• Published 2013

Map Watermarking : Applications , Techniques and Attacks

@inproceedings{Abbas2013MapW,
  title={Map Watermarking : Applications , Techniques and Attacks},
  author={Tawfiq Abdulkhaleq Abbas and Majid Jabbar Jawad},
  year={2013}
}
This paper surveys of digital vector map watermarking. Some information will be presented, such as the features of digital vector map, some digital vector map watermarking algorithms, possible attacks on embedded watermark. Also, challenges in field of digital vector map watermarking will be presented. 

Figures and Tables from this paper.

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

Partition Clustering for GIS Map Data Protection

  • 2014 IEEE 26th International Conference on Tools with Artificial Intelligence
  • 2014
VIEW 4 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Exploiting Vector Map Properties for GIS Data Copyright Protection

  • 2015 IEEE 27th International Conference on Tools with Artificial Intelligence (ICTAI)
  • 2015
VIEW 3 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 26 REFERENCES

TALEB HASSON, “Graph Construction based on Database of Movie objects,”Oriental

I. HADI, SAAD
  • Journal of Computer Science and Technology,
  • 2013

Men, “Reversible Watermarking for 2-D Vector Map Authentication with Localization,

C. N. Wang
  • Computer Aided Design Journal,
  • 2012

Reversible Watermarking for 2 - D Vector Map Authentication with Localization

C. Men
  • Computer Aided Design Journal
  • 2012

Watermarking Vector Maps Based on Minimum Encasing Rectangle

  • 2011 Fourth International Conference on Intelligent Computation Technology and Automation
  • 2011
VIEW 1 EXCERPT

A Digital Watermarking Algorithm for Vector Map

  • 2010 International Conference on Challenges in Environmental Science and Computer Engineering
  • 2010

A Watermarking Scheme Using Polyline and Polygon Characteristic of Shapefile

  • 2010 Third International Conference on Intelligent Networks and Intelligent Systems
  • 2010
VIEW 1 EXCERPT