Toward Copyright Integrity and Verifiability via Multi-Bit Watermarking for Intelligent Transportation Systems

📅 2025-02-08
🏛️ IEEE transactions on intelligent transportation systems (Print)
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address the vulnerability of Intelligent Transportation Systems (ITS) data to tampering and forgery—posing risks to public safety and copyright enforcement—this paper proposes ITSmark, a multi-bit watermarking scheme. Methodologically, ITSmark introduces a novel copyright-driven, multi-segmented, multi-bit spatial dynamic token mapping mechanism, enabling configurable watermark embedding locations and densities, encryption-bound access permissions, and sub-block-level tamper localization. It integrates multi-bit spatial partitioning, copyright-guided token sequence generation, key-encrypted embedding, and a lightweight extraction/verification algorithm. Experimental results demonstrate that ITSmark significantly outperforms baseline methods in data fidelity, watermark extraction accuracy, and forgery resistance, achieving 100% permission verification success rate. The scheme thus jointly ensures security, traceability, and deployment flexibility for ITS data.

Technology Category

Application Category

📝 Abstract
Intelligent transportation systems (ITS) use advanced technologies such as artificial intelligence to significantly improve traffic flow management efficiency, and promote the intelligent development of the transportation industry. However, if the data in ITS is attacked, such as tampering or forgery, it will endanger public safety and cause social losses. Therefore, this paper proposes a watermarking that can verify the integrity of copyright in response to the needs of ITS, termed ITSmark. ITSmark focuses on functions such as extracting watermarks, verifying permission, and tracing tampered locations. The scheme uses the copyright information to build the multi-bit space and divides this space into multiple segments. These segments will be assigned to tokens. Thus, the next token is determined by its segment which contains the copyright. In this way, the obtained data contains the custom watermark. To ensure the authorization, key parameters are encrypted during copyright embedding to obtain cipher data. Only by possessing the correct cipher data and private key, can the user entirely extract the watermark. Experiments show that ITSmark surpasses baseline performances in data quality, extraction accuracy, and unforgeability. It also shows unique capabilities of permission verification and tampered location tracing, which ensures the security of extraction and the reliability of copyright verification. Furthermore, ITSmark can also customize the watermark embedding position and proportion according to user needs, making embedding more flexible.
Problem

Research questions and friction points this paper is trying to address.

Ensures copyright integrity in ITS
Verifies data authenticity via watermarking
Traces tampered locations accurately
Innovation

Methods, ideas, or system contributions that make the work stand out.

Multi-bit watermarking for ITS
Encrypted key parameters for security
Customizable watermark embedding flexibility
🔎 Similar Papers
No similar papers found.
Y
Yihao Wang
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
L
Lingxiao Li
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China, and also with the State Key Laboratory of Networking and Switching Technology, Beijing 100876, China
Yifan Tang
Yifan Tang
SF Motors Inc
R
Ru Zhang
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
J
Jianyi Liu
School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China