Submitted:
22 June 2024
Posted:
24 June 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Preliminary
2.1. Pseudo-Random Numbers Generation Based on Hash Function and Streaming Cryptograph-y Algorithm

2.2. Difference Expansion (DE) Technique
2.3. Cosine Transform-Based Chaotic System (CTBCS)
3. The Proposed Method
3.1. Basic Idea

3.2. Coordinates Scrambling Encryption Scheme Based on Virtual Interval Step
3.2.1. Coordinates scrambling based on virtual interval step
3.2.2. Encryption of the vector map
3.2.3. Decryption of the vector map
3.3. Reversible Watermarking Scheme Based on Improved Difference Expansion (IDE)
3.3.1. Differences Calculation Based on Virtual Coordinates
3.3.2. Reference Coordinate Flag Map
3.3.3. Watermark Generation
3.3.4. Watermark Embedding
3.3.5. Watermark Extraction and Data Recovery
4. Discussion of Some Parameters
4.1. The Interval Step
4.2. Pseudo-Random Number
5. Experiments and Results
5.1. Experimental Data and Parameter Settings
5.2. Result Maps Visualization
5.3. Commutativity
5.4. Encryption Security Analysis
5.4.1. Effectiveness of the encryption scheme
5.4.2. Key Space
5.4.3. Key Sensitivity
5.5. Watermarking Performance Evaluation
5.5.1. Analysis of Watermark Capacity
5.5.2. Analysis of Watermark Invisibility
5.5.3. Analysis of Watermark Reversibility
6. Conclusion
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Da, Q.; Sun, J.; Zhang, L.; Kou, L.; Wang, W.; Han, Q.; Zhou, R. A novel hybrid information security scheme for 2D vector map. Mobile Networks and Applications, 2018, 23, 734-742. [CrossRef]
- Zhu, C. Research progresses in digital watermarking and encryption control for geographical data. Acta Geodaetica et Cartographica Sinica, 2017, 46(10), 1609-1619. [CrossRef]
- Wang, Y.; Yang, C.; Zhu, C.; Ding, K. An efficient robust multiple watermarking alg-orithm for vector geographic data. Information, 2018, 9(12), 296. [CrossRef]
- Broumandnia, A. Designing digital image encryption using 2D and 3D reversible modular chaotic maps. Journal of Information Security and Applications, 2019, 47, 188-198. [CrossRef]
- Wang, Y.; Yang, C.; Ren, N.; Zhu, C.; Rui, T.; Wang, D. An Adaptive Watermark Detection Algorithm for Vector Geographic Data. KSII Transactions on Internet & Information Systems, 2020, 14(1), 323-343. [CrossRef]
- Pham, G. N.; Ngo, S. T.; Bui, A. N.; Tran, D. V.; Lee, S. H.; Kwon, K. R. Vector map random encryption algorithm based on multi-scale simplification and Gaussian distribution. Applied Sciences, 2019, 9(22), 4889. [CrossRef]
- Higgins, S. The lifecycle of data management. Managing research data, 2012, 17-46. [CrossRef]
- Shi, Y. Q.; Li, X.; Zhang, X.; Wu, H. T.; Ma, B. Reversible data hiding: Advances i-n the past two decades. IEEE access, 2016, 4, 3210-3237. [CrossRef]
- Ma, K.; Zhang, W.; Zhao, X.; Yu, N.; Li, F. Reversible data hiding in encrypted images by reserving room before encryption. IEEE Transactions on information forensics and security, 2013, 8(3), 553-562. [CrossRef]
- Zhang, X. Reversible data hiding in encrypted image. IEEE signal processing letters, 2011, 18(4), 255-258. [CrossRef]
- Puech, W.; Chaumont, M.; Strauss, O. A reversible data hiding method for encrypted images. In Security, forensics, steganography, and watermarking of multimedia contents X. SPIE, 2008, 6819, 534-542. [CrossRef]
- Zhang, X.; Long, J.; Wang, Z.; Cheng, H. Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Transactions on Circuits and Systems for Video Technology, 2016, 26(9), 1622-1631. [CrossRef]
- Peng, F.; Lin, Z. X.; Zhang, X.; Long, M. Reversible data hiding in encrypted 2D ve-ctor graphics based on reversible mapping model for real numbers. IEEE transactions on information forensics and security, 2019, 14(9), 2400-2411. [CrossRef]
- Peng, F.; Jiang, W. Y.; Qi, Y.; Lin, Z. X.; Long, M. Separable robust reversible watermarking in encrypted 2D vector graphics. IEEE Transactions on Circuits and Systems for Video Technology, 2020, 30(8), 2391-2405. [CrossRef]
- Jang, B. J.; Lee, S. H.; Lee, E. J.; Lim, S.; Kwon, K. R. A crypto-marking method for secure vector map. Multimedia Tools and Applications, 2017, 76, 16011-16044. [CrossRef]
- Jiang, L.; Xu, Z.; Xu, Y. Commutative encryption and watermarking based on orthogonal decomposition. Multimedia tools and applications, 2014, 70, 1617-1635. [CrossRef]
- Lian, S. Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications, 2009, 43(1), 91-107. [CrossRef]
- Wu, B.; Dai, Q.; Peng, Y.; Wang, W. Robust vector map watermarking algorithm in homomorphic encrypted domain. Journal of Geo-information Science, 2022, 24(6), 1120-1129. [CrossRef]
- Ren, N.; Zhu, C.; Tong, D.; Chen, W.; Zhou, Q. Commutative encryption and watermarking algorithm based on feature invariants for secure vector map. IEEE Access, 2020, 8, 221481-221493. [CrossRef]
- Li, Y.; Zhang, L.; Wang, X.; Zhang, X.; Zhang, Q. A novel invariant based commutative encryption and watermarking algorithm for vector maps. ISPRS International Journal of Geo-Information, 2021, 10(11), 718. [CrossRef]
- Ren, N.; Tong, D.; Cui, H.; Zhu, C.; Zhou, Q. Congruence and geometric feature-based commutative encryption-watermarking method for vector maps. Computers & Geosciences, 2022, 159, 105009. [CrossRef]
- Ren, N.; Zhao, M.; Zhu, C.; Sun, X.; Zhao, Y. Commutative encryption and watermarking based on SVD for secure GIS vector data. Earth Science Informatics, 2021, 14, 2249-2263. [CrossRef]
- Guo, S.; Zhu, S.; Zhu, C.; Ren, N.; Tang, W.; Xu, D. A robust and lossless commutative encryption and watermarking algorithm for vector geographic data. Journal of Information Security and Applications, 2023, 75, 103503. [CrossRef]
- Tan, T.; Zhang, L.; Zhang, M.; Wang, S.; Wang, L.; Zhang, Z.; ... Wang, P. Commutative encryption and watermarking algorithm based on compound chaotic systems and zero-watermarking for vector map. Computers & Geosciences, 2024, 184, 105530. [CrossRef]
- Deng, L. Y.; Bowman, D. Developments in pseudo-random number generators. Wiley Interdisciplinary Reviews: Computational Statistics, 2017, 9(5), e1404. https://do-i.org/10.1002/wics.1404.
- Coron, J. S.; Dodis, Y.; Malinaud, C.; Puniya, P. Merkle-Damgård revisited: How to construct a hash function. In Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005. Proceedings 25. Springer Berlin Heidelberg, 2005, 430-448. [CrossRef]
- Ding, L. Improved related-cipher attack on salsa20 stream cipher. IEEE Access, 2019, 7, 30197-30202. [CrossRef]
- Tian, J. Reversible watermarking by difference expansion. In Proceedings of workshop on multimedia and security. 2002, 19-22.
- Peng, F.; Lei, Y. Z.; Long, M.; Sun, X. M. A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Computer-Aided Design, 2011, 43(8), 1018-1024. [CrossRef]
- Peng, F.; Long, Q.; Lin, Z. X.; Long, M. A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multimedia Tools and Applications, 2019, 78, 26885-26905. [CrossRef]
- Wang, X.; Shao, C.; Xu, X.; Niu, X. Reversible data-hiding scheme for 2-D vector maps based on difference expansion. IEEE Transactions on information forensics and security, 2007, 2(3), 311-320. [CrossRef]
- Hua, Z.; Zhou, Y.; Huang, H. Cosine-transform-based chaotic system for image encryption. Information Sciences, 2019, 480, 403-419. [CrossRef]
- Wang, X.; Yan, H.; Zhang, L. Vector map encryption algorithm based on double random position permutation strategy. ISPRS International Journal of Geo-Information, 2021, 10(5), 311. [CrossRef]
- Wang, N.; Zhang, H.; Men, C. A high capacity reversible data hiding method for 2D vector maps based on virtual coordinates. Computer-Aided Design, 2014, 47, 108-117. [CrossRef]










| Maps | Data types | Features | Vertices number | Scale | (m) |
|---|---|---|---|---|---|
| POIs | Point | 2410 | 2410 | 1:10000 | 1 |
| Roads | Polyline | 11423 | 122962 | 1:10000 | 1 |
| Buildings | Polygon | 5660 | 20325 | 1:1000 | 0.1 |
| Datasets | Consistent vertices count | Inconsistent vertices count | RMSE |
|---|---|---|---|
| E-Wed and W-Eed POIs | 2410 | 0 | 0 |
| E-Wed and W-Eed roads | 122962 | 0 | 0 |
| E-Wed and W-Eed buildings | 20325 | 0 | 0 |
| Datasets | Consistent vertices count | Inconsistent vertices count | RMSE |
| R-Ded and D-Red POIs | 2410 | 0 | 0 |
| R-Ded and D-Red roads | 122962 | 0 | 0 |
| R-Ded and D-Red buildings | 20325 | 0 | 0 |
| Datasets | Extraction from E-Wed maps |
Extraction from W-Eed maps |
Extraction from D-Wed maps |
|---|---|---|---|
| POIs | 0 | 0 | 0 |
| Roads | 0 | 0 | 0 |
| Buildings | 0 | 0 | 0 |
| Datasets | RMSE between encrypted map and original map (m) | RMSE between decrypted map and original map (m) |
| POIs | 448973.8688 | 0 |
| Roads | 48368.7397 | 0 |
| Buildings | 15216.4770 | 0 |
| Datasets | RMSE(m) | Max-R(m) |
| POIs | 4322.2641 | 15318.6846 |
| Roads | 615.6829 | 2711.3073 |
| Buildings | 437.2614 | 1757.5051 |
| Datasets | Wang et al. [31] | Wang et al. [34] | Peng et al. [30] | The proposed |
|---|---|---|---|---|
| POIs | - | 1.9887 | - | 2 |
| Roads | 0.2790 | 1.9761 | 1.9761 | 2 |
| Buildings | 0.1480 | 1.9568 | - | 2 |
| Datasets | Wang et al. [31] | Wang et al. [34] | Peng et al. [30] | The proposed | |
|---|---|---|---|---|---|
| POIs | RMSE | - | 0.25920 | - | 0.00131 |
| Max-R | - | 0.47274 | - | 0.01367 | |
| Roads | RMSE | 0.62505 | 0.25107 | 0.34937 | 0.00020 |
| Max-R | 0.78143 | 0.33009 | 0.39582 | 0.01373 | |
| Buildings | RMSE | 0.41708 | 0.26517 | - | 0.00066 |
| Max-R | 0.50781 | 0.39302 | - | 0.01395 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).