Bulletin of Surveying and Mapping ›› 2020, Vol. 0 ›› Issue (8): 81-86,100.doi: 10.13474/j.cnki.11-2246.2020.0253

Previous Articles     Next Articles

Digital fingerprint algorithm for vector spatial data using GD-PBIBD coding

CHEN Jinping1,2,3, ZHANG Liming1,2,3, JIANG Meirong1,2,3, WANG Hao1,2,3   

  1. 1. Faculty of Geomatics, Lanzhou Jiaotong University, Lanzhou 730070, China;
    2. National-Local Joint Engineering Research Center of Technologies and Applications for National Geographic State Monitoring, Lanzhou 730070, China;
    3. Gansu Provincial Engineering Laboratory for National Geographic State Monitoring, Lanzhou 730070, China
  • Received:2019-10-18 Online:2020-08-25 Published:2020-09-01

Abstract: Aiming at the difficulty of tracking traitors and low coding efficiency about fingerprint for vector map data, a fingerprint algorithm using GD-PBIBD code is proposed in this paper. Firstly, the fingerprint codes are generated by using the GD-PBIBD, also the fingerprint is shuffled by using the Logistic map before embedding. Then, the feature points of the vector map data are extracted by using the D-P algorithm, and the phase coefficients and amplitude coefficients are obtained by performing DFT transformation on the feature points. The QIM method is used to embed the fingerprint into the amplitude coefficient of the DFT transform domain, and the DFT inverse transform is implemented to obtain the vector map data containing the fingerprint. The experiment selected some Chinese road network and a certain area data in green space. After the fingerprint was embedded in the algorithm, linear and nonlinear simulation attacks were carried out. The fingerprint sequence was successfully extracted and the collaborators were tracked by Hamming distance. The algorithm has a simple coding structure. When the code length is fixed, it can accommodate more users than the BIBD code, and the efficiency is high. The algorithm is robust against single-user fingerprint attacks and multiple attacks, and can resist multi-user minimum and the maximum and minimum attacks, which track all traitors, can be used for vector map data copyright protection, provide a basis for vector space data traitor tracking.

Key words: vector spatial data, fingerprint encoding, GD-PBIBD, anti-collusion attack, DFT

CLC Number: