Block-based Watermarking for Robust Authentication and Integration of GIS Data

Authors

  • Afaf Tareef Faculty of Information Technology, Mutah University, Jordan
  • Khawla Al-Tarawneh King Abdullah II School for Information Technology, University of Jordan, Jordan
  • Azzam Sleit King Abdullah II School for Information Technology, University of Jordan, Jordan
Volume: 14 | Issue: 5 | Pages: 16340-16345 | October 2024 | https://doi.org/10.48084/etasr.8197

Abstract

A Geographic Information System (GIS) is a computer system for gathering, storing, transmitting, and presenting data related to positions on Earth’s surface. This research aims to authenticate the GIS data during transmission via internet based on transform-based invisible watermarking. The proposed framework uses the singular value decomposition and discrete cosine transformation in the frequency domain. The proposed framework is evaluated on National DEM images obtained from the Geospatial Information Agency's (Badan Informasi Geospatial—BIG) geoportal, under several types of attacks. Two performance metrics (Peak to Signal Noise Ratio (PSNR) and Mean Square Error (MSE)) were considered for the evaluation of the security of the designed framework. Likewise, Normalized Correlation (NC) was computed to assess the robustness by calculating the similarity between the original and the extracted images. The experimental outcomes show that the extracted logos are readable even if altered, which guarantees that the received DEM data are authentic.

Keywords:

singular value decomposition, discrete cosine transform, watermarking, encryption, authentication, DEM, GIS

Downloads

Download data is not yet available.

References

I. I. Vulic et al., "Protection of Digital Elevation Model—One Approach," Applied Sciences, vol. 12, no. 19, Jan. 2022, Art. no. 9898.

K. L. A. El-Ashmawy, "Vertical Accuracy of Google Earth Data," Engineering, Technology & Applied Science Research, vol. 14, no. 3, pp. 13830–13836, Jun. 2024.

A. M. Ali, "Making Different Topographic Maps with the Surfer Software Package," Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12556–12560, Feb. 2024.

A. Sleit and N. Fetais, "Watermarking: A Review of Software and Hardware Techniques," in International Conference on Computational Science and Computational Intelligence, Las Vegas, NV, USA, Dec. 2018, pp. 397–403.

L. Perez-Freire, P. Comesana, J. R. Troncoso-Pastoriza, and F. Perez-Gonzalez, "Watermarking Security: A Survey," in Transactions on Data Hiding and Multimedia Security I, Y. Q. Shi, Ed. New York, NY, USA: Springer, 2006, pp. 41–72.

A. Tareef and A. Al-Ani, "A highly secure oblivious sparse coding-based watermarking system for ownership verification," Expert Systems with Applications, vol. 42, no. 4, pp. 2224–2233, Mar. 2015.

Y. S. Singh, B. P. Devi, and K. M. Singh, "A Review of Different Techniques on Digital Image Watermarking Scheme," International Journal of Engineering Research, vol. 2, no. 3, pp. 194–200, 2013.

A. Tareef, A. Al-Ani, H. Nguyen, and Y. Y. Chung, "A novel tamper detection-recovery and watermarking system for medical image authentication and EPR hiding," in 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Chicago, IL, USA, Aug. 2014, pp. 5554–5557.

E. B. Tarif, S. Wibowo, S. Wasimi, and A. Tareef, "A hybrid encryption/hiding method for secure transmission of biometric data in multimodal authentication system," Multimedia Tools and Applications, vol. 77, no. 2, pp. 2485–2503, Jan. 2018.

C. Yang, C. Zhu, Y. Wang, T. Rui, J. Zhu, and K. Ding, "A Robust Watermarking Algorithm for Vector Geographic Data Based on Qim and Matching Detection," Multimedia Tools and Applications, vol. 79, no. 41, pp. 30709–30733, Nov. 2020.

Q. Zhou, C. Zhu, N. Ren, W. Chen, and W. Gong, "Zero Watermarking Algorithm for Vector Geographic Data Based on the Number of Neighboring Features," Symmetry, vol. 13, no. 2, Feb. 2021, Art. no. 208.

X. Xi, Y. Hua, Y. Chen, and Q. Zhu, "Zero-Watermarking for Vector Maps Combining Spatial and Frequency Domain Based on Constrained Delaunay Triangulation Network and Discrete Fourier Transform," Entropy, vol. 25, no. 4, Apr. 2023, Art. no. 682.

H. H. Le, V. T. Nguyen, H. A. Le, and D. H. Nguyen, "A Robust Integrated Watermarking Algorithm for Vector Geographic Data Copyright Protection." Jul. 13, 2023.

C. Qu, X. Xi, J. Du, and T. Wu, "Robust Watermarking Scheme for Vector Geographic Data Based on the Ratio Invariance of DWT–CSVD Coefficients," ISPRS International Journal of Geo-Information, vol. 11, no. 12, Dec. 2022, Art. no. 583.

S. Guo, S. Zhu, C. Zhu, N. Ren, W. Tang, and D. Xu, "A robust and lossless commutative encryption and watermarking algorithm for vector geographic data," Journal of Information Security and Applications, vol. 75, Jun. 2023, Art. no. 103503.

M. Al-Saad, N. Aburaed, A. Panthakkan, S. A. Mansoori, and H. A. Ahmad, "Protection and Authentication of Dubai Digital Elevation Model using Hybrid Watermarking Technique," in 4th International Conference on Signal Processing and Information Security, Dubai, United Arab Emirates, Nov. 2021, pp. 13–16.

F. Amhar et al., "Ownership Protection on Digital Elevation Model (DEM) Using Transform-Based Watermarking," ISPRS International Journal of Geo-Information, vol. 11, no. 3, Mar. 2022, Art. no. 200.

A. Tareef, "Secure transmission and ownership identification of digital elevation model," Science International (Lahore), vol. 35, no. 3, pp. 379–382, Jun. 2023.

L. Wu, J. Zhang, W. Deng, and D. He, "Arnold Transformation Algorithm and Anti-Arnold Transformation Algorithm," in First International Conference on Information Science and Engineering, Nanjing, China, Dec. 2009, pp. 1164–1167.

"Seamless Digital Elevation Model (DEM) dan Batimetri Nasional." https://tanahair.indonesia.go.id/demnas/.

"Geoportal BIG." https://geoportal.big.go.id/#/.

S. A. Kasmani and A. Naghsh-Nilchi, "A New Robust Digital Image Watermarking Technique Based on Joint DWT-DCT Transformation," in Third International Conference on Convergence and Hybrid Information Technology, Busan, Korea (South), Nov. 2008, vol. 2, pp. 539–544.

Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: from error visibility to structural similarity," IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, Apr. 2004.

Downloads

How to Cite

[1]
Tareef, A., Al-Tarawneh, K. and Sleit, A. 2024. Block-based Watermarking for Robust Authentication and Integration of GIS Data. Engineering, Technology & Applied Science Research. 14, 5 (Oct. 2024), 16340–16345. DOI:https://doi.org/10.48084/etasr.8197.

Metrics

Abstract Views: 31
PDF Downloads: 32

Metrics Information