Watermarking 2D Vector Maps in the Mesh-Spectral Domain
1
Ryutarou Ohbuchi, 1Hiroo Ueda, 2Shuh Endoh
ohbuchi@acm.org, k7026@kki.yamanashi.ac.jp, endoshu@jp.ibm.com
1
Computer Science Department, University of Yamanashi
4-3-11 Takeda, Kofu-shi, Yamanashi-ken, 400-8511, Japan.
2
GIS Business Promotion, IBM Japan.
Abstract
(e.g., gas stations, hotels, and convenience stores), all of
which are the result of the work which is often humanresource intensive.
Digital watermarking is a possible approach to counter
abuses of digital media data, such as texts, audio data,
images, movies, as well as 2D digital maps [16, 6, 12].
Digital watermarking adds a structure called watermark
to the target data object (mostly) imperceptibly to the
users and inseparably from the object. The information
encoded in the watermark can be used, for example, to
identify the copyright owner or to detect tampering.
Two-dimensional (2D) digital maps can be classified
into either raster- or vector-digital maps (Figure 1). A
raster digital map represents a map as raster image data,
i.e., an image represented by a 2D array of pixels. A
limitation of raster digital maps is quality degradation
caused by rotation, scaling, and other geometrical
transformations. Many web-based map services uses
raster digital maps exactly for this reason; raster digital
maps having limited resolution have a limited value for
reuse or redistribution. As an image data, most of the
watermarking algorithm developed for digital images [16,
6, 12] can be applied to the raster digital map. A vector
digital map, on the other hand, employs geometrical
primitives such as points, lines, polylines, and polygons to
represent objects in the maps, such as building outlines,
roads, rivers, reference points for strings, and contour
lines. Unlike the raster digital maps, the vector digital
This paper proposes a digital watermarking algorithm for
2D vector digital maps. The watermark is a robust,
informed-detection watermark to be used to prevent such
abuses as an intellectual property rights violation. The
algorithm proposed in this paper embeds watermarks in
the frequency-domain representation of a 2D vector
digital map. Our method treats vertices in the map as a
point set, and imposes connectivity among the points by
using Delaunay triangulation. The method then computes
the mesh-spectral coefficients [Karni00] from the mesh
created. Modifications of the coefficients according to the
message bits, and inverse transforming the coefficients
back into the coordinate domain produces the
watermarked map. Our evaluation experiments showed
that the watermark produced by the method is resistant
against additive random noise, similarity transformation,
vertex insertion and removal. It is also resistant, to some
extent, against cropping. Compared to our previous
algorithm [Ohbuchi02], the algorithm described in this
paper showed significantly improved attack resiliency.
1. Introduction
Applications of digital maps have been increasing rapidly.
They are used, for example, in car navigation systems,
location-based services for cellular phones with GPS
(Global Positioning System) capability, web-based map
services, and in geographical information systems (GIS)
for city planning or disaster management. Digital maps
are easy to update, duplicate, and distribute. As a digital
data, digital maps are very easy to update, duplicate, and
distribute. They are also prone to such abuses as illegal
duplication and illegal distribution.
Geographical maps may be published by a government
agency and shared (with fees) among map producing
companies. Map companies add value to the base maps.
For example, a car-navigation map should have up-todate building positions, road and building outlines,
building ownership, road signs, business and shop data
CS dept.
Figure 1. Raster (left) and vector (right) digital maps.
1
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
maps have an advantage of being able to be scaled and
rotated without loss of quality. This advantage, on the
other hand, makes a vector digital map a more valuable
target for theft than an image digital map.
This paper presents a robust, informed-detection
watermarking algorithm for 2D vector digital maps. The
watermarking algorithm treats vertices in the map as a
point set, and creates a 2D mesh out of the point set by
using Delaunay triangulation. The algorithm then
transforms the mesh shape into a “frequency” domain
representation by using the mesh spectral analysis
technique proposed by Karni et al [14, 15]. The algorithm
modifies the most significant, that is, the low-frequency
coefficients to encode watermark message bits. An inverse
transformation back into the spatial domain creates a
watermarked map.
Experiments showed that the watermark produced by
the method is resistant against (1) additive random noise,
(2) global Affine transformation, (3) vertex insertion and
deletion, and (4) scrambling of object orders in the file. It
is also resistant, to a certain extent, against (5) cropping.
The method is mildly resistant to local deformations as
well. Compared to our previous algorithm [22], the
algorithm described in this paper showed significantly
improved attack resiliency.
The rest of the paper is organized as follows. After
reviewing previous work in the next section, we will
present our watermarking algorithm Section 2. We then
describe the results of evaluation experiments in Section 3,
followed by a conclusion and future work in Section 4.
rectangle of the grid as a “pixel” of a raster image. As the
pixel value of the images, they used the average of the
areas of buildings defined by polygons that fall inside
each rectangular “pixel”. The image is then watermarked
by using a method similar to a wavelet-based imagewatermarking algorithm.
We have previously reported a watermarking
algorithm for 2D vector digital maps [22]. The algorithm
used a simple idea of translating a set of vertices in a
uniformly subdivided rectangular region for embedding a
message bit. The direction of translation of the set of
vertices in a rectangle encoded a bit of the watermark
message. The algorithm employed modified quad-tree
[27] subdivision to create the rectangles adaptively to the
density of vertices. A depth-first traversal of the quad tree
created an ordering among the pixels. By averaging the
displacement of the vertices upon extraction, and by
repeatedly embedding the same message many times over
a map, the watermarks produced by the method are
resistant against additive random noise,
As a watermarking target, a three-dimensional (3D)
polygonal mesh is somewhat similar to a 2D vector map;
both are defined as a set of vertices (with either 2D or 3D
coordinate values) and their connectivity. There are
algorithms for watermarking 3D meshes [19, 20, 13, 1,
29, 24, 28, 32, 30, 5, 23]. These algorithms alter either
vertex coordinate or vertex connectivity of the meshes for
watermarking. Many of the recent 3D mesh watermarking
methods employed transformed-domain approaches to
watermarking [13, 24, 21, 30, 5, 23]. A method in this
class would transform the mesh into a domain that
reflects the notion of “frequency” and modify the most
significant, low frequency components of the mesh shape
to embed watermark messages. By modifying the low
frequency component, the watermarks embedded by using
these “frequency-domain” techniques are resistant against
additive random noise, mesh smoothing (i.e., low-pass
filtering), and other attacks. Our initial ideas question
was if we could apply techniques developed for 3D
polygonal meshes to watermarking 2D vector digital
maps.
Of course, there are differences between 2D vector
digital maps and 3D polygonal meshes, one of which is
the relative ease of pose normalization. One of the major
difficulties in watermarking 3D meshes is that of pose
normalization, that is, normalization of the position, size,
and orientation of the original and watermarked 3D
meshes. Pose normalization of a 3D model is quite
difficult if mesh simplification or remeshing has been
1.1. Previous Work
We know of only a few published works on
watermarking vector digital maps [18, 17, 10]. Kurihara
et al [18] encoded information into individual vertex
coordinate, and their watermarks are quite fragile, among
others, against additive random noise. Endoh, Masuda,
Kanai, and Ohbuchi collaboratively developed nearly a
dozen algorithms to watermark vector digital maps [10].
These watermarking methods are available as a part of
the GIS map development toolkit. These watermarking
methods targeted either vertex coordinate or vertex
connectivity for watermarking. Kitamura et al reported, in
detail, one of the algorithms developed by the
collaboration [17]. In the Kitamura’s method, a vector
digital map is converted into a 2D array of scalar values,
i.e., a “raster image”. They subdivided the digital map
uniformly into a rectangular grid, and treated each
2
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
Embeddi ng㩷㩷
applied in addition to geometrical transformation. In the
case of the 2D vector maps, however, pose normalization
is relatively easy. A reference map to align a watermarked
map against can be found most of the time, so the scale
and the orientation of the watermarked map can be
normalized easily.
In the algorithm reported in this paper, we adopted the
frequency domain mesh watermarking approach of [21,
23]. We also exploit a characteristic of 2D vector digital
maps, namely, the ease of pose normalization, in
developing our robust, informed-detection watermarking
algorithm for 2D vector digital maps described in this
paper.
Reference Watermark
map㩷M
message㩷
Reference Watermarked
map㩷 M map 㩷M̂
11000... 㩷
Our watermarking algorithm embeds message bits into a
2D vector digital map by modifying a “frequency” domain
representation of the map. Figure 2 shows an overview of
the embedding and extraction steps.
To compute the “frequency” domain representation,
the algorithm first establishes connectivity among vertices
of the map by using Delaunay triangulation, creating a
2D mesh that covers every vertex in the map. The mesh is
then transformed into a frequency domain representation
by using mesh spectral analysis proposed by Karni and
others [14, 15]. Modification of the frequency domain
coefficients according to the message bits embeds a
watermark. Inverse transforming the modified coefficient
back into the coordinate domain produces a map with the
watermark embedded. The modification of coefficients in
the frequency domain ultimately displaces vertex
coordinates in the spatial domain.
For computational efficiency and for robustness
against cropping, a map is first divided into many
rectangular sub-areas. We employed the k-d tree
subdivision [9, 27] adaptively to the density of vertices in
the map so that sub-areas have approximately equal
numbers of vertices. Aforementioned mesh spectral
analysis and watermark embedding is performed for each
of the sub-areas. By embedding the same watermark
repeatedly in multiple sub-areas, the watermark becomes
resilient against cropping. The watermark is resilient
against random noise and other attacks since the
watermark is embedded into the low frequency
component of the mesh version of the map.
The watermark is an informed- (or non-blind-)
detection watermark. Watermarks are extracted by
comparing the reference map (the map before
01100㩷
Delaunay
meshing㩷
Pose
normalization 㩷
Patch
generation㩷
Vertex
matching㩷
Spectral
analysis㩷
Delaunay
meshing㩷
Modulation㩷
Patch
generation㩷
Spectral
synthesis㩷
Spectral
analysis㩷
2. The algorithm
01100㩷
Demodulation㩷
Watermarked
map 㩷M̂
11000... 㩷
Watermark
message㩷
Figure 2. An overview of the watermark embedding and
extraction steps.
watermarking, which may be escrowed) with the
watermarked and possibly attacked watermark map.
To extract the watermark, the two maps are first
geometrically registered by using an iterative optimization
process to minimize distance among a set of landmarks.
This registration could remove an Affine transformation
applied to the watermarked map. Then, the area
subdivision equal to the one used for the embedding is
recreated on the reference map, and the subdivision is
transferred to the watermarked map. For each
corresponding sub-area, mesh spectral analysis and then
comparison of spectral coefficients recovers the embedded
watermark.
2.1. Embedding
2.1.1. Meshing and area subdivision
A vector digital map is a collection of polygons and
polylines that are not connected to each other. We first
3
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
Extraction㩷㩷
connect all the vertices into a single mesh by using
Delaunay triangulation [9]. Figure 3a shows a vector
digital map and its Delaunay mesh is shown in Figure 3b.
The algorithm then creates multiple rectangular
submeshes, called watermarking patches. The purpose of
subdivision into watermarking patches are twofold; (1) to
increase resiliency against cropping attacks by repeatedly
embedding the same watermark into multiple patches of a
map, and (2) to reduce computational cost of
eigenanalysis, the core of the mesh spectral analysis, by
reducing the mesh size. The patches generated should
contain roughly equal number of vertices, and that the
number of vertices must exceed certain threshold to
ensure the payload (i.e., the amount of watermark
message bits embeddable.) We employed k-d tree [9, 27]
to adaptively subdivide the mesh into patches of roughly
equal vertex counts. An example of the patches generated
by this technique is shown in Figure 3c, overlaid on the
original map.
2.1.3. Spectral analysis
Mesh spectral analysis has been introduced by Karni
and Gotsman to analyze shapes of 3D polygonal mesh
models for compressing their geometry [14, 15]. Ohbuchi
et al. [21, 23], and later, Cayre et al [5], applied the
technique for watermarking 3D polygonal meshes in the
“frequency” or mesh spectral domain. We borrow the
technique for watermarking 2D vector digital maps by
converting the maps into 2D meshes prior to
watermarking.
There are several different mesh Laplacian matrices [4,
3, 8]. We employ Biggs’ definition of mesh Laplacian R
for the algorithm described in this paper.
(a) Original map.
R = I − HA
In the formula, I is the identity matrix and H is a
diagonal matrix whose diagonal element Hii = 1 d i is the
reciprocal of the degree (or valence) of the vertex j. A is
the adjacency matrix whose elements are defined as
below;
(b) Vertices of the map to the left are Delaunay
triangulated.
1, if vertices i and j are adjacent;
aij =
otherwise.
0,
(2)
Figure 4a shows a simple mesh and Figure 4b shows
its Laplacian matrix.
A polygonal mesh M having n vertices yields a
Laplacian matrix R of size n × n . Eigenanalysis of R
produces n eigenvalues λi and n n-dimensional
eigenvectors w i (1 ≤ i ≤ n) . Projecting each component
of the vertex coordinate v i = ( xi , yi ) (1 ≤ i ≤ n) separately
onto the i-th normalized eigenvectors ei
(c) Watermark patches are generated adaptively to the
local vertex counts.
ei = w i w i
Figure 3. Vertices are triangulated to create a mesh,
which is then subdivided into watermark patches.
4
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
(1)
(1 ≤ i ≤ n)
(3)
produces n mesh spectral coefficient vectors ri = ( rs ,i , rt ,i )
(1 ≤ i ≤ n) . The subscripts s, and t denote orthogonal
coordinate axes in the mesh-spectral domain
corresponding to the spatial axes x and y.
We form the matrix R for a watermark patch using
the connectivity within the patch. Edges connecting the
patch with other patches are not included in our
Laplacian matrix.
The inverse transformation, the mesh-spectral
synthesis, is simply a linear combination of the basis ei
scaled by the mesh spectral coefficients ri .
T
( x1 , x2 ,..., xn )
T
( y1 , y2 ,..., yn )
= rs ,1e1 + rs ,2 e2 + ⋯ + rs ,n en ,
2.1.4. Modulation
After the spectral coefficients are computed, a
watermark is embedded into the map by modifying the
spectral coefficients according to the message bits. The
algorithm employs a simple modulation method similar to
Hartung’s [11]. The data to be embedded is an mdimensional bit vector a = ( a1 , a2 ,..., am ) in which each
bit takes values {0,1} . Each bit a j is spread spatially over
the map by duplicating each symbol by chip rate c ,
producing a watermark symbol vector b = (b1 , b2 ,...bmc ) ,
bi ∈ {0,1} of length m ⋅ c . Repeatedly embedding the
same bit c times increases resiliency of the watermark
against additive random noise. If a watermark patch
contains more vertices than the specified minimum d , the
maximum value for the repetition is c = floor ( L n)
where n is the number of bits of the payload, the
watermark message. For example, a mesh contains
480 vertices and the payload is 128 bit, chip rate c can be
1, 2, or 3.
Each element bi of the symbol vector b is then
repeated or spread c times;
(4)
= rt ,1e1 + rt ,2 e2 + ⋯ + rt ,n en .
The spectral coefficients represent the notion of
frequency (in the sense of the Fourier transformation) of
the shape of the mesh, especially if (1) the lengths of
edges are uniform over the mesh, and that (2) the degrees
of vertices are uniform over the mesh [14, 15]. The mesh
produced by the Delaunay triangulation has more uniform
edge length than by the other triangulation methods given
a set of points. However, as it is obvious from the example
shown in Figure 3, the triangles in the mesh have a wide
range of size and varying aspect ratio that may interfere
with the Frequency decomposition of the mesh shape by
using the mesh spectral analysis.
A㩷
bi = a j , j ⋅ c ≤ i < ( j + 1) ⋅ c
After the spreading, the bit vector b i is converted to
′ ) ,
an embedding symbol vector b ′ = (b1′, b2′ ,...bmc
bi′ ∈ {−1,1} by the following mapping to create a zeromean signal;
B㩷
E㩷
−1, if bi = 0;
bi′ =
1, if bi = 1.
F㩷
A
B
1
−1 4
−1 4
0
−1 4
0
−1 3
1
0
−1 3
−1 4
−1 4
C
D
E
−1 3
−1 3
0
−1 4 −1 4
0
−1 4 −1 4
1
−1 3
1
0
−1 4
0
1
−1 4 −1 4 −1 4
F
0
−1 4
−1 4
−1 3
−1 4
1
sˆi = si + bi′ ⋅ pi ⋅α
(7)
The extraction requires the key kw used for the
embedding. Key distribution can be achieved by using a
public-key cryptography scheme, for example.
The modulation amplitude α in the mesh spectral
domain should be chosen so that the vertex displacement
in the spatial domain won’t affect visual qualities of maps.
The geographical map standard by the Geographical
Survey Institute of Japan states that the maximal error
(b) The Laplacian matrix for the mesh.
Figure 4. An example of the mesh Laplacian matrix.
5
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
(6)
Assume that there are L usable rectangles and that ith
rectangle contains M vertices. Let vi, m be the coordinate
of mth vertex (1 < m < M ) in the ith rectangle prior to the
watermarking, pi ∈ {−1,1} be the pseudo-random number
sequence (PRNS) generated from a known key kw , and
α (α > 0) be the modulation amplitude. The coordinate
sˆi.m of the vertex after watermarking is computed by the
following formula;
C㩷
D㩷
(a) A simple example mesh.
A
B
C
D
E
F
(5)
arrowed in a 1/2500-scale map is 0.3mm, which
corresponds to 75 cm in the real world. Perturbation of
vertices on the map by 2 or 3 integer coordinate points,
that are, 20 or 30 cm in the real world, should be
acceptable as long as the discontinuity artifacts introduced
by the displacements are unnoticeable.
Since the spatial domain displacement is determined
by the formula (4), both the modulation amplitude α as
well as the number of coefficients modified, that is, the
chip rate c, determines the vertex displacement in the
spatial domain. The vertex displacement is roughly
proportional to the product of α ⋅ c .
To deal with the vertex-insertion attack, the algorithm
chooses a vertex in M̂ that is inside the circle of
diameter t of the vertex vr of M . If there is more than one
such vertex, the vertex closest to vr is used. To deal with
the vertex-removal attack, if no vertex in M̂ is found
inside the circle of diameter t of the vertex vr of M , a
vertex vw is inserted into M̂ . The inserted vertex vw has
the coordinate of vr. The coordinate value of vr is of
course incorrect; it is simply treated as noise by the
extraction algorithm.
The diameter t is a user-defined parameter. We chose
the value of t=100 cm for the experiments described
below. The value is chosen based on the maximal error of
75 cm (in the real-world scale) arrowed in a 1/2500-scale
Japanese geographical map.
2.2. Extraction
2.2.1. Pose normalization
2.2.3. Meshing and patch generation
Prior to the extraction, an affine transformation
applied to the watermarked map M̂ is removed. This is a
rather simple case of so-called affine matching problem
(e.g., [6, 26]). In our algorithm, a set of corresponding
pairs of landmarks are selected in the maps M and M̂ .
Then, the sum of Euclidian distance between the
landmark pairs is minimized. This minimization is
performed by repetitively applying miniscule rotation,
translation, and scaling transformations. Our algorithm
uses the coordinate of the lower-left corner of a string that
is associated with a building (or any other land object) for
the matching. Correspondence between a pair of
landmarks in the maps can be established easily by simply
comparing the strings attached to them. We typically
employ about 30 to 80 landmark pairs for the pose
normalization.
In terms of watermarking, the most significant
difference between 2D vector digital map and the 3D
polygonal meshes lies in the relative difficulty of the pose
normalization. For 2D vector digital maps, accurate pose
normalization is possible even after affine transformation
using (literally) landmarks. For 3D mesh models, even
with reference mesh, such normalization can be quite
difficult if the mesh had gone through geometrical
transformation combined with mesh simplification and
other connectivity changes.
The reference map M is Delaunay triangulated, and
the watermarking patches are created. The triangulation
and the patches on M are exactly the same as the ones
used for embedding. The triangulation and the
patchfication are then transferred to the watermarked map
M̂ . Using the vertex-to-vertex correspondence between
the maps M and M̂ established above.
2.2.4. Spectral Analysis
The spectral analysis is performed first on the reference
mesh, which produces exactly the same set of
eigenvectors and mesh spectral coefficients as the ones
computed for the M during embedding. Note that the
eigenvectors computed for the M can be used to derive
mesh spectral coefficients for the M̂ , for they have the
same connectivity. Expensive eigenvalue decomposition
computation need to be performed only once per patch for
the reference map M .
2.2.5. Demodulation
To extract a message bit, the algorithm compares a
mesh spectral coefficient of M with the corresponding
coefficients of M̂ . Let’s assume that the ith coefficients
of M̂ and M̂ are si and sˆi , respectively, and that pi is
the same PRNS as is used for embedding, generated from
the same stego-key kw . Then, the sum of the products q j
can be computed as follows;
2.2.2. Vertex matching
( j +1)⋅c −1
After the pose normalization, vertices that are either
inserted or deleted due to attacks are found by comparing
the coordinate values of the reference map M and the
watermarked map M̂ .
qj =
i = j ⋅c
6
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
∑
( j +1)⋅c −1
(sˆi − si ) ⋅ pi =
∑
i = j ⋅c
bi′ ⋅α ⋅ pi2
(8)
If pi is the same for embedding and extraction, and if
disturbances of the vertex coordinates of M̂ (e.g.,
additive random noise) are negligible,
q j = c ⋅α ⋅ bi′
Figure 5. As we target maps that mainly represent houses
and buildings, we choose the maps from the urban and
suburban residential and commercial areas.
(9)
3.1. Perceptibility
where q j takes one of the two values {−α c,α c} . Since α
and c are always positive, simply testing for the signs of
q j recovers the original message bit sequence a j ,
Perceptibility of the watermark depends on various
parameters, including the payload m, patch size d, the
(10)
a j = sign(q j )
The string a j can easily be converted to the original
message bit sequence bi by applying an inverse of the
mapping as the embedding.
3. Experiments and results
In all the experiments described below, we used the
following parameters.
(a) Original map (enlarged.)
Minimum patch size d: d = 480 is used. The
perceptibility experiment used d = 128 as well.
Payload: A message of size 128 bit is embedded.
Modulation amplitude α : α = 1.0 and α = 1.5 .
Chip rate c: c=1 for the cases where d ≥ 128 , and c=2
and c=3 for the cases where d ≥ 480 .
For the experiments, we used the 6 maps listed in
Map A
Map B
Map C
Map D
Map E
Map F
(c) d=128, c=1, α =1.5
(d) d=480, c=2, α =1.0
(e) d=480, c=3, α =1.0
(f) d=480, c=2, α =1.5
(g) d=480, c=3, α =1.5
Figure 6. Perceptibility of the watermark using various
watermarking parameters.
Figure 5. Six maps used for the evaluation experiment.
7
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
(b) d=128, c=1, α =1.0
8.
Vertex insertion: Vertices are added to target objects
i.e., polygons and polylines, while trying to preserve
the appearance of the map. In the experiment, 3000
vertices are added to a map.
9. Additive random noise: Random noise having the
amplitudes of either α =10 cm, 30cm, or 50cm
(attacks 9a, 9b, and 9c, respectively) is added to the
vertex coordinate.
10. Cropping: Each map is cropped according to the 8
cropping patterns shown in Figure 7. Areas of the
cropped maps varied from 1/2 to 1/16 of the original.
chip rate c, and the modulation amplitude α. An increase
in c or α improves the attack resiliency but it decreases
the visual quality of the map. The effect of the patch size
d is subtler. For example, a larger patch would have a
higher resiliency against additive random noise, but the
resulting decrease in the number of patches per map
reduces the resiliency against cropping attacks.
Figure 6a-6g shows the effect on visual quality of the
map of the watermarking, using 6 combinations of
watermarking parameters. The figure shows the map area
of the size approximately 30m × 30m in the real world. A
higher chip rate c and the higher amplitude α (of the
coefficients modulation) clearly degraded the visual
quality of the map. In this example, parameters d=480,
c=2, α=1.0 showed the least amount of distortion. It also
showed acceptable performance in terms of attack
resiliency in the experiments that follows.
Table 2 shows the results of the experiments. In
Table 2, all the bit error rates are the average over the six
maps used for the experiment. Table 2 also includes the
results obtained using our previous watermarking method
[22] for comparison. Some of the boxes are left vacant, as
these figures are not available for our previous method.
Overall, the new frequency domain watermarking
method described in this paper significantly outperformed
our previous algorithm in terms of attack resiliency.
Comparing between the chip rates of 2 and 3, the results
produced by the higher chip rate of c=3 produced
somewhat less error than the lower chip rate of c=2.
The new watermark is robust against translation,
upscaling, or rotation in which case no error occurred.
The new watermark is immune to vertex insertion and
scrambling of object order in the map data file as
expected.
3.2. Resiliency against attacks
We experimentally evaluated the attack resiliency of
the watermark using the following attacks;
1.
2.
3.
4.
5.
6.
7.
Translation: Translate all the vertices in the map by
1000 units and 500 units, respectively, toward
positive x and y directions.
Upscaling: Uniformly enlarge the map by the factor
5.5.
Downscaling: Uniformly shrinks the map by 0.3
(attack 3a) and 0.6 (attack 3b) times the original.
Coordinate values are rounded to the nearest
integers.
Rotate: Rotate the map by 45 degree about the
upper-left corner (0,0) (attack 4a) or the center
(3750, 2500) (attach 4b) of the map.
Similarity transformation: The map is rotated by
45 degree about the center of the map (3750, 2500),
translated, and then downscaled by the factor of 0.6.
Coordinate values are rounded to the nearest
integers after the downscaling.
Local deformation: The map is subdivided uniformly
into rectangular grid of size 10 ×10 , and the vertices
inside each rectangle are rotated by 1 degree about
the center of the rectangle. Given the vertex
coordinate of ( x, y) , the direction of rotation for the
coordinate is clockwise if ( x + y) mod 2 = 0 ,
counterclockwise if otherwise.
Object order scrambling: The order of appearance of
objects (e.g., polygons of building outlines) in a data
file is scrambled.
Pattern 2
Pattern 3
Pattern 4
Pattern 5
Pattern 6
Pattern 7
Pattern 8
Figure 7. Eight cropping patterns used for the experiments.
8
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
Pattern 1
map into a mesh by using Delaunay triangulation, and
then applying mesh spectral analysis proposed by Karni et
al [14, 15].
Experiments showed that the watermarks produced by
our new method described in this paper are more resilient
than our previous algorithm [22]. The watermark
produced by new algorithm is resilient, to some extent,
against such attacks as additive random noise, addition of
vertices, rotation, scaling, and cropping of the map.
Our future work includes improvements in attack
resiliency. For example, resiliency against additive
random noise or other frequency dependent attacks can be
improved by computing a better frequency domain
representation of the shape.
We also need to find a quantitative measure of
distortion that reflects human perception, as well as
standard sets of attacks and maps that can be used for
objectively evaluating and comparing the proposed map
watermarking methods.
Downscaling by the factor of 0.3 caused errors due to
the round off error of the coordinate values. A
combination of rotation, translation, and downscaling also
caused errors, most likely due to the round off error due to
downscaling.
The watermark showed significant error after the local
deformation. Unlike a global geometrical transformation
(e.g.,
similarity
transformation),
local random
deformation can’t be compensated for by our pose
normalization method. The watermarks also showed
significant errors after the cropping that reduced the area
of the map down to 1/2~1/16 of the original. In both
attacks, the error rates of the new algorithm are again
much lower than those using our previous method.
4. Conclusion and future work
In this paper, we presented a frequency-domain
watermarking algorithm for vector digital maps. The
algorithm embeds bits into a map by modifying
“frequency” domain representation of the map. The mesh
spectral coefficients are computed by first converting the
References
[1] O. Benedens, Geometry-Based Watermarking of 3D Models,
Table 2. Bit error rates due to various attacks. The payload was 128 bit. The “N/M” and “N/A” in the boxes indicate,
respectively, “not measured” and “not available”.
Previous
method
New method
Minimum vertex counts per patch d
Modulation amplitude α
Chip rate c
(1) Translation
(2) Upscaling (× 5.5)
(3a) × 0.6
(3) Downscaling
(3b) × 0.3
(4a) Center at (0, 0), 45 degree
(4) Rotation
(4b) Center at (3750, 2500), 45 degree
(5) Similarity transformation ((4b)+(1)+(3a))
(6) Local deformation
(7) Object order scrambling
(8) Vertex insertion (3000 vertices)
(9a) α=10cm
(9) Additive
(9b) α=30cm
random noise
(9c) α=50cm
(10a) Pattern 1
(10b) Pattern 2
(10c) Pattern 3
(10d) Pattern 4
(10) Cropping
(10e) Pattern 5
(10f) Pattern 6
(10g) Pattern 7
(10h) Pattern 8
9
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE
480
1.0
2
0.0 %
0.0 %
0.0 %
0.1 %
0.0 %
0.0 %
0.1 %
9.2 %
0.0 %
0.0 %
0.0 %
0.1 %
5.9 %
0.0 %
0.1 %
0.7 %
0.4 %
0.8 %
0.4 %
1.4 %
18.8 %
480
1.0
3
0.0 %
0.0 %
0.0 %
0.0 %
0.0 %
0.0 %
0.0 %
8.1 %
0.0 %
0.0 %
0.0 %
0.0 %
3.4 %
0.0 %
0.4 %
1.3 %
0.0 %
0.0 %
0.4 %
0.4 %
15.1 %
0.0 %
0.0 %
0.7 %
--0.0 %
0.0 %
1.0 %
45.2 %
0.0 %
0.0 %
0.0 %
--8.5 %
1.4 %
1.8 %
7.0 %
6.8 %
16.7 %
15.0 %
11.3 %
35.9 %
Information Processing Society of Japan (IPSJ), (Computer
Security No. 009-1, 2000) (Japanese).
IEEE CG&A, pp. 46-55, January/February 1999.
[2] O. Benedens, C. Busch, Towards Blind Detection of Robust
Watermarks in Polygonal Models, Proc. EUROGRAPHICS 2000
(Computer Graphics Forum, Volume 19(2000), No. 3)
[19] R. Ohbuchi, H. Masuda, and M. Aono, Watermarking
Three-Dimensional
Polygonal
Models,
Proc.
ACM
Multimedia ’97, pp. 261-272, Seattle, Washington, USA,
November 1997.
[3] N. Biggs, Algebraic Graph Theory (2nd Ed.). Cambridge
University Press, 1993.
[20] R. Ohbuchi, H. Masuda, and M. Aono, Watermarking
Three-Dimensional Polygonal Models Through Geometric and
Topological Modifications, pp. 551-560, IEEE JSAC, May 1998.
[4] B. Bollobás, Modern Graph Theory, Springer, 1998.
[5] F. Cayre, P. Rondao Alface & H. Maître, Compression and
watermarking of 3D triangle meshes, SPIE 47th Annual
Meeting, Jul. 2002, Seattle, WA (2002)
[21] Ryutarou Ohbuchi, Shigeo Takahashi, Takahiko Miyazawa,
and Akio Mukaiyama, Watermarking 3D Polygonal Meshes in
the Mesh Spectral Domain, in Proc. Graphics Interface 2001,
pp. 9-17, Ontario, Canada, June, 2001.
[6] G. S. Cox, G. DeJager, A survey of point pattern matching
techniques and a new approach to point pattern recognition,
Proc. South African Symposium on Communications and Signal
Processing 1993, pp. 243-248.
[22] Ryutarou Ohbuchi, Hiro Ueda, Shu Endoh, Robust
Watermarking of Vector Digital Maps, in Proc. IEEE
Conference on Multimedia and Expo 2002 (ICME 2002),
Lausanne, Swistzerland, August 26-29, 2002.
[7] Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom,
DIGITAL WATERMARKING, Morgan Kaufmann Publishers,
2001.
[8] F. R. K. Chung, Spectral Graph Theory, Number. 92 in
Regional Conference Series in Mathematics, American
Mathematical Society, 1997.
[23] Ryutarou Ohbuchi, Akio Mukaiyama, Shigeo Takahashi, A
Frequency-Domain Approach to Watermarking 3D Shapes,
Computer Graphics Forum 21(3), pp. 373-382, 2002 (Proc.
EUROGRAPHICS 2002)
[9] M. de Berg, M. van Kreveld, M. Overmars, O. Schwarzkopf,
Computational Geometry: Algorithms and Applications, 2nd
edition, Springer, 2000.
[24] Emil Praun, Hugues Hoppe, Adam Finkelstein, Robust
Mesh Watermarking, Proc. SIGGRAPH ‘99, pp. 49-56, Aug.
1999.
[10] Shuh Endoh, Hiroshi Masuda, Ryutarou Ohbuchi, Satoshi
Kanai, Development of Digital Watermarking Technology for
Vector Digital Maps, IPA Technology Expo 2001 Reports, 2001
(Japanese).
[25] W. H. Press et al., Numerical Recipes in C-The Art of
Scientific Programming, 2nd Ed., Cambridge University Press,
Cambridge, UK, 1992.
[26] I. Rothe, H. Suesse, K. Voss, The method of normalization
to determine invariants, IEEE Trans. on PAMI, Vol. 18, No. 4
(1996), pp. 366-377.
[11] F. Hartung, P. Eisert, and B. Girod, Digital Watermarking
of MPEG-4 Facial Animation Parameters, Computers and
Graphics, Vol. 22, No. 4, pp. 425-435, Elsevier, 1998.
[27] H. Samet, The Design and Analysis of Spatial Data
Structures, Addison-Wesley, Reading, MA, 1990.
[12] Neil F. Johnson, Zoran Duric, and Sushil Jajodia,
Information Hiding: Steganography and Watermarking–Attacks
and Countermeasures, Kluwer Academic Publishers, 2000.
[28] M. G. Wagner, Robust Watermarking of Polygonal Meshes,
Proc. Geometric Modeling & Processing 2000, pp. 201-208,
Hong Kong, April 10-12, 2000.
[13] S. Kanai, H. Date, and T. Kishinami, Digital Watermarking
for 3D Polygons using Multiresolution Wavelet Decomposition,
Proc. Sixth IFIP WG 5.2 GEO-6, pp. 296-307, Tokyo, Japan,
December 1998. (http://minf.coin.eng.hokudai.ac.jp/members/
kanai/wm1-geo6.pdf)
[29] B-L. Yeo and M. M. Yeung, Watermarking 3D Objects for
Verification, IEEE CG&A, pp. 36-45, January/February 1999.
[30] Kangkang Yin, Zhigeng Pan, Jiaoying Shi, David Zhang,
Robust mesh watermarking based on multiresolution processing,
Computers & Graphics, Vol. 25 (2001), pp. 409-420.
[14] Zachi Karni, Craig Gotsman, Spectral Compression of
Mesh Geometry, Proc. SIGGRAPH 2000, pp. 279-286, 2000.
[15] Zachi Karni, Craig Gotsman, 3D Mesh Compression Using
Fixed Spectral Bases, Proc. Graphics Interface 2001, pp. 1-8,
2001.
Acknowledgements
We thank Zenrin Co. Ltd. for lending us the map data for the
experiments. We’d like to thank Prof. Hiroshi Masuda of the
University of Tokyo and Prof. Satoshi Kanai of Hokkaido
University for valuable discussions and comments. We also
thank Prof. Shigeo Takahashi for useful comments. A part of
this research is funded by the grant No. 12680432 from the
Ministry of Education, Culture, Sports, Sciences, and
Technology of Japan, as well as the Okawa Foundation of
Information and Telecommunications.
[16] S. Katzenbeisser, F. A. P. Petitcolas, Digital Watermarking,
Artech House, London, 2000.
[17] I. Kitamura, S. Kanai, and T. Kishinami, Watermarking
Vector Digital Map using Wavelet Transformation, Proc.
Annual Conference of the Geographical Information Systems
Association (GISA) 2000, Vol. 9, pp.417-421, 2000 (Japanese).
[18] M. Kurihara, N. Komatsu, H. Arita, Watermarking Vector
Digital Maps, Special Interest Group Report Vol. 2000, No. 36,
10
Proceedings of the Shape Modeling International 2003 (SMI’03)
0-7695-1909-1/03 $17.00 © 2003 IEEE