Changqing Zhu , Heyan Wang , Yazhou Zhao , Xingxiang Jiang , Hua Sun , Jia Duan , Hui Li , Luanyun Hu , Na Ren
{"title":"Vector map zero-watermarking algorithm considering feature set granularity","authors":"Changqing Zhu , Heyan Wang , Yazhou Zhao , Xingxiang Jiang , Hua Sun , Jia Duan , Hui Li , Luanyun Hu , Na Ren","doi":"10.1016/j.jisa.2024.103955","DOIUrl":null,"url":null,"abstract":"<div><div>Current vector map zero-watermarking algorithms that integrate blockchain technology typically focus on a limited subset of feature classes within datasets, resulting in significant energy consumption during copyright registration and hindering the advancement of vector map copyright protection through blockchain and zero-watermarking techniques. To address this challenge, this paper presents a novel vector map zero-watermarking algorithm that considers feature set granularity (ZW-CFSG). This algorithm effectively utilizes boundary contours and internal features to characterize dataset attributes, subsequently converting these features into zero-watermarks. To evaluate the efficacy of the ZW-CFSG algorithm, a comprehensive vector map copyright protection model is developed, integrating both blockchain and zero-watermarking mechanisms. The zero-watermark is securely registered on the blockchain, with energy consumption metrics employed to assess the algorithm's efficiency. Experimental findings reveal that the adoption of the ZW-CFSG algorithm can significantly reduce energy consumption associated with blockchain-based zero-watermarking, thereby enhancing the efficiency of copyright registration while ensuring compliance with rigorous requirements for copyright uniqueness and resilience.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103955"},"PeriodicalIF":3.8000,"publicationDate":"2025-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212624002576","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Current vector map zero-watermarking algorithms that integrate blockchain technology typically focus on a limited subset of feature classes within datasets, resulting in significant energy consumption during copyright registration and hindering the advancement of vector map copyright protection through blockchain and zero-watermarking techniques. To address this challenge, this paper presents a novel vector map zero-watermarking algorithm that considers feature set granularity (ZW-CFSG). This algorithm effectively utilizes boundary contours and internal features to characterize dataset attributes, subsequently converting these features into zero-watermarks. To evaluate the efficacy of the ZW-CFSG algorithm, a comprehensive vector map copyright protection model is developed, integrating both blockchain and zero-watermarking mechanisms. The zero-watermark is securely registered on the blockchain, with energy consumption metrics employed to assess the algorithm's efficiency. Experimental findings reveal that the adoption of the ZW-CFSG algorithm can significantly reduce energy consumption associated with blockchain-based zero-watermarking, thereby enhancing the efficiency of copyright registration while ensuring compliance with rigorous requirements for copyright uniqueness and resilience.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.