1. Introduction
Vector maps are frequently used in many fields, such as navigation, land management, energy development, urban planning, and public safety, which leads to an important and unique status for vector maps [
1]. Protecting the privacy and integrity of vector map data is of great significance in promoting the healthy development of the geographic information industry [
2]. At present, encryption and digital watermarking technologies are the mainstream technical means to effectively protect the security of geographic information [
3]. Encryption technology primarily addresses the issue of confidentiality in the process of information storage and transmission. Plaintext (the original readable information) is converted into ciphertext (the encrypted information) through specific algorithms to prevent unauthorized users from accessing and understanding the information. However, the security of encryption technology relies heavily on the management of the key; if the key is lost or stolen, then the encrypted information will be completely exposed [
4]. Different from encryption technology, digital watermarking technology mainly solves the problems of copyright protection and data traceability. Normally, a specific kind of information (e.g., copyright information, identification) is embedded into digital media (e.g., images, audio, video) in an imperceptible way [
5]. In particular, although digital watermarking is designed to be invisible to human eyes or inaudible to human ears, in reality, the watermark embedding alters the original data, and this impact needs to be kept within boundaries [
6]. For vector maps, combining encryption and digital watermarking technologies is imperative to achieve full lifecycle data protection [
7].
Over the past decade, a number of algorithms for reversible data hiding in the encrypted domain (RDHED) have been proposed [
8,
9,
10,
11,
12], in which the plaintext data are first encrypted. Then, additional information is embedded in the encrypted data. RDHED is suitable for scenarios where the data embedder is an unauthorized user and has no access to the original data. In RDHED, the original data can be recovered after additional data extraction, making RDHED very suitable for vector maps, which have high requirements for data accuracy. However, existing RDHED algorithms mainly focus on raster images, and few RDHED algorithms for vector maps have been proposed. Peng et al. [
13] proposed an RDHED algorithm for 2D vector graphics based on a real-number reversible mapping model, which strikes a good balance between watermark invisibility, capacity, and security. However, watermark extraction can only be carried out in the ciphertext domain for this algorithm while, in practical applications, watermark extraction in both ciphertext and plaintext domains is often required. Subsequently, Peng et al. [
14] proposed another RDHED algorithm for 2D vector graphics, which realizes watermark extraction in both ciphertext and plaintext domains and suits more application scenarios. Although not specially designed for vector maps, these algorithms have reference significance for encrypting and watermarking vector maps. Jang et al. [
15] proposed a crypto-marking technique for vector maps, which watermarks the map data first and then encrypts the data using a progressive perceptual encryption method. The watermarking and the progressive perceptual encryption are independent. However, the fixed order of first marking and then encrypting in this method limits its application scenarios.
In the algorithms mentioned above, the order of encryption and watermarking is fixed, which is not flexible enough for practical applications. In order to realize flexible interchangeable operations between watermarking and encryption, some scholars have further proposed commutative encryption and watermarking (CEW) schemes. These schemes can be categorized into three types, according to the mechanism employed to achieve commutativity: separate domain-based CEW, homomorphic encryption-based CEW, and feature invariant-based CEW.
Separate domain-based CEW schemes achieve commutativity by performing encryption and watermarking operations in two different domains. Jiang et al. [
16] proposed a CEW scheme based on orthogonal decomposition. The component coefficients of the orthogonal decomposition are independent, while the composite vector is sensitive to any changes in the component coefficients. The 2D image can be orthogonally decomposed into two domains based on this property for encryption and watermarking. This algorithm has no special requirements for encryption and watermarking and, so, it is highly universal. However, some plaintext information is exposed in these schemes, leading to security problems.
Homomorphic encryption-based CEW schemes achieve commutativity using homomorphisms. Lian [
17] proposed a quasi-commutative watermarking scheme based on a homomorphic encryption method with an additive mechanism to encrypt the video as a whole, which can realize simple homomorphic watermarking operations but lacks robustness. For vector maps, Wu et al. [
18] encrypted quantized integer coordinates based on Paillier homomorphic encryption and embedded the watermark using homomorphic operations in the ciphertext domain. Although homomorphic encryption algorithms can provide excellent data security, they suffer from computational complexity and low efficiency.
Feature invariant-based CEW schemes fulfill commutativity by embedding watermark information into a certain feature space, which remains unchanged during the encryption or decryption process. Compared with multimedia data such as images, vector maps have various spatial features, which make it more convenient to discover and construct some special invariants to realize commutativity between encryption and watermarking. For example, Ren et al. [
19] constructed two feature invariants based on the sum of inner angles and the storage direction of two adjacent objects according to the inherent characteristics of the vector map and designed a CEW scheme based on these two feature invariants. However, the watermark capacity of this algorithm is only half of the number of objects in a vector map. Li et al. [
20] proposed a new CEW algorithm for vector maps based on coordinate values, which serve as feature invariants. It is important to note that the above two algorithms only apply to polyline and polygon objects, and are unsuitable for point data. To achieve a higher watermarking capacity, Ren et al. [
21] further proposed a vector map CEW method based on the congruence relationship and geometric feature, in which the angles and the distance ratios are selected as the geometric features, and the watermark is embedded into the residuals of the congruence operations performed on the geometric features. The watermark capacity of this algorithm achieves 2 bits per vertex. For improved robustness, Ren [
22] proposed a CEW method for vector data based on singular value decomposition (SVD) in which the singular values are selected as the feature invariants.
In the literature, a few CEW schemes for vector maps have been proposed. However, most existing CEW algorithms focus on watermark robustness, while few focus on reversibility and suit the application scenarios that have high requirements for data accuracy. In this regard, Guo et al. [
23] proposed a lossless CEW algorithm for vector data in which no data distortion is introduced after watermarking. However, the watermark capacity is small. Tan et al. [
24] proposed a CEW algorithm based on zero watermarking and permutation encryption that can be applied to high-precision vector maps. However, the algorithm only applies to vector maps represented by polylines and polygons and cannot be applied to points.
Different from the schemes mentioned above, this study proposes a novel commutative encryption and reversible watermarking (CERW) method for vector maps in which commutativity between encryption and watermarking, as well as reversibility of watermarking, are achieved. This means that the original ciphertext map without a watermark can be recovered from the ciphertext map with a watermark, and the original plaintext map without a watermark can be recovered from the plaintext map with a watermark. The proposed CERW scheme is constructed based on virtual coordinates, which are uniformly distributed on the number axis. The commutativity between encryption and watermarking is achieved using feature invariance, which is defined as the relative position of a map coordinate in a virtual interval formed by two adjacent virtual coordinates. In the encryption part, the map coordinates are moved by random multiples of the virtual interval step. In the reversible watermarking part, the watermark bit is embedded into the difference computed based on the map coordinate’s relative position in a virtual interval using the difference expansion (DE) technique. Through introducing virtual coordinates, the proposed CERW scheme can achieve a higher watermark capacity and better watermark invisibility than traditional DE watermarking algorithms. Furthermore, the proposed CERW scheme suits all kinds of vector maps, including point maps, such as POI maps.
The remainder of this paper is organized as follows.
Section 2 introduces some preliminaries involved in this paper, including the pseudo-random number-generation method, difference expansion (DE) technique, and principle of the cosine-transform-based chaotic system (CTBCS).
Section 3 describes the proposed algorithm in detail.
Section 4 discusses the key parameters involved in the algorithm.
Section 5 verifies the effectiveness and analyzes the performance of the proposed algorithm by implementing a series of experiments. Finally,
Section 6 summarizes and overviews the whole work.