Advertisement

Multimedia Tools and Applications

, Volume 73, Issue 3, pp 1687–1707 | Cite as

Authenticating topological integrity of process plant models through digital watermarking

  • Zhiyong Su
  • Lang Zhou
  • Guangjie Liu
  • Jianshou Kong
  • Yuewei Dai
Article

Abstract

Process plant models, which feature their intrinsical complex topological relation, are important industrial art works in the field of Computer-Aided Design (CAD). This paper investigates the topology authentication problem for process plant models. Compared with the widely studied watermarking based geometrical information protection and authentication techniques for traditional mechanical CAD drawings, topology authentication is still in its infancy and offers very interesting potentials for improvements. A semi-fragile watermarking based algorithm is proposed to address this interesting issue in this paper. We encode the topological relation among joint plant components into the watermark bits based on the hamming code. A subset of the model’s connection points are selected as mark points for watermark embedding. Then those topology sensitive watermark bits are embedded into selected mark points via bit substitution. Theoretical analysis and experimental results demonstrate that our approach yields a strong ability in detecting and locating malicious topology attacks while achieves robustness against various non-malicious attacks.

Keywords

Watermarking Semi-fragile watermarking Topology authentication Topological integrity  Process plant model Connection points 

Notes

Acknowledgements

This work is supported in part by the National Natural Science Foundation of China (NO.61170250, NO.61103201). The models used in this paper are the courtesy of Beijing Zhongke Fulong Computer Technology Co., Ltd. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

References

  1. 1.
    Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470CrossRefGoogle Scholar
  2. 2.
    Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120CrossRefGoogle Scholar
  3. 3.
    Dow MR (1987) Integration of calculation models and CAD systems in building services design. Comput Aided Des 19(5):226–232CrossRefGoogle Scholar
  4. 4.
    Feng XQ, Zhang WY, Liu YN (2012) Double watermarks of 3D mesh model based on feature segmentation and redundancy information. Multimed Tools Appl 1–19. doi: 10.1007/s11042-012-1039-7
  5. 5.
    Gao XF, Zhang CM, Huang Y, Deng ZG (2012) A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models. ACM Trans Multimed Comput 8(S2):34:1–34:21Google Scholar
  6. 6.
    Hamming RW (1950) Error detecting and error correcting codes. Bell Syst Tech J 26(2):147–160CrossRefMathSciNetGoogle Scholar
  7. 7.
    Kwon KR, Chang HJ, Jung GS, Moon KS, Lee SH (2006) 3D CAD drawing watermarking based on three components. In: Proceedings of the IEEE international conference on image processing, Atlanta, GA, USA, pp 1385–1388Google Scholar
  8. 8.
    Kwon KR, Lee SH, Lee EJ, Kwon SG (2006) Watermarking for 3D CAD drawings based on three components. Lect Notes Comput Sci 4109:217–225CrossRefGoogle Scholar
  9. 9.
    Kwon SH, Kim TW, Choi HI, Moon HP, Park SH, Shin HJ, Sohn JK (2011) Blind digital watermarking of rational Béier and B-spline curves and surfaces with robustness against affine transformations and möius reparameterization. Comput Aided Des 43(6):629–638CrossRefGoogle Scholar
  10. 10.
    Lavoué G, Denis F, Dupont F (2007) Subdivision surface watermarking. Comput Graph-UK 31(3):480–492CrossRefGoogle Scholar
  11. 11.
    Lee JJ, Cho NI, Lee SU (2004) Watermarking algorithms for 3D NURBS graphic data. EURASIP J Appl Sig P 2004(14):2142–2152CrossRefMathSciNetGoogle Scholar
  12. 12.
    Lee SH, Kwon KR (2010) CAD drawing watermarking scheme. Digital Signal Process 20(5):1379–1399CrossRefGoogle Scholar
  13. 13.
    Lee SH, Kwon KR (2012) Robust 3D mesh model hashing based on feature object. Digital Signal Process 22(5):744–759CrossRefMathSciNetGoogle Scholar
  14. 14.
    Li J, Liu HM, Huang JW, Shi YQ (2012) Reference index-based H.264 video watermarking scheme. ACM Trans Multimed Comput 8(2s):33:1–33:22Google Scholar
  15. 15.
    Mooney A, Keating JG, Heffernan DM (2006) A detailed study of the generation of optically detectable watermarks using the logistic map. Chaos, Soliton Fractals 30(5):1088–1097CrossRefMATHMathSciNetGoogle Scholar
  16. 16.
    Ohbuchi R, Masuda H (2000) Managing CAD data as a multimedia data type using digital watermarking. In: Proceedings of the IFIP TC5 WG5.2 fourth workshop on knowledge intensive CAD to knowledge intensive engineering, Parma, Italy, pp 103–116Google Scholar
  17. 17.
    Ohbuchi R, Masuda H, Aono M (1999) A shape-preserving data embedding algorithm for NURBS curves and surfaces. In: Proceedings of the computer graphics international, Alberta, Canada, pp 180–187Google Scholar
  18. 18.
    Peng F, Guo RS, Li CT, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput Aided Des 42(12):1207–1216CrossRefGoogle Scholar
  19. 19.
    Peng F, Lei YZ, Long M, Sun XM (2011) A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput Aided Des 43(8):1018–1024CrossRefGoogle Scholar
  20. 20.
    Singh J, Garg P, De A (2012) Multiplicative watermarking of audio in DFT magnitude. Multimed Tools Appl 61(2):1–23Google Scholar
  21. 21.
    Su ZY, Li WQ, Kong JS, Dai YW, Tang WQ (2013) Watermarking 3d capd models for topology verification. Comput Aided Des 45(7):1042–1052CrossRefGoogle Scholar
  22. 22.
    Su ZY, Zhou L, Li WQ, Dai YW, Tang WQ (2013) Topology authentication for capd models based on laplacian coordinates. Comput Graph-UK 37(4):269–279CrossRefGoogle Scholar
  23. 23.
    Wang K, Lavoué G, Denis F, Baskurt A (2008) A comprehensive survey on three-dimensional mesh watermarking. IEEE Trans Multimedia 10(8):1513–1527CrossRefGoogle Scholar
  24. 24.
    Wang K, Lavoué G, Denis F, Baskurt A (2011) Robust and blind mesh watermarking based on volume moments. Comput Graph-UK 35(1):1–19CrossRefMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Zhiyong Su
    • 1
  • Lang Zhou
    • 2
  • Guangjie Liu
    • 1
  • Jianshou Kong
    • 1
  • Yuewei Dai
    • 1
  1. 1.School of AutomationNanjing University of Science and TechnologyNanjingChina
  2. 2.School of Information EngineeringNanjing University of Finance and EconomicsNanjingChina

Personalised recommendations