题名

Using Reversible Steganography Algorithm to Embed Metadata in Vector Maps

并列篇名

應用可逆式資料隱藏法將後設資料嵌入於向量地圖

DOI

10.6382/JIM.200910.0141

作者

王聖銘(Sheng-Ming Wang);陳富美(Fu-Mei Chen);陳凱威(Kai-Wei Chen);楊維邦(Wei-Pang Yang)

关键词

後設資料 ; 資料隱藏演算法 ; 向量地圖 ; 訊息容量 ; 可逆式 ; metadata ; steganographic algorithms ; vector maps ; embedding capacity ; reversible

期刊名称

資訊管理學報

卷期/出版年月

16卷4期(2009 / 10 / 01)

页次

141 - 167

内容语文

英文

中文摘要

向量地圖(Vector Maps)是很多地理資訊系統(GIS)發展與應用的基礎。向量地圖的後設資料(Metadata)除提供該地圖相關的詳細資料外,也是GIS發展中非常重要的參考資料。雖然後設資料的應用已有既定的基礎,但卻仍存在一些問題,尤其是其資料儲存的問題。本研究提出一個應用可逆式資料隱藏演算法,可將後設資料嵌入向量地圖。研究結果顯示,本研究可於向量地圖中嵌入2(n-2)位元的資料量,其中n代表此向量地圖的頂點數。與其它已知的研究成果相比,我們所提的方法具有最高的資料嵌入量。而本研究實驗結果顯示,一個向量地圖最少要有5458個頂點數,才能將完整的嵌入本研究所採用的ISO 19115後設資料標準中的所有項目。而最少要有1998頂點數,才能嵌入該標準所訂定的主要後設資料項目。實驗結果也顯示,本研究將後設資料擷取出來後的復原圖與原始圖間僅有肉眼所無法分辨出來的3.41E-11的RMSE誤差量。此結果可滿足任何GIS應用與發展上的精度需求。另我們的方法也具其強韌度,可抗拒外在平移、旋轉、等量縮放,以及其組合性的攻擊。

英文摘要

Vector maps are the fuel of many Geographic Information System (GIS) applications. Metadata, which is the data about vector maps, are introduced to provide the details of the vector maps. The usage of metadata is still facing some problems. Especially the storage of metadata is a problem that needs to be resolved. This paper presents an internal metadata storage mechanism for solving metadata storage problem by using a reversible steganographic algorithm to embed metadata in vector maps. Experimental results show that this method provides a solution for metadata embedding with high capacity but low distortion. The capacity of metadata embedding is 2(n-2) bits, where n is the amount of vertices of vector maps. To the best of our knowledge, our method provides the highest capaicty achieved in the literature of steganograhy for vector maps. In considering to the capacity required by the metadata elements of ISO 19115 metadata standard that we have adapted in this paper, a vector map should has at least 5458 vertices so that all mandatory and conditional metadata elements can be embedded in the vector map. Since the conditional elements should not be embedded alone, a vector map should has at least 1998 vertices so that the mandatory metadata elements can be embedded and integrated with the vector map. Experimental results also show that there is an insignificantly difference between the original and the recovery map, which is less than 3.41E-11 of the root mean square error (RMSE) and is imperceptible to the human visual system. Surely, the accuracy of recovery maps satisfies the requirements of all GIS applications development. Meanwhile, our method is robust against the affine transformation including translation, rotation, uniform scaling, and their combinations.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. Bogomjakov, A.,Gotsman, C.,Isenburg, M.(2008).Distortion-Free Steganography for Polygonal Meshes.Computer Graphics Forum,27(2),637-642.
  2. Boll, S.,Klas, W.,Sheth, A. P.(1998).Multimedia Data Management.New York:McGraw-Hill.
  3. Butler, D.(2006).Mashups mix data into global service.Nature,439(7072),6-7.
  4. Chao, M. W.,Lin, C. H.,Yu, C. W.,Lee, T. Y.(2009).A High Capacity 3D Steganography Algorithm.IEEE Transaction on Visualization and Computer Graphics,20(3),1-11.
  5. Chen, K. W.,Wang, S. M.,Wang, C. M.(2007).A Reversible Data Hiding Algorithm for 2D Vector Map.Communications of the CCISA.
  6. Chen, K. W.,Wang, S. M.,Wang, C. M.(2007).A Reversible Data Hiding Algorithm for Vector Maps.Information Security Conference 2007,Chiayi:
  7. Steganography And Digital Watermark
  8. Dublin Core Metadata Element Set, Version 1.0: Reference Description
  9. Geospatial Metadata
  10. Fisher, M.(2007).Hotmap: Looking at Geographic Attention.IEEE transactions on Visualization and Computer Graphics,13(6),1184-1191.
  11. Goodchild, M. F.,Egenhofer, M. J.,Fegeas, R.,Kottman, C. A.(1997).Interoperating Geographic Information Systems.International Conference and Workshop on Interoperating Geographic Information Systems,Santa Barbara, California, USA:
  12. Goodman, E.,Moed, A.(2006).Community in Mashups: The Case of Personal Geodata.Web Mash-ups and CSCW: Opportunities and Issues, The 20th ACM Conference on Computer Supported Cooperative Work,Banff, Alberta, Canada:
  13. Gunther, O.,Voisard, A.(1998).Managing Multimedia Data: Using Metadata to Integrate and Apply Digital Data.Mc-Graw Hill.
  14. ISO 19115:2003
  15. Kaasinen, E.(2003).User needs for location-aware mobile services.Personal Ubiquitous Computing,7(1),70-79.
  16. Kahn, D.(1996).The history of steganography.Lecture Notes In Computer Science: Proceedings of the First International Workshop on Information Hiding,1174,1-5.
  17. Kashyap, V.,Sheth, A.(1996).Semantic Heterogeneity in Global Information Systems: The Role of Metadata, Context and Ontology.Cooperative Information Systems: Current Trends and Directions,139-178.
  18. Kim, H. J.,Sachnev, V.,Shi, Y. Q.,Nam, J.,Choo, H. G.(2008).A Novel Difference Expansion Transform for Reversible Data Embedding.IEEE Transactions on Information Forensics and Security,3(3),456-465.
  19. Mnzis, A. H.(2000).SIRC 2000-The 12th Annual Colloquium of the Spatial Information Research Centre.Dunedin, New Zealand:University of Otago.
  20. Petitcolas, F. A. P.,Anderson, R. J.,Kuhn, M. G.(1999).Information Hiding-A Survey.Proceedings of the IEEE, special issue on protection of multimedia content,87(7),1062-1078.
  21. Pfitzmann, B.(1996).Lecture Notes In Computer Science.Springer-Verlag:London.
  22. An Analysis of Steganographic Techniques
  23. Schulz, G.,Voigt, M.(2004).ACM International. Workshop on Multimedia and Security.Magdeburg, Germany:
  24. Shao, C. Y.,Wang, H. L.,Niu, X. M.,Wang, X. T.(2006).A Shape-Preserving Method for Watermarking 2D Vector Maps Based on Statistic Detection.IEICE-Transactions on Information and Systems,1290-1293.
  25. Tan, X.,Zhou, M.,Zuo, X.,Cui, Y.(2008).Integration WebGIS with AJAX and XML Based on Google Maps.The First International Conference on Intelligent Networks and Intelligent Systems
  26. Tian, J.(2003).Reversible data embedding using difference expansion.IEEE Transactions on Circuits Systems and Video Technology,13(8),890-896.
  27. Turner, J. M.(2004).Data about metadata: beating the MetaMap into shape.American Society for Information Science & Technology, Special Interest Group on Classification Research (SIG/CR) Workshop
  28. Voigt, M.,Yang, B.,Busch, C.(2004).ACM Int. Workshop on Multimedia and Security.Magdeburg, Germany:
  29. Wang, C. M.,Wang, P. C.(2006).Steganography on Point-Sampled Geometry.Computers & Graphics,30(2),244-254.
  30. Wang, S. M.,Chen, F. M.(2008).The Development of a Ubiquitous Geographic Information Service by Using Service-Oriented Architecture.IEEE Asia-Pacific Services Computing Conference,Yilan, Taiwan:
  31. Wang, X. T.,Shao, C. Y.,Xu, X. G.,Niu, X. M.(2007).Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion.IEEE Transactions on information forensics and security,2(3),311-320.
  32. Yu, J.,Benatallah, B.,Casati, F.,Daniel, F.(2008).Understanding Mashup Development.IEEE Internet Computing,12(5),44-52.
  33. Zhang, D.,Qian, D.,Wu, W.,Liu, A.,Yang, X.,Han, P.(2008).Network and Parallel Computing.Berlin/Heidelberg:Springer.