using quantization index modulation. Meanwhile, the trajectory points are grouped based on the angle and distance ratio constructed from the trajectory points to the fixed points. In each group, the spatiotemporal attributes of the trajectory points are mapped to the fragile watermark, which is then embedded into the distance ratios constructed by the trajectory points. Experimental results show that the proposed algorithm achieves both copyright protection and integrity verification for trajectory data and exhibits stronger robustness and tampering localization ability. This research can provide security and privacy protection for trajectory data and contribute positively to the application of trajectory data.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于鲁棒水印和脆性水印的轨迹数据双重水印算法
数字水印技术在确保轨迹数据安全方面发挥着至关重要的作用。然而,随着轨迹数据使用场景的不断扩展,对其安全性的要求也从单一的版权保护转变为兼顾数据完整性。现有的轨迹数据数字水印算法只能在实现版权保护或确保完整性之间做出选择,无法同时实现两种功能。这种限制阻碍了轨迹数据的共享和利用。为了解决这一问题,我们创新性地提出了一种基于几何域的鲁棒水印和脆性水印相结合的双重水印算法。首先,从轨迹中提取一组特征点,并将特征点最小凸壳的最远点对设为固定点。然后,利用量化指数调制将鲁棒水印嵌入由特征点和固定点构建的角度中。同时,根据轨迹点与固定点构建的角度和距离比对轨迹点进行分组。在每一组中,轨迹点的时空属性被映射为脆性水印,然后将脆性水印嵌入由轨迹点构建的距离比中。实验结果表明,所提出的算法同时实现了轨迹数据的版权保护和完整性验证,并表现出更强的鲁棒性和篡改定位能力。该研究可为轨迹数据提供安全和隐私保护,为轨迹数据的应用做出积极贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computers & Geosciences
Computers & Geosciences 地学-地球科学综合
CiteScore
9.30
自引率
6.80%
发文量
164
审稿时长
3.4 months
期刊介绍: Computers & Geosciences publishes high impact, original research at the interface between Computer Sciences and Geosciences. Publications should apply modern computer science paradigms, whether computational or informatics-based, to address problems in the geosciences.
期刊最新文献
Multimodal feature integration network for lithology identification from point cloud data A two-dimensional magnetotelluric deep learning inversion approach based on improved Dense Convolutional Network Removing atmospheric noise from InSAR interferograms in mountainous regions with a convolutional neural network Novel empirical curvelet denoising strategy for suppressing mixed noise of microseismic data Curvilinear lineament extraction: Bayesian optimization of Principal Component Wavelet Analysis and Hysteresis Thresholding
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1