• May 03, 2016 News! IJIET Vol. 5, No. 10 has been indexed by EI (Inspec).   [Click]
  • Mar 13, 2017 News!Vol. 7, No. 5 has been indexed by Crossref.
  • Mar 10, 2017 News!Vol. 7, No. 5 issue has been published online!   [Click]
General Information
    • ISSN: 2010-3689
    • Frequency: Bimonthly (2011-2014); Monthly (Since 2015)
    • DOI: 10.18178/IJIET
    • Editor-in-Chief: Prof. Dr. Steve Thatcher
    • Executive Editor: Ms. Nancy Y. Liu
    • Abstracting/ Indexing: EI (INSPEC, IET), Electronic Journals Library, Google Scholar, Crossref and ProQuest
    • E-mail: ijiet@ejournal.net
Prof. Dr. Steve Thatcher
University of South Australia, Australia
It is my honor to be the editor-in-chief of IJIET. The journal publishes good papers which focous on the advanced researches in the field of information and education technology. Hopefully, IJIET will become a recognized journal among the scholars in the filed of information and education technology.
IJIET 2011 Vol.1(2): 94-98 ISSN: 2010-3689
DOI: 10.7763/IJIET.2011.V1.16

A Blind Watermarking Approach to Protecting Geospatial Data from Piracy

Haowen Yan and Jonathan Li

Abstract—Vector geospatial data is of great value, due to the cost processes of acquiring such data. Thus, how to protect vector geospatial data from piracy has become a hot issue in the community of geographic information science, and among which watermarking has been proven a feasible tool. This paper proposes a blind watermarking technique for protecting vector geospatial data from illegal use, mainly taking into consideration four rules in watermarking, i.e. usability, invisibility, robustness, and blindness. The technique consists of two processes: a watermark embedding process and a watermarking extracting process. In the watermarking process, the technique firstly determines two feature layers and selects the key points from each layer as watermark embedding positions; then it shuffles the watermark and embeds the watermark in the two layers, respectively. At the beginning of the watermark extracting process, a step similar to that in the watermarking embedding process is carried out to obtain the two feature layers and the key points that have been used for embedding the watermark; then the coordinates of the key points are checked to extract the embedded watermark from the two feature layers, respectively; finally the similarity degree of the two watermarks extracted from two feature layers is calculated, by which the conclusion on whether the data contains the watermark can be made. Our experiments show that the technique can resist the attacks from data format change, random noise, similarity transformation, and data editing.

Index Terms—Blind Watermarking Technique, Key Point, Similarity Degree, Vector Geospatial Data

Haowen Yan, School of Mathematics, Physics and Software Engineering, Lanzhou Jiaotong University, Lanzhou 730070, China, (e-mail: h24yan@uwaterloo.ca).
Jonathan Li, Department of Geography & Environment Management, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada, (e-mail: Junli@uwaterloo.ca).


Cite: Haowen Yan and Jonathan Li, "A Blind Watermarking Approach to Protecting Geospatial Data from Piracy," International Journal of Information and Education Technology vol. 1, no. 2, pp. 94-98, 2011.

Copyright © 2008-2016. International Journal of Information and Education Technology. All rights reserved.
E-mail: ijiet@ejournal.net