A clustering approach for protecting GIS vector data

Ahmed Abubahia, Mihaela Cocea

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The availability of Geographic Information System (GIS) data has increased in recent years, as well as the need to prevent its unauthorized use. One way of protecting this type of data is by embedding within it a digital watermark. In this paper, we build on our previous work on watermarking vector map data, to improve the robustness to (unwanted) modifications to the maps that may prevent the identification of the rightful owner of the data. More specifically, we address the simplification (removing some vertices from GIS vector data) and interpolation (adding new vertices to GIS data) modifications by exploiting a particular property of vector data called a bounding box. In addition, we experiment with bigger maps to establish the feasibility of the approach for larger maps.
Original languageEnglish
Title of host publicationAdvanced information systems engineering
Subtitle of host publication27th International Conference, CAiSE 2015, Stockholm, Sweden, June 8-12, 2015, proceedings
PublisherSpringer
Pages133-147
Volume9097
ISBN (Electronic)9783319190693
ISBN (Print)9783319190686
DOIs
Publication statusPublished - 2015
Event27th international conference on advanced information systems engineering (CAiSE'15) - Department of Computer and Systems Sciences (DSV), Stockholm University, Stockholm, Sweden
Duration: 8 Jun 201512 Jun 2015

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Conference

Conference27th international conference on advanced information systems engineering (CAiSE'15)
Country/TerritorySweden
CityStockholm
Period8/06/1512/06/15

Keywords

  • clustering
  • vector map data
  • Geographical information systems
  • data protection
  • digital copyright

Fingerprint

Dive into the research topics of 'A clustering approach for protecting GIS vector data'. Together they form a unique fingerprint.

Cite this