Abstract

Technological advancement, paired with the emergence of increasingly open and sophisticated communication systems, has contributed to the growing complexity of copyright protection and ownership identification for digital content. The technique of digital watermarking has been receiving attention in the literature as a way to address these complexities. Digital watermarking involves covertly embedding a marker in a piece of digital data (e.g., a vector map, database, or audio, image, or video data) such that the marker cannot be edited, does not interfere with the quality or size of the data, and can be extracted accurately even under the deterioration of the watermarked data (e.g., as a consequence of malicious activity). The purpose of this paper is to describe a watermarking system architecture that can be applied to a 2D vector map. The proposed scheme involves embedding the watermark into the frequency domain, namely, the linear cellular automata transform (LCAT) algorithm. To evaluate the performance of the proposed scheme, the algorithm was applied to vector maps from the Riyadh Development Authority. The results indicate that the watermarking system architecture described here is efficient in terms of its computational complexity, reversibility, fidelity, and robustness against well-known attacks.

Highlights

  • Digital technologies have yielded numerous benefits, the unlawful use of data through piracy, counterfeiting, and copyright infringement remains a fundamental challenge

  • This study proposes a novel digital watermarking domain transformation that can serve as proof of copyright on vector maps, which relies on the linear cellular automata transform (LCAT) algorithm

  • This study proposed a technique for 2D vector map watermarking using the linear cellular automata transform (LCAT) algorithm

Read more

Summary

Introduction

Digital technologies have yielded numerous benefits, the unlawful use of data through piracy, counterfeiting, and copyright infringement remains a fundamental challenge. The most efficient and effective solution to this challenge is referred to as digital watermarking [3]. As a result of the technique’s robustness in protecting digital copyrights, as well as other applications such as source tracking, authentication, and fraud and tamper detection, many researchers have started to investigate the topic. The types of cover work are varied, ranging from images, audio and videos to vector maps and databases; while the types of watermark range from images and pieces of identification text to secret messages [4,5,6]

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call