Next Article in Journal
Assessing Influential Factors on Inland Property Damage from Gulf of Mexico Tropical Cyclones in the United States
Previous Article in Journal
Assessing the Generalization of Machine Learning-Based Slope Failure Prediction to New Geographic Extents
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps

1
Key Laboratory of Virtual Geographic Environment, Nanjing Normal Universit, Ministry of Education, Nanjing 210023, China
2
State Key Laboratory Cultivation Base of Geographical Environment Evolution (Jiangsu Province), Nanjing 210023, China
3
Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
ISPRS Int. J. Geo-Inf. 2021, 10(5), 294; https://doi.org/10.3390/ijgi10050294
Submission received: 20 March 2021 / Revised: 28 April 2021 / Accepted: 1 May 2021 / Published: 3 May 2021

Abstract

:
Zero watermarking does not alter the original information contained in vector map data and provides perfect imperceptibility. The use of zero watermarking for data copyright protection has become a significant trend in digital watermarking research. However, zero watermarking encounters tremendous obstacles to its development and application because of its requirement to store copyright information with a third party and its difficulty in confirming copyright ownership. Aiming at the shortcomings of the existing zero watermarking technology, this paper proposes a new zero watermarking construction method based on the angular features of vector data that store the zero watermarking and copyright information on the blockchain after an XOR operation. When the watermark is being extracted, the copyright information can be extracted with the XOR operation to obtain the information stored on the blockchain. Experimental results show that the combination of zero watermarking and blockchain proposed in this paper gives full play to the advantages of the two technologies and protects the copyright of data in a lossless fashion. Compared with the traditional zero watermarking algorithms, the proposed zero watermarking algorithm exhibits stronger robustness. Moreover, the proposed data copyright protection framework with a combination of zero watermarking and blockchain can also be applied to other data types, such as images, audio, video, and remote sensing images.

1. Introduction

Vector data are widely used in the geographic information industry. Because of the small amount of data stored in vectors, as well as their fast updates and ease of copying and distribution, such data is vulnerable to illegal infringement and embezzlement. Effective copyright protection has always been the main focus in the field of data security. Digital watermark technology provides good technical support for protecting the copyrights of vector data [1]. The existing digital watermark algorithms for vector data are mainly divided into spatial domain [2,3,4] and frequency domain [5,6] algorithms. These two types of methods embed watermark information by modifying coordinate values directly or indirectly. This kind of embedding model will inevitably cause a loss of accuracy with respect to vector map data. Especially for vector data with high data accuracy requirements, the destruction of accuracy will directly reduce the data quality [7]. Under this circumstance, lossless watermark technology can provide copyright protection without losing the original data’s accuracy, so it has more advantages than the traditional watermark. Therefore, lossless copyright protection technology for vector data has become a research focus in data security.
Currently, there are three leading technologies for the lossless copyright protection of vector data. The first is the reversible watermark, which completely restores the original carrier data after extracting the watermark [8,9,10]. The data lose protection after being restored, although a reversible watermark avoids the loss of data accuracy. Therefore, the reversible watermark cannot provide permanent copyright protection for data, one of the existing issues faced by a reversible watermark.
The second lossless watermark technology embeds the watermark by modifying the attribute domain. This kind of method embeds the watermark information into vector data attributes and adjusts the storage order to achieve copyright protection [11,12,13]. For example, Sun et al. [11] hid watermark information in data attributes according to the TAB file structure, a file format for vector maps. The watermark is effectively concealed after embedding, since each vector object reserves redundant space when defining attributes. However, because their approach chooses a redundant space for the attribute data, which is most likely to be lost when processing the data to embed the watermark, the proposed method has poor practicality. Zhou et al. [12] proposed a lossless watermark algorithm based on stored features that determines the watermark position according to the chosen line’s length and angle. The storage order of the arc points in the line element is then changed according to the value of the watermark (zero or one). This algorithm realizes the copyright protection of vector map line elements by adjusting the arc points’ storage order. However, the algorithm is only applicable to vector line elements, not to vector points or area elements. Based on the work of Zhou, Ren et al. [13] gave the rules for constructing arc segments with vector points and area elements, and this improved the previously developed algorithm by allowing it to realize the copyright protection of all vector data elements; the new approach reflected strong robustness and imperceptibility. However, Ren and Zhou’s methods destroy the storage order when embedding a watermark, and this is not suitable for the situation where features or vertices reorder. Therefore, the functional objects of their algorithms are relatively limited. In other words, this kind of lossless watermark algorithm provides copyright protection without any loss of precision by embedding it into the attribute domain. Nevertheless, the embedded watermark is likely to be destroyed by pirates, and the lossless data obtained after destroying the watermark still have usefulness.
The third lossless watermark technique is zero watermarking. Zero watermarking algorithms are structural watermark algorithms whose key is to extract stable feature information from given data to construct watermarks [14]. The current research on zero watermarking for vector data can be divided into two types: spatial domain and frequency domain research. The spatial domain includes constructing the average coordinates of, for example, feature points [7], distance sequences [15], and angle sequences [16] through specific methods. This kind of algorithm has certain robustness to geometric attacks, cropping, compression, and other watermark attacks. The frequency domain includes constructing zero watermarks through frequency domain transformation methods such as the discrete Fourier transform (DFT) [17] and wavelet transform [18]. These kinds of methods have stronger robustness and higher computational complexity than spatial domain algorithms. Zero watermarking algorithms register their constructed watermarks with the intellectual property rights (IPR) to resist interpretation attacks [19,20,21] instead of embedding the watermark information into the data. The interpretation attack is a scheme for attacking watermarks proposed by International Business Machines Corporation (IBM). The attack scheme neither erases nor invalidates the target watermark. It generates copyright confusion by forging the original image or watermarking the image [22]. Unfortunately, the actual application of zero watermarking is often restricted by a series of factors, such as the required registration period, cost, and the credibility of the IPR.
In other words, the reversible watermark can restore data after extraction, but the restored data lose copyright protection at the same time. In addition, although modifying the attribute domain to embed a watermark can protect the data and ensure accuracy, the accuracy of the data is destroyed, which may lead to data theft. Zero watermarking can provide permanent copyright protection for data without damage. Moreover, the constructed watermark information is closely related to the coordinate accuracy, which makes up for the deficiencies of the two methods above. However, zero watermarking technology has tremendous practical application limitations due to its heavy reliance on centralized third-party copyright agencies. If the demand for third-party copyright agency certifications is solved, zero watermarking can become an ideal solution in the domain of lossless copyright protection technology.
Therefore, based on the above research, this paper thoroughly analyzes vector data’s spatial relationships and proposes a robust zero watermarking algorithm based on angular features. Besides that, we introduce blockchain technology to solve the issue such that zero watermarking fundamentally relies on the IPR. This will be a new exploration that will provide a new opportunity to further study and develop zero watermarking for vector data.

2. Basic Idea and Preliminaries

This paper introduces blockchain technology into the process of copyright protection for zero watermarking for the first time. It proposes a zero watermarking storage framework for vector data based on blockchain. Under this framework, the distribution of the given data is synchronized and chained with zero watermarking. When distributing the data to the user, the data’s zero watermark information is linked to the blockchain with both sides’ information to generate and save the certificate of copyright. This framework introduces blockchain into zero watermarking, providing an effective, safe, and traceable copyright protection scheme.
Moreover, the basic idea of a zero watermarking algorithm based on the angular feature proposed in this paper is as follows: First, the vector map line and surface are compressed to extract the feature points. Then, the angle sequence of the feature points is extracted by constructing concentric circles. Finally, an XOR operation is performed between the copyright image and angle sequence to obtain multiple zero watermarks. Experiments show that the proposed algorithm completely resists translation, rotation, and scaling attacks and has good robustness to compression, cropping, and adding attacks.

2.1. Zero Watermarking

Because several nodes connect the line segments of the vector line elements and surface elements, we regard the two types of elements as a set of nodes. The points that can reflect the full features of the vector data are regarded as feature points. To resist simplification attacks, we use the Douglas–Peucker algorithm to compress the vector data for selecting feature points and calculating the mean value of these feature points. We draw several concentric circles with the mean value as the center and a sequence of numbers determined by the length of the binary sequence of the copyright image as the radii. Then, we calculate the value of each point’s angles in each circle and binarize the sequence consisting of these values. After that, we can perform an XOR operation between the binary sequence of angles and the copyright image sequence to extract the zero watermarking. The algorithm ensures the even distribution of watermark features in space and improves the watermark’s ability to resist various attacks. The construction process of zero watermarking is shown in Figure 1.

2.2. Blockchain

Traditional zero watermarking algorithms send watermark information to the IPR for registration to ensure that the obtained watermark has a credible copyright attribute. When facing a copyright dispute, we can restore the copyright through a public algorithm designed for copyright protection. However, this method is unrealistic to apply to the protection of massive geographic data due to its long review cycle, high cost, and inability to trace infringement. The emergence of blockchain provides the right solution for the above issues.

2.2.1. Blockchain Technology

Blockchain technology was first proposed by a scholar named Satoshi Nakamoto in his paper “Bitcoin: A peer-to-peer e-cash system” published in 2008 [23].

2.2.2. Ant Blockchain Open Alliance

Nowadays, there are many mature blockchain applications, such as Bitcoin [24], Ethereum blockchain [25], and Antchain [26]. Among them, Antchain is the latest and most popular blockchain application in China. It is widely used in many fields, such as finance, digital copyright protection, and government affairs. The Ant Blockchain Open Alliance is a blockchain network for enterprises and developers in Antchain, which does not need to be built and can be linked quickly. We briefly introduce the Ant Blockchain Open Alliance from the following aspects:
  • Smart contract
This is a computer protocol designed to disseminate, verify, or execute contracts in an information-based manner. A smart contract is a set of promises defined in digital form, including the agreements on which the contract participants can execute these promises. Smart contract allows trusted transactions without a third party, which is traceable and irreversible.
  • Gas
Here, a smart contract is used to measure the consumption of computing and storage in a virtual machine, which can prevent malicious attacks and the waste of computing and storage.
  • Virtual machine
A virtual machine is a high-level abstraction that simulates a physical machine based on a native operating system. It allows the same platform to run on many different hardware architectures and operating systems. Virtual machines in blockchain are mainly used to run intelligent contracts on the chain.
  • World state
The storage status of blockchain accounts includes the basic storage status of all accounts and the internal storage status of contract accounts. The contract platform can be understood as a kind of "state machine" of transaction. The world state describes the current basic storage state. After executing the smart contract, the world state may change into another new world state.
  • Consensus algorithm
This is the algorithm for data consistency assurance in the distributed system, which ensures the data consistency of multiple participants through certain protocol interactions. Standard algorithms include PDFT, RAFT, POW, POS, and so on.
As shown in Figure 2, a blockchain is a growing list of records, called blocks, linked through cryptography. Each block contains the encrypted hash value, timestamp, and transaction data of the previous block [24]. When applied to zero watermarking-based copyright protection, once the extracted watermark information is uploaded to the blockchain, each node in the blockchain will execute the smart contract code in the virtual machine. Then, the consensus can be reached on the execution result of the smart contract. Finally, the world state will be updated, and new blocks will be generated. Once the block is on the chain, each node in the blockchain will contain a block’s backup, eliminating the risk of data centralization [27]. Compared with traditional IPR, the application of blockchain makes the protection of vector data more credible.

3. Methods

3.1. Zero Watermarking Algorithm

3.1.1. Feature Point Extraction

In this paper, the classic Douglas–Peucker algorithm was used for data compression. The basic idea is as follows: the first and last nodes of a curve are connected, and a straight line is determined for obtaining the maximum distance d max from the curve’s middle point to the straight line. Comparing d max and the pregiven threshold D, if d max < D , all the middle points are deleted, and the head and last nodes are reserved after processing. If d max D , these nodes are divided into two groups, and then the steps above are repeated until all nodes are processed.
The Douglas–Peucker algorithm’s flow is shown in Figure 3, and the point set u = { 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 } contains all the nodes representing a curve. According to the given threshold D , the curve is finally simplified as U D = { 1 , 4 , 6 , 7 , 8 } . The contour of the original curve was still preserved.

3.1.2. Angle Calculation

As shown in Figure 4, A ( x 1 , y 1 ) , B ( x 2 , y 2 ) , C ( x 3 , y 3 ) , and D ( x 4 , y 4 ) are the four endpoints of line segments A B and C D . Then, we can define A B = ( x 2 x 1 , y 2 y 1 ) and C D = ( x 4 x 3 , y 4 y 3 ) . Using Equation (1), we calculated the angle θ between the two line segments, where θ [ 0 ° , 180 ° ] .
θ = arccos ( | A B C D | | A B | | C D | )

3.1.3. Construction of a Zero Watermark

The detailed construction process of zero watermarking is as follows:
Step 1: Select the binary image I of the size N × N that contains the copyright information. The pixel of the image is I ( i , j ) = { 0 , 1 } , where i , j { 1 , 2 , 3 , , N } . The two-dimensional matrix I is arranged into a one-dimensional copyright sequence I , which can be calculated from Equation (2):
I = N × N
Step 2: Extract the feature points from the vector data with the Douglas–Peucker algorithm, where the number of feature points is H .
Step 3: The average point of the feature points is O , which can be calculated by Equation (3):
{ O x = i = 1 H X i H O y = i = 1 H Y i H
where O x and O y are the X and Y coordinates of O , respectively, and X i and Y i are the X and Y coordinates of the feature points, respectively.
Step 4: Draw several concentric circles with O as the center. The rule for dividing these circles is as follows: each feature point allocates 8 bits for storing the angle’s binary value. Moreover, the number of feature points needed in each circle n can be calculated according to Equation (4):
n = N N 8
Step 5: Calculate the value of the vector of the angular feature points in turn and obtain the angle sequence M = ( m 1 , m 2 , , m i , , m n ) , where m i [ 0 ° , 180 ° ] , 1 i n .
Step 6: Binarize sequence M to obtain a new sequence M (with a length N × N ) that contains an angular feature. Then, perform an XOR operation bitwise between the binary copyright sequence I and the binary angle sequence M according to Equation (5) to obtain the zero watermarking sequence W = ( w 1 , w 2 , , w i , , w N × N ) , where w i { 0 , 1 } , 1 i N × N :
W = I M
Step 7: Repeat steps 4 and 5 and obtain K zero watermarking sequences Z = ( W 1 , W 2 , , W i , , W K ) , where 1 i K and K is calculated by Equation (6):
K = H n
Because the average point will be changed by cropping, adding points, or other attacks, the average point coordinate is binarized and stored together with the zero watermarking sequence Z .

3.1.4. Extraction of the Zero Watermark

The detection process of the watermark is the reverse of the construction process above. The angle sequence of the vector data is extracted, and an XOR operation is performed with the constructed zero watermarking information to generate the copyright image. Then, the similarity between the generated image and the original copyright image is checked as follows. First, the mode of attack being used against the vector map is determined. The original stored center point coordinate is used if the carrier is attacked by cropping or adding, and the center point’s coordinates are recalculated otherwise. Then, the binary angle sequence M is extracted according to steps 2–5 above, and an XOR operation is performed with each zero watermarking sequence in M to obtain the copyright sequence. Finally, each sequence’s value is calculated, and the copyright image N C with the highest value is chosen as the watermark image. The extraction process is shown in Figure 5.

3.1.5. Zero Watermarking Forensics

When questionable data needs to be verified, as is shown in Figure 6, the distributor or receiver can query the zero watermarking of the original data in the blockchain and then calculate the similarity with the zero watermark extracted from the suspicious data to determine whether the suspicious data is infringing.
For one set of data with multiple distributions, the distributor in the first record of the distribution on the blockchain represents copyright ownership.

3.2. Smart Contract and Storage System Design

3.2.1. Smart Contract Design

The design of a smart contract is the key to the blockchain. To illustrate the design of the smart contract clearly, some abbreviations are listed in Table 1.
In this part, we focus on designing the interfaces of the smart contract to meet the requirements of the DU and RU. The main interfaces of the contract are as follows:
  • initContractData: only the DU can execute the interface, whose function is to compose the block with the DU_AD, RU_AD and ZW, and the return value is CONTRACT_BC;
  • searchContract: both the DU and RU can execute this interface. Its function is to return the information of the contract. If it is not initialized, it will return null;
  • dataDistribution: only the DU can execute the interface. Its function is to return the THX of the uploaded block.
After the smart contract is deployed, the above interfaces can be called normally.

3.2.2. Zero Watermarking Storage System Design

The alliance chain is jointly managed by several designated institutions or organizations [28]. Considering that most vector data are protected, the alliance chain ensures that the chain’s information is only open and transparent in a limited number of trusted nodes [29]. This design is better than the public chain in terms of efficiency and security.
In this paper, a zero watermarking storage system for vector data based on the Ant Blockchain Open Alliance is constructed for the DU and RU. The structure of the system is shown in Figure 7. Each step is listed below:
  • RU sends RU_AD and the request for OV to the DU.
  • After confirming the identity of the RU, the DU will use the proposed algorithm to extract the ZW of OV in SERVER.
  • SERVER returns the extracted ZW to the DU.
  • DU deploys the ZW, DU_AD, and RU_AD to the smart contract.
  • The smart contract constructs information into the BLOCK and returns CONTRACT_BC to the DU.
  • DU sends the CONTRACT_BC to the RU.
  • RU uses the CONTRACT_BC to access the smart contract.
  • The smart contract returns the ZW, DU_AD, and RU_AD to the RU.
  • After confirming the RU_AD is correct, the RU returns the confirmation information to the DU.
  • The DU sends the confirmation information to the smart contract.
  • The smart contract uploads the BLOCK to the blockchain.
  • The smart contract returns the THX to the DU.
The DU sends the THX and OV to the RU.
The function of the whole system can be divided into two categories. The RU has the functions of zero watermarking extraction, smart contract deployment, block upload, block query, and data distribution as a data distribution unit. As the data receiving unit, the DU only has the functions of data application, contract confirmation, block query, and data receiving. When questionable data needs to be verified, both the DU and RU can use the THX to query the ZW from the blockchain, which will protect the copyright of the OV and realize the traceability of its distribution and transaction process.

4. Experiments and Results

In this part, we tested the zero watermarking algorithm and the blockchain-based certificate storage system mentioned above. The certificate storage system was implemented based on the Ant Blockchain Open Alliance. The running environment was as follows: an i7-8700 CPU @ 3.20 GHz with 12 GB of RAM running on Windows 10. The program was written using Matlab, Java, and Solity.

4.1. Zero Watermarking Experiment and Results

4.1.1. Experimental Data and Parameter Settings

To verify the effectiveness of the proposed watermark algorithm, 1:5,000,000 “county-level administrative boundaries of Jiangsu province” were selected as the vector data for experimental purposes (shown in Figure 8a), the data format of which was shapfile. The coordinate system was the China Geodetic Coordinate System 2000, and the number of vertices was 100,251. This paper used a meaningful binary image logo of 32 × 32 pixels as the copyright information (shown in Figure 8b). The feature points were extracted by the Douglas–Peucker method, the threshold of which was set to 0.006 km. We extracted 9968 feature points and calculated the compression rate, which was approximately 90.05%.
Normalized correlation ( N C ) was used to evaluate the similarity between the extracted watermark and the original watermark in our experiment. The formula for doing so is shown in Equation (7):
N C = i = 1 i = M j = 1 j = N X N O R ( W ( i , j ) , W ( i , j ) ) M × N
where W ( i , j ) is the original watermark and W ( i , j ) is the extracted watermark. M and N are the numbers of pixels in each row and each column of the watermark image, respectively. The resulting N C value represents the similarity between the extracted watermark image and the original watermark image. In our experiment, the threshold of N C was given as 0.750.

4.1.2. Geometrical Attacks

As a zero watermarking algorithm with strong robustness, the proposed method should have been able to extract the watermark information after rotation, scaling, and translation (RST). Therefore, this experiment involved a series of RST attacks on the vector data. We processed the data by offsetting them with different distances (5 m, 10 m, and 15 m), scaling them with different ratios (1:0.5, 1:2, and 1:5) and rotating them with different angles ( 30 ° , 60 ° , and 180 ° ). Then, we extracted the watermark information from the vector data after the attack. Table 2 gives the results of the proposed algorithm against the attacks above. With the enhancement of the RST attack, the N C value of the zero watermark extracted by the algorithm was always one. The RST attack did not change the relative positions between the feature points. It maintained the angle value of the inflection point, so the algorithm in this paper was completely resistant to the RST attack.

4.1.3. Cropping and Adding

Cropping and adding are standard data processing methods for vector data. A cropping attack characterizes itself by its cropping ratio, which is the percentage of data cropped from the entire dataset. Adding attacks are related to cropping attacks, where the adding ratio refers to the percentage of data that is added to the original data. As shown in Figure 9, we cropped and added adjacent areas with different cropping strengths (10%, 70%, and 80%) and adding strengths (10%, 50%, and 100%). Table 3 gives the results achieved by the proposed algorithm after the attack.
According to Table 3, when the cropping ratio was kept between 10% and 70%, the N C value was always 1.000, because the original data center constructed the concentric circles under the cropping and adding attacks. As long as one of the sets of zero watermarking is detected, the purpose of copyright verification is achieved, even when part of the data is destroyed.
The last set of zero watermarking was destroyed and could not be extracted until the cropping ratio reached 80%. Therefore, the algorithm had a strong anti-cropping ability. The experimental results for the adding attack showed that the proposed algorithm could still extract the complete copyright image with an N C value of one. This is because the data added to the original data in adjacent areas did not interfere with the ability of the algorithm to extract the zero watermarking from the center point of the original data. Therefore, the proposed algorithm was entirely resistant to adding attacks.

4.1.4. Compression Attacks

The purpose of vector data compression is to delete redundant data and reduce data storage. Its main task is to reduce the number of vertices in the point set of an arc in the vector coordinates. This paper used the Douglas–Peucker algorithm to perform compression attacks with different compression ratios (10%, 50%, and 90%) on the experimental data.
The results given in Table 4 show that the complete copyright image could always be extracted with an N C value of one after compression. When the compression rate was between 10% and 90%, the algorithm in this paper extracted the data’s feature points with a compression preprocess, for which the compression ratio was over 90%. Therefore, zero watermarking should be constructed according to the size of the given vector data with a suitable compression ratio in practical applications. The smaller the compression ratio is, the stronger the algorithm’s ability against compression is. It can be seen that the algorithm in this paper could effectively resist the simplified attack. Obviously, the algorithm proposed in this paper resisted compression attacks.

4.2. Blockchain Experiment and Results

4.2.1. System Implementation

Based on the Ant Blockchain Open Alliance, we developed a blockchain certificate storage system for the DU. The system interface is shown in Figure 10. After receiving the confirmation from the RU, the DU can use the “Contract Call” module to upload the block. After clicking “submit,” the DU can get the THX of the uploaded block.

4.2.2. Gas Cost

To illustrate the advantage of the proposed system, we uploaded the zero watermark extracted from the data in Figure 8a to the Ant Open Alliance Blockchain. The THX and gas consumption are shown in Figure 11. According to the conversion rules of the Ant Blockchain Open Alliance [30], this transaction costed about CNY 0.368. The cost of this transaction was almost negligible.

5. Discussion

This paper proposed a robust zero watermarking algorithm and implemented the blockchain certificate storage system based on the Ant Blockchain Open Alliance. In this part, we will compare the robustness of the proposed algorithm with other algorithms. Furthermore, we will discuss the advantages and disadvantages of blockchain and IPR.

5.1. Comparison with Other Algorithms

To verify the advantages of the zero watermark constructed by the proposed algorithm under various attacks, we compared the algorithm with the four algorithms proposed in [20,31,32,33] by experimentation. The algorithm proposed in [20] constructs zero watermarking by dividing blocks and comparing the distance between points. The algorithm in [31] generates zero watermarking by using grid division and counting the numbers of points in the grids. In contrast, the algorithm in [32] constructs concentric circles. It counts the numbers of points in these circles to generate zero watermarking. Another algorithm proposed in [33] transforms the spatial topology information and spatial geometry information of the data into a zero watermark by establishing the graph complexity index.

5.1.1. Uniqueness Verification

A zero watermark is not directly added to the original data, and the watermark information must be unique. Therefore, it is necessary to verify the uniqueness of the algorithm. In this paper, we selected three different datasets of vector line features. Figure 12a shows the vector data for streets in the Gulou District, whereas Figure 12b and Figure 12c show the vector data for streets in the Qinhuai District and Xuanwu District, respectively. The detailed verification method was as follows: the N C values of the zero watermark extracted in Figure 12a–c were calculated and compared as shown in Table 5.
According to Table 5, the algorithm proposed in this paper was proven to have the characteristic of uniqueness, and the same was true for the algorithms in [31,33]. The N C values of the zero watermarks extracted by these three algorithms were under 0.750, whereas the N C values of [20,32] were over 0.750, which did not satisfy the requirement of uniqueness. The block method of [20,32] would cause a lot of redundant space, filled by zero. This results in a high similarity of zero watermarking extracted from different data. Actually, [20,32] did not verify the uniqueness of their algorithms. Because neither of these two algorithms could guarantee the uniqueness of the zero watermarking, this paper only compared the proposed algorithm with [31,33].

5.1.2. Robustness Comparison

Our experiment selected the “provincial boundary of Jiangsu province” as the test data. Different watermark attacks were performed separately, such as rotation attacks, cropping attacks, adding attacks, and compression attacks. The experiments were designed as follows: the experimental data in the first series suffered from rotation attacks with different angles ranging from 0 ° to 180 ° . The remaining three experiments separately performed cropping attacks, adding attacks, and compression attacks with corresponding factors ranging from 0% to 90%. The results are shown in Figure 13.
All algorithms mentioned, except the one proposed in [31], were entirely robust against rotation attacks, as shown in Figure 13a. The algorithm in [31] was vulnerable to rotation attacks because it constructed zero watermarking with a rectangular grid, so the construction result changed after rotation. The N C values of the three algorithms decreased with the increasing cropping ratio, according to Figure 13b. This paper’s algorithm constructed multiple zero watermarks against cropping attacks so that the watermark information could still be extracted completely, even when the cropping ratio was up to 70%. As shown in Figure 13c, with the increase in redundant data, the watermark information extracted by the algorithms proposed in [31,33] was disturbed to some extent. When the adding ratio reached 40%, the N C values of the algorithms in [31,33] were already lower than the given threshold of 0.750, so they could not wholly extract copyright information.
Moreover, this paper’s algorithm could always extract complete watermark information from the data under adding attacks, on the premise that the original data were not destroyed. It thus shows a strong ability to resist adding attacks. The algorithms in [31,33] did not preprocess the data with compression. Therefore, their N C values decreased with the increasing compression ratio. When the compression ratio reached 20%, the N C values of the algorithms in [31,33] were already lower than the given threshold. The algorithm in this paper reflected an ability to resist compression to some extent, because it applied a compression algorithm to extract the feature points. The watermark information could be wholly extracted when the compression ratio was lower than the feature points’ extraction rates.
In summary, the N C value of the algorithm in [31] was lower than the given threshold, and it showed poor robustness. The algorithm proposed in [33] completely resisted rotation attacks. Nevertheless, its N C values were below the threshold when the intensities of cropping, adding, and compression were over 30%. This paper’s algorithm completely resisted rotation, adding, and compression attacks and could extract copyright images even when the cropping ratio was over 70%. This algorithm showed the strongest robustness among the three algorithms.

5.2. Comparison between the Blockchain Framework and the Traditional IPR Framework

In addition to the high robustness requirement of the algorithm, it was also important to ensure that the obtained watermark information had credibility and legal validity for practical applications. As shown in Table 6, this paper compares the advantages and disadvantages of the traditional IPR framework and the proposed blockchain framework in terms of zero watermarking copyright certification from five aspects. First, in terms of credibility, the blockchain is a decentralized distributed system with high credibility, where the watermark information cannot be modified on the chain [34]. The traditional IPR is essentially a centralized database that lacks credibility for the existing risk of artificial data tampering. The audit cycle refers to the time required for the copyright process, from registration to official enforcement. The copyright takes effect immediately without any auditing steps if the watermark information is written on a blockchain. The cost of the IPR’s services is high, and the charges are opaque. For example, the registration fee for each microfilm is approximately CNY 2000–3000, and at the same time, the registration process is very long, and the procedure is tedious [35]. However, the cost of copyright registration on the blockchain is relatively low compared with traditional copyright registration. In Section 4.2.1, only a CNY 0.385 cost was on the Ant Blockchain Open Alliance. Therefore, blockchain is undoubtedly the best choice for massive vector data that require copyright certification [36]. An interpretation attack refers to an infringement method by which multiple parties extract the same copyright, making it impossible to determine copyright ownership. The registration procedures, standards, and certificates stipulated by traditional IPR registration agencies are difficult to unify. Furthermore, it is difficult to determine the storage time of a copyright application given by one party. If there are multiple registrations from multiple parties, the copyright owner cannot be confirmed, so the copyright lacks authority.
Nevertheless, each block of a blockchain has its own timestamp. Once a copyright dispute occurs, the first data distribution of the information on the chain can be used to determine copyright ownership, so the blockchain framework completely resists interpretation attacks. The blockchain system designed in this paper for the data distribution and chaining synchronization of zero watermarking ensures data traceability. At the same time, traditional IPR copyright registration cannot trace the source of an infringement. Therefore, the long audit cycle and high cost of registration required by the traditional IPR framework mean that it cannot resist interpretation attacks and satisfy copyright traceability, which is one of the key reasons why zero watermarking has not been applied for practical use. The storage system of zero watermarking for vector data, based on the alliance chain proposed in this paper, provides a practical scheme for zero watermarking. This framework is not only limited to the copyright of vector data, but it is also applicable to any zero watermarking methods, including zero watermarking for images, videos, and audio.

6. Conclusions

The existing zero watermarking algorithm has the disadvantages of a long audit cycle, easy copyright loss, and difficult copyright ownership confirmation due to the requirement of copyright authentication by the IPR. We proposed a framework based on blockchain to solve these issues, making the resulting data distribution more traceable, more efficient, and cheaper than that yielded by registration with the traditional IPR. In addition, we proposed a zero watermarking algorithm based on the angular features of concentric circles with strong robustness. This algorithm constructs concentric circles with angular information from many inflection points in the line and area vector elements and generates multiple sequences of zero watermarking. The experiments show that the proposed algorithm reflects strong robustness under common watermark attacks, such as rotation, cropping, and compression, with different intensities and satisfies the requirement of uniqueness. This article fully combines zero watermarking and blockchain technology to achieve a lossless data protection scheme. When a copyright dispute occurs, the copyright information can be extracted with a public algorithm and compared with the same information stored on the blockchain to achieve copyright protection for the lossless vector map. This provides a new way of thinking about zero watermarking copyright authentication.

Author Contributions

All authors made a valuable contribution to this paper. Na Ren and Changqing Zhu conceived, researched and wrote the paper; Yazhou Zhao and Qifei Zhou contributed research framing, ideas, context and wordsmithing; Dingjie Xu provided data for the paper and completed the experiment. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 41971338 and 42071362 and in part by the Natural Science Foundation of Jiangsu Province under Grant BK20191373.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Acknowledgments

The authors thank the anonymous referees for their constructive comments which definitely improved the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lee, S.H.; Kwon, K.R. Vector watermarking scheme for GIS vector map management. Multimed. Tools Appl. 2013, 63, 757–790. [Google Scholar] [CrossRef]
  2. Wang, Y.Y.; Yang, C.S.; Zhu, C.Q.; Ding, K.M. An Efficient Robust Multiple Watermarking Algorithm for Vector Geographic Data. Information 2018, 9, 296. [Google Scholar] [CrossRef] [Green Version]
  3. Yan, H.W.; Zhang, L.M.; Yang, W.F. A normalization-based watermarking scheme for 2D vector map data. Earth Sci. Inf. 2017, 10, 471–481. [Google Scholar] [CrossRef]
  4. Tong, D.; Zhu, C.; Ren, N. Watermarking Algorithm Applying to Small Amount of Vector Geographical Data. Acta Geod. Et Cartogr. Sin. 2018, 47, 1518–1525. [Google Scholar]
  5. Xu, D.; Zhu, C.; Wang, Q. Blind Watermarking Model of Vector Spatial Data Based on DFT of QIM. Geomat. Inf. Sci. Wuhan Univ. 2010, 35, 1100–1103. [Google Scholar]
  6. Zhang, L.; Yan, H.; Lv, W. A Blind Watermarking Algorithm Robust to Projection Attacks for Vector Data. Remote Sens. Inf. 2017, 32, 175–180. [Google Scholar]
  7. Cao, L.J.; Men, C.G.; Gao, Y. A recursive embedding algorithm towards lossless 2D vector map watermarking. Digit. Signal Process. 2013, 23, 912–918. [Google Scholar] [CrossRef]
  8. Wang, X.; Shao, C.; Xu, X.; Niu, X. Reversible data-hiding scheme for 2-d vector maps based on difference expansion. IEEE Trans. Inf. Sec. 2007, 2, 311–320. [Google Scholar] [CrossRef]
  9. Chengyong, S.; Xiaotong, W.; Xiaogang, X.U.; Xiamu, N.I.U. Study on Lossless Data Hiding Algorithm for Digital Vector Maps. J. Image Graph. 2007, 12, 206–211. [Google Scholar]
  10. Peng, F.; Jiang, W.-Y.; Qi, Y.; Lin, Z.-X.; Long, M. Separable Robust Reversible Watermarking in Encrypted 2D Vector Graphics. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 2391–2405. [Google Scholar] [CrossRef]
  11. Sun, J.; Zhang, G.; Yao, A.; Wu, J. Lossless Digital Watermarking Technology for Vector Maps. Acta Electron. Sin. 2010, 38, 2786–2790. [Google Scholar] [CrossRef]
  12. Zhou, Q.; Ren, N.; Zhu, C.; Tong, D. Storage Feature-Based Watermarking Algorithm with Coordinate Values Preservation for Vector Line Data. Ksii Trans. Internet Inf. Syst. 2018, 12, 3475–3496. [Google Scholar] [CrossRef] [Green Version]
  13. Ren, N.; Zhou, Q.; Zhu, C.; Zhu, A.X.; Chen, W. A Lossless Watermarking Algorithm Based on Line Pairs for Vector Data. Ieee Access 2020, 8, 156727–156739. [Google Scholar] [CrossRef]
  14. Wen, Q.; Sun, T.; Wang, S. Concept and Application of Zero-Watermark. Acta Electron. Sin. 2003, 31, 214–216. [Google Scholar]
  15. Sun, Y.; Li, D. Vector Map Zero-Watermark Algorithm Based on Node Feature. Geogr. Geo Inf. Sci. 2017, 33, 17–21. [Google Scholar]
  16. Zhao, H.; Du, S.; Zhang, D. Zero-Watermark Scheme for 2D Vector Drawings Based on Mapping. In Proceedings of the 2011 IEEE 12th International Conference on Computer-Aided Industrial Design & Conceptual Design, Vols 1 and 2: New Engines for Industrial Design: Intelligence-Interaction-Services, New York, NY, USA, 27–29 November 2011; pp. 366–370. [Google Scholar]
  17. Lyu, W.; Zhang, L. A DFT-Based Zero-Watermarking Agorithm for Vector Geodata. J. Geomat. Sci. Technol. 2018, 35, 94–98, 104. [Google Scholar]
  18. Zeng, W.; Xiong, X. Robust Zero Watermarking Algorithm Based on Integer Wavelet Transform. Microelectron. Comput. 2016, 33, 97–101, 107. [Google Scholar]
  19. Li, W.; Yan, H.; Wang, Z.; Zhang, L. A Zero-Watermarking Algorithm for Vector Linear Feature Data. J. Geomat. Sci. Technol. 2016, 33, 94–98. [Google Scholar]
  20. Lyu, W.; Zhang, L. A zero-watermark algorithm for vector data based on distribution center. Eng. Surv. Mapp. 2017, 26, 50–53, 61. [Google Scholar]
  21. Liang, W.; Zhang, X.; Xi, X.; Zhang, P. A multiple watermarking algorithm for vector geographic data based on zero-watermarking and fragile watermarking. Acta Sci. Nat. Univ. Sunyatseni 2018, 57, 1–8. [Google Scholar]
  22. Xin, Y.; Ting, Y. A Practical Scheme of Defeating Interpretation Attack of Digital Watermarking. In Proceedings of the 2009 International Conference on Image Analysis and Signal Processing 2009, Taizhou, China, 11–12 April 2009; pp. 91–93. [Google Scholar]
  23. Nakamoto, S. A Peer-to-Peer Electronic Cash System. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 10 April 2021).
  24. Zheng, Z.B.; Xie, S.A.; Dai, H.N.; Chen, X.P.; Wang, H.M. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. IEEE Int. Congr. Big 2017, 557–564. [Google Scholar] [CrossRef]
  25. Atzei, N.; Bartoletti, M.; Cimoli, T. A Survey of Attacks on Ethereum Smart Contracts (SoK). Lect. Notes Comput. Sci. 2017, 10204, 164–186. [Google Scholar] [CrossRef]
  26. Xu, C.; Li, X. Data Privacy Protection Method of Block Chain Transaction. Comput. Sci. 2020, 47, 281–286. [Google Scholar]
  27. Savelyev, A. Copyright in the blockchain era: Promises and challenges. Comput. Law Secur. Rev. 2018, 34, 550–561. [Google Scholar] [CrossRef] [Green Version]
  28. Li, Z.; Kang, J.; Yu, R.; Ye, D.; Deng, Q.; Zhang, Y. Consortium Blockchain for Secure Energy Trading in Industrial Internet of Things. IEEE Trans. Ind. Inform. 2018, 14, 3690–3700. [Google Scholar] [CrossRef] [Green Version]
  29. Zhang, A.; Lin, X. Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain. J. Med Syst. 2018, 42. [Google Scholar] [CrossRef] [PubMed]
  30. Buy Open Alliance Chain Fuel. Available online: https://product.cloud.alipay.com/common-buy?productCode=GAS&tenantName=FPANPSDP (accessed on 22 April 2021).
  31. Zuo-li, Z.; Shu-sen, S.U.N.; Ya-ming, W.; Ke-biao, Z. Zero-watermarking algorithm for 2D vector map. Comput. Eng. Des. 2009, 30, 1474–1479. [Google Scholar]
  32. Xun, W.; Huang, D.; Zhang, Z. A robust zero-watermarking algorithm for vector digital maps based on statistical characteristics. Softw. Appl. Econ. Anal. Bus. Manag. 2012, 7, 2349. [Google Scholar]
  33. Li, A.-B.; Zhu, A.X. Copyright authentication of digital vector maps based on spatial autocorrelation indices. Earth Sci. Inf. 2019, 12, 629–639. [Google Scholar] [CrossRef]
  34. Peng, W.; Yi, L.; Fang, L.; XinHua, D.; Ping, C. Secure and Traceable Copyright Management System Based on Blockchain. In Proceedings of the 2019 IEEE 5th International Conference on Computer and Communications (ICCC), Chengdu, China, 6–9 December 2019; pp. 1243–1247. [Google Scholar]
  35. Xu, R.Z.; Zhang, L.; Zhao, H.W.; Peng, Y. Design of Network Media’s Digital Rights Management Scheme Based on Blockchain Technology. In Proceedings of the 2017 Ieee 13th International Symposium on Autonomous Decentralized Systems (Isads 2017), Bangkok, Thailand, 22–24 March 2017; pp. 128–133. [Google Scholar] [CrossRef]
  36. Zhao, C.; Liu, M.; Yang, Y.; Zhao, F.; Chen, S. Toward a Blockchain Based Image Network Copyright Transaction Protection Approach. In Advances in Intelligent Systems and Computing; Yang, C.N., Peng, S.L., Jain, L.C., Eds.; Springer International Publishing Ag: Cham, Switzerland, 2020; Volume 895, pp. 17–28. [Google Scholar]
Figure 1. Zero watermarking construction process.
Figure 1. Zero watermarking construction process.
Ijgi 10 00294 g001
Figure 2. Operation structure of the Ant Blockchain Open Alliance.
Figure 2. Operation structure of the Ant Blockchain Open Alliance.
Ijgi 10 00294 g002
Figure 3. Schematic diagram of the Douglas–Peucker algorithm simplification. (a) Connect a straight line between the two points at the beginning and end of the curve and find the distance between the rest points and the line. (b) Select the maximum one to compare with the threshold value. If it is greater than the threshold, the point with the maximum distance from the line will be retained. Otherwise, all points between the two ends of the line will be rounded off, and we keep point 4. (c) According to the reserved points, the known curve is divided into two parts, and the first and second steps are repeated until there are no points to be rounded off. Finally, the coordinates of the curve points meeting the given accuracy limit are obtained. (d) Points 1, 4, 6, 7, and 8 are reserved, and other points are omitted to simplify the line.
Figure 3. Schematic diagram of the Douglas–Peucker algorithm simplification. (a) Connect a straight line between the two points at the beginning and end of the curve and find the distance between the rest points and the line. (b) Select the maximum one to compare with the threshold value. If it is greater than the threshold, the point with the maximum distance from the line will be retained. Otherwise, all points between the two ends of the line will be rounded off, and we keep point 4. (c) According to the reserved points, the known curve is divided into two parts, and the first and second steps are repeated until there are no points to be rounded off. Finally, the coordinates of the curve points meeting the given accuracy limit are obtained. (d) Points 1, 4, 6, 7, and 8 are reserved, and other points are omitted to simplify the line.
Ijgi 10 00294 g003
Figure 4. The angle formed by the line segment.
Figure 4. The angle formed by the line segment.
Ijgi 10 00294 g004
Figure 5. Zero watermarking construction process.
Figure 5. Zero watermarking construction process.
Ijgi 10 00294 g005
Figure 6. Zero watermarking authentication process.
Figure 6. Zero watermarking authentication process.
Ijgi 10 00294 g006
Figure 7. Zero watermarking storage process.
Figure 7. Zero watermarking storage process.
Ijgi 10 00294 g007
Figure 8. The verification process of questionable data forensics. (a) County-level administrative boundaries of Jiangsu province. (b) Copyright image.
Figure 8. The verification process of questionable data forensics. (a) County-level administrative boundaries of Jiangsu province. (b) Copyright image.
Ijgi 10 00294 g008
Figure 9. Adding and cutting effect of county-level administrative boundaries of Jiangsu province. (a) Cut 10%. (b) Cut 70%. (c) Cut 80%. (d) add 10%. (e) Add 50%. (f) Add 100%.
Figure 9. Adding and cutting effect of county-level administrative boundaries of Jiangsu province. (a) Cut 10%. (b) Cut 70%. (c) Cut 80%. (d) add 10%. (e) Add 50%. (f) Add 100%.
Ijgi 10 00294 g009
Figure 10. The interface of the blockchain certificate storage system.
Figure 10. The interface of the blockchain certificate storage system.
Ijgi 10 00294 g010
Figure 11. Gas consumption in one transaction.
Figure 11. Gas consumption in one transaction.
Ijgi 10 00294 g011
Figure 12. Uniqueness verification data. (a) Gulou District; (b) Qinhuai District; and (c) Xuanwu District.
Figure 12. Uniqueness verification data. (a) Gulou District; (b) Qinhuai District; and (c) Xuanwu District.
Ijgi 10 00294 g012
Figure 13. Comparison of algorithm robustness under different watermark attacks. (a) Comparison under a rotation attack. (b) Comparison under a cropping attack. (c) Comparison under an adding attack. (d) Comparison under a compression attack.
Figure 13. Comparison of algorithm robustness under different watermark attacks. (a) Comparison under a rotation attack. (b) Comparison under a cropping attack. (c) Comparison under an adding attack. (d) Comparison under a compression attack.
Ijgi 10 00294 g013
Table 1. The abbreviations in smart contract design.
Table 1. The abbreviations in smart contract design.
AbbreviationDescription
DUDistribution Unit, the owner of data, responsible for the distribution of data
RUReceiving Unit, the receiver of data
DU_ADAccount address of distribution unit
RU_ADAccount address of receiving unit
CONTRACT_BCThe byte code of the smart contract
BLOCKThe block constructed of ZW, DU_AD, and RU_AD
SERVERThe server is used to store vector geographic data and extract the zero watermarking algorithm
OVOriginal vector map data
ZWZero watermarking extracted from the original vector map data
THXThe unique hash value generated after a successful transaction on the blockchain
Table 2. Watermark extraction results under translation, scaling, and rotating attacks.
Table 2. Watermark extraction results under translation, scaling, and rotating attacks.
Attack TypeAttack Degree or ModeExtraction ResultNC
TranslationTranslation 5 meter Ijgi 10 00294 i0011.000
Translation 10 meter Ijgi 10 00294 i0011.000
Translation 20 meter Ijgi 10 00294 i0011.000
ScalingScaling 0.5 Ijgi 10 00294 i0011.000
Scaling 2 Ijgi 10 00294 i0011.000
Scaling 5 Ijgi 10 00294 i0011.000
RotatingRotate 30 ° Ijgi 10 00294 i0011.000
Rotate 60 ° Ijgi 10 00294 i0011.000
Rotate 180 ° Ijgi 10 00294 i0011.000
Table 3. Watermark extraction results under cropping and adding attacks.
Table 3. Watermark extraction results under cropping and adding attacks.
Attack TypeAttack Degree or ModeExtraction ResultNC
CroppingCut 10% Ijgi 10 00294 i0011.000
Cut 70% Ijgi 10 00294 i0011.000
Cut 80% Ijgi 10 00294 i0020.532
AddingAdd 10% Ijgi 10 00294 i0011.000
Add 50% Ijgi 10 00294 i0011.000
Add 100% Ijgi 10 00294 i0011.000
Table 4. Watermark extraction results under compression attacks.
Table 4. Watermark extraction results under compression attacks.
Attack TypeAttack Degree or ModeExtraction ResultNC
CompressionCompressed 10% Ijgi 10 00294 i0011.000
Compressed 50% Ijgi 10 00294 i0011.000
Compressed 90% Ijgi 10 00294 i0011.000
Table 5. Units for magnetic properties.
Table 5. Units for magnetic properties.
Vector Data NC
Proposed[20][31][32][33]
Gulou District1.0001.000 1.0001.0001.000
Qinhuai District0.5230.972 0.4800.828 0.671
Xuanwu District0.5410.981 0.4540.831 0.557
Table 6. Comparison between the blockchain and traditional IPR.
Table 6. Comparison between the blockchain and traditional IPR.
Evaluation IndicatorBlockchain FrameworkTraditional IPR Framework
credibilitystrongcommon
audit cyclenot neededlong
costnegligibleexpensive
interpretation attackcan resistunable to resist
traceabilityyesno
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ren, N.; Zhao, Y.; Zhu, C.; Zhou, Q.; Xu, D. Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps. ISPRS Int. J. Geo-Inf. 2021, 10, 294. https://doi.org/10.3390/ijgi10050294

AMA Style

Ren N, Zhao Y, Zhu C, Zhou Q, Xu D. Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps. ISPRS International Journal of Geo-Information. 2021; 10(5):294. https://doi.org/10.3390/ijgi10050294

Chicago/Turabian Style

Ren, Na, Yazhou Zhao, Changqing Zhu, Qifei Zhou, and Dingjie Xu. 2021. "Copyright Protection Based on Zero Watermarking and Blockchain for Vector Maps" ISPRS International Journal of Geo-Information 10, no. 5: 294. https://doi.org/10.3390/ijgi10050294

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop