A steganographic method of embedding an identifier into the spatial data of an electronic map
Abstract
Electronic maps (e-maps), which are a set of computer files, are the main form of representation of geographic information to the end user. An important task is protecting e-maps from unauthorised use or modification. This paper describes the steganographic method of embedding an invisible digital watermark into the spatial data of e-maps for protecting copyright, ensuring integrity of maps or proving their authenticity. The method is applicable to e-maps in the Shapefile and GeoJSON formats. It is based on the placement of additional points in spatial objects (polygons) of the e-map. In this case the e-map is used as a carrier object, and point coordinates are elements of the key information of the steganographic transformation. This establishes a relationship between the spatial objects of the e-map, which ensures their integrity. Algorithms for direct and inverse steganographic transformations are considered. The developed StegoMap Internet service for implementing the placement and extraction of an invisible digital watermark on the basis of the proposed method is described.
References
- Sheppard E. GIS and society: towards a research agenda. Cartography and Geographic Information Systems. 1995;22(1):5–16. DOI: 10.1559/152304095782540555.
- Longley PA, Goodchild MF, Maguire DJ, Rhind DW. Geographic information science and systems. 4th edition. Hoboken: Wiley; 2015. XVI, 505 р.
- Mukherjee F. GIS use by an urban local body as part of e-governance in India. Cartography and Geographic Information Science. 2018;45(6):556–569. DOI: 10.1080/15230406.2018.1448304.
- Rzeszewski M. Geosocial capta in geographical research – a critical analysis. Cartography and Geographic Information Science. 2018;45(1):18–30. DOI: 10.1080/15230406.2016.1229221.
- Захаров МС, Кобзев АГ. Картографический метод и геоинформационные системы в инженерной геологии. 3-е издание. Санкт-Петербург: Лань; 2021. 116 с.
- IHO data protection scheme [Internet]. Monaco: International Hydrographic Organization; 2020 [cited 2022 November 15]. XII, 106 p. (IHO publication S-63; edition 1.2.1). Available from: https://iho.int/uploads/user/pubs/standards/s-63/S-63_2020_Ed1.2.1_EN_Draft_Clean.pdf.
- López C. Watermarking of digital geospatial datasets: a review of technical, legal and copyright issues. International Journal of Geographical Information Science. 2002;16(6):589–607. DOI: 10.1080/13658810210129148.
- Calagna M, Mancini LV. Information hiding for spatial and geographical data. In: Belussi A, Catania B, Clementini E, Ferrari E, editors. Spatial data on the web: modeling and management. Berlin: Springer; 2007. p. 235–258. DOI: 10.1007/978-3-540-69878-4_11.
- Aybet J, Al-Saedy H, Farmer M. Watermarking spatial data in geographic information systems. In: Jahankhani H, Hessami AG, Hsu F, editors. Global security, safety, and sustainability. Proceedings of the 5th International conference; 2009 September 1–2; London, England. Berlin: Springer; 2009. p. 18–26 (Communications in computer and information science; volume 45). DOI: 10.1007/978-3-642-04062-7_3.
- Neyman SN, Wijaya YH, Sitohang B. A new scheme to hide the data integrity marker on vector maps using a feature-based fragile watermarking algorithm. In: Proceedings of 2014 International Conference on Data and Software Engineering (ICODSE); 2014 November 26–27; Bandung, Indonesia. [S. l.]: Institute of Electrical and Electronics Engineers; 2014. p. 1–6. DOI: 10.1109/ICODSE.2014.7062486.
- Blinova EA, Urbanovich PP. [Protecting the integrity of e-card data steganographic method]. In: Galkin IM, Romanchik VS, Volkov VM, Rasol’ko GA, editors. Veb-programmirovanie i internet-tekhnologii WebConf2018. Tezisy dokladov 4-i Mezhdunarodnoi nauchno-prakticheskoi konferentsii; 14–18 maya 2018 g.; Minsk, Belarus’ [Web programming and internet technologies Web-Conf 2018. Abstracts of the 4th International scientific and practical conference; 2018 May 14–18; Minsk, Belarus]. Minsk: Belarusian State University; 2018. p. 147. Russian.
- Blinova EA, Urbanovich PP. А steganographic method based on the embedding of additional coordinates into images of SVG format. Proceedings оf BSTU. Issue 3, Physics and Mathematics. Informatics. 2018;1:104–109. Russian.
- Blinova EA, Urbanovich PP. [Comparative features of the use of steganographic methods in electronic maps]. In: Kovalev MYa, Bibilo PN, Grivachevskii AG, Dudkin AA, editors. Informatsionnye tekhnologii v promyshlennosti, logistike i sotsial’noi sfere (ITI’2019). Tezisy dokladov X Mezhdunarodnoi nauchno-tekhnicheskoi konferentsii; 23–24 maya 2019 g.; Minsk, Belarus’ [Information technologies in industry, logistics and social sphere (ITI’2019). Abstracts of the 10th International scientific and technical conference; 2019 May 23–24; Minsk, Belarus]. Minsk: United Institute of Informatics Problems, National Academy of Sciences of Belarus; 2019. p. 22–24. Russian.
- Blinova EA. A steganographic method based on the embedding of additional coordinates into spatial data. Proceedings оf BSTU. Issue 3, Physics and Mathematics. Informatics. 2019;1:69–74. Russian.
- Blinova EA, Urbanovich PP. Steganographic method based on hidden messages embedding into Bezier curves of SVG images. Journal of the Belarusian State University. Mathematics and Informatics. 2021;3:68–83. DOI: 10.33581/2520-6508-2021-3-68-83.
- StegoMap [Internet]. 2023 [cited 2023 February 1]. Available from: https://stashevskaya.belstu.by/about.
Copyright (c) 2023 Journal of the Belarusian State University. Mathematics and Informatics

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
The authors who are published in this journal agree to the following:
- The authors retain copyright on the work and provide the journal with the right of first publication of the work on condition of license Creative Commons Attribution-NonCommercial. 4.0 International (CC BY-NC 4.0).
- The authors retain the right to enter into certain contractual agreements relating to the non-exclusive distribution of the published version of the work (e.g. post it on the institutional repository, publication in the book), with the reference to its original publication in this journal.
- The authors have the right to post their work on the Internet (e.g. on the institutional store or personal website) prior to and during the review process, conducted by the journal, as this may lead to a productive discussion and a large number of references to this work. (See The Effect of Open Access.)