CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Data Security and Access Control for Geospatial Database sets Using Novel StegoHash Algorithm

Published on December 2011 by Mamta Malik, Dr. A.K.Sharma
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 2
December 2011
Authors: Mamta Malik, Dr. A.K.Sharma
11bdbab2-7a75-47b8-b4aa-fa447d1ee96f

Mamta Malik, Dr. A.K.Sharma . Data Security and Access Control for Geospatial Database sets Using Novel StegoHash Algorithm. Network Security and Cryptography. NSC, 2 (December 2011), 4-10.

@article{
author = { Mamta Malik, Dr. A.K.Sharma },
title = { Data Security and Access Control for Geospatial Database sets Using Novel StegoHash Algorithm },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 2 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 4-10 },
numpages = 7,
url = { /specialissues/nsc/number2/4327-spe018t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Mamta Malik
%A Dr. A.K.Sharma
%T Data Security and Access Control for Geospatial Database sets Using Novel StegoHash Algorithm
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 2
%P 4-10
%D 2011
%I International Journal of Computer Applications
Abstract

The applications of spatial database (2D and 3D vector maps) are more and more popular in the computer and network environments. It is the reason why information security is an important issue. Data hiding schemes may include map data authentication, secret communication for the purposes of copyright protection, integrity authentication, or secret communication. The purpose of this paper is to proposed novel StegoHash algorithm to enhance the security of spatial database. This algorithm is more appropriate for hiding data in vector maps because the distortions can be removed after the hidden data have been extracted. Combining the concepts of traditional cryptography and steganography, a new spatial database cryptosystem is proposed. Here access remains secure in case of steganalytic attacks especially for highly secure areas like defence, research centres etc.

References
  1. R. Ohbuchi, H. Ueda, and S. Endoh, “Robust watermarking of vector digital maps”, in Proc. IEEE Int. Conf. Multimedia and Expo, Lausanne, Switzerland, vol. 1,Aug. 26–29, pp. 577–580, 2002.
  2. H. Gou and M. Wu, “Data hiding in curves with applications to map fingerprinting”, IEEE Trans. Signal Process., vol. 53, no. 4, pp. 3988–4005,2005.
  3. G. Schulz and M. Voigt, “A high capacity watermarking system for digital maps”, in Proc. ACM Int. Workshop on Multimedia and Security, Magdeburg, Germany, pp. 180–186,2004.
  4. XiaoTong Wang, ChengYong Shao, XiaoGang Xu and XiaMu Niu, “Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion”, IEEE Transactions on Information Forensics and Security, vol.2,no. 3, pp.311–320,2007.
  5. Stuti Bazaj, Sachin Modi, Anand Mohan, S. P. Singh, "An Improved Algorithm for Data Hiding Using HH-subband Haar Wavelet Coefficients", IJACT, Vol. 2, No. 2, pp. 109 ~ 116, 2010.
  6. Samira Lagzian, Mohsen Soryani, Mahmood Fathy, "A New Robust Watermarking Scheme Based on RDWT-SVD", IJIIP, Vol. 2, No. 1, pp. 22 ~ 29, 2011.
  7. Hongyuan Li, Guangjie Liu, Yuewei Dai, Zhiquan Wang , "Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression ", JDCTA, Vol. 4, No. 8, pp. 34 ~ 42, 2010.
  8. Yongjian Hu, Heung-Kyu Lee, Kaiying Chen, and Jianwei Li, “Difference Expansion Based Reversible Data Hiding Using Two Embedding Directions”, IEEE Transactions on Multimedia ,vol.10, no.8, pp.1500–1512,2008.
  9. J. Tian, “Reversible data embedding using a difference expansion”, IEEE Trans. Circuits Syst. Video Technol., vol. 13 , pp. 890–896,2003.
  10. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding”, IEEE Trans. Image Process., vol. 12, no.2 , pp. 157–160,2005.
  11. xMohammad Athar Ali , Eran. A. Edirisinghe, "Reversible Watermarking using Differential Expansion on IPCM Macroblocks in H.264/AVC", JNIT, Vol. 2, No. 1, pp. 105 – 116, 2011.
  12. M. Voigt, B. Yang, and C. Busch, “Reversible watermarking of 2d-vector data”, in Proc. ACM Int. Workshop on Multimedia and Security, Magdeburg, Germany, pp. 160–165,2004.
  13. D. M. Thodi and J. J. Rodriguez, “Expansion embedding techniques for reversible watermarking”, IEEE Trans. Image Process., vol. 16, no.3, pp. 721–730,2007.
  14. Chandramouli R,Subbalakshmi K P, “Current trends in steganalysis:a critical survey”, In Proceeding of Eighth International Conference Control on Automation, Robotics and Vision, KunMing: Elseviser Press, pp.964–967,2004.
  15. I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image quality metrics”, IEEE Trans. On Image Processing, vol. 12, no. 2, pp. 221–229,2003.
  16. 16 R. Chandramouli, “A mathematical framework for active steganalysis” ,ACM Multimedia Systems, vol. 9, no.3 , pp. 303–311,2003.
  17. X. Zhang and S. Wang, “Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security”, Pattern Recognition Letters 25, pp.331–339,2004.
  18. A.M.Alattar, “Reversible watermark using the difference expansion of a generalized integer transform”, IEEE Transactions on Image Processing, vol. 13, no.8 , pp.1147–1156,2004.
  19. J. Lin; Y. Fang, B. Chen, and P. Wu: Analysis of Access Control Mechanisms for Spatial Database. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences. Vol. XXXVII. Part B8, p. 1443-1448, 2008.
  20. S. Castano, M. G. Fugini, and P. Samarati: Database Security. Addison-Wesley Publishing Company, 1995.
  21. M. Govorov, Y. Khmelevsky, V. Ustimenko, and A. Khorev: Security for GIS N-tier Architecture. Developments in Spatial Data Handling 11th International Symposium on Spatial Data Handling, p. 71-83, 2006.
  22. Z. Yanqun, and W. Qianping: Security Model for Distributed GIS Spatial Data. International Symposium on Information Science and Engieering, vol. 2, p.641-645, 2008.
  23. E. Bertino, B. M. Thuraisingham, M. Gertz, and M. L. Damiani: Security and privacy for geospatial data: concepts and research directions.SPRINGL 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Spatial database StegoHash