Cryptography Reference
In-Depth Information
based on a threshold T DP . The selection of T DP will be discussed later. For
each iāˆˆ1, 2,,n, suppose the subset C i contains k i vertices denoted as
v 1 ,v 2 ,,v k i . It is clear that the first vertex v 1 and the last vertex v k i are two
adjacent feature points in set F and the other vertices are non-feature points
between them. Firstly, two vertices v 1 and v k i are connected to become a line
segment L i . Then a distance sequence D i =d 2 ,,d i k i āˆ’1
is calculated,
where d 2 ,,d i k i āˆ’1 are distances from every non-feature point v 2 ,,v k i āˆ’1
to the line segment L i . The local shape of C i can be directly related to set D i .
The middle point of the segment L i (denoted o i ) is also calculated for further
use. Repeat this process for all subsets C 1 ,,C i ,,C n , and obtain a final
data set composed of the distance set D o =D 1 ,,D n
. A corresponding
middle point set O =o 1 ,,o n
will be extracted from M o . Set D o will be
used as the cover data for watermarking. The main advantage is that D o is
directly related with the local shapes of the original map M o and it is invariant
to map translation or rotation.
Figure 6.7 demonstrates the above procedure using a simple polyline as
the example.
Fig. 6.7. Cover data extraction based on the Douglas-Peucker algorithm.
As shown in left part of the figure, the detected feature pointsp 1 ,p 2 ,p 3 ,p 4
divide the polyline into three subsetsC 1 ,C 2 ,C 3
. All feature points are con-
nected in turn to form the line segmentsL 1 ,L 2 ,L 3
. This is shown as a dotted
line. The middle points of the segments areo 1 ,o 2 ,o 3 . The right part of the
Fig. 6.7 then indicates the procedure of calculating the distance by taking the
segment L 1 as the example. Suppose there are six non-feature points between
the feature points p 1 and p 2 , the distance from each non-feature point to the
line segment L 1 is calculated as D 1 =d 2 ,...,d 7 . The complete calculation
of the whole polyline will obtain a distance sequence D o =D 1 ,D 2 ,D 3
.
Watermark Embedding
The watermark is embedded by changing the distributions of the cover data.
Search WWH ::




Custom Search