Skip to main content
Log in

Authenticating topological integrity of process plant models through digital watermarking

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Process plant models, which feature their intrinsical complex topological relation, are important industrial art works in the field of Computer-Aided Design (CAD). This paper investigates the topology authentication problem for process plant models. Compared with the widely studied watermarking based geometrical information protection and authentication techniques for traditional mechanical CAD drawings, topology authentication is still in its infancy and offers very interesting potentials for improvements. A semi-fragile watermarking based algorithm is proposed to address this interesting issue in this paper. We encode the topological relation among joint plant components into the watermark bits based on the hamming code. A subset of the model’s connection points are selected as mark points for watermark embedding. Then those topology sensitive watermark bits are embedded into selected mark points via bit substitution. Theoretical analysis and experimental results demonstrate that our approach yields a strong ability in detecting and locating malicious topology attacks while achieves robustness against various non-malicious attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470

    Article  Google Scholar 

  2. Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120

    Article  Google Scholar 

  3. Dow MR (1987) Integration of calculation models and CAD systems in building services design. Comput Aided Des 19(5):226–232

    Article  Google Scholar 

  4. Feng XQ, Zhang WY, Liu YN (2012) Double watermarks of 3D mesh model based on feature segmentation and redundancy information. Multimed Tools Appl 1–19. doi:10.1007/s11042-012-1039-7

  5. Gao XF, Zhang CM, Huang Y, Deng ZG (2012) A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models. ACM Trans Multimed Comput 8(S2):34:1–34:21

    Google Scholar 

  6. Hamming RW (1950) Error detecting and error correcting codes. Bell Syst Tech J 26(2):147–160

    Article  MathSciNet  Google Scholar 

  7. Kwon KR, Chang HJ, Jung GS, Moon KS, Lee SH (2006) 3D CAD drawing watermarking based on three components. In: Proceedings of the IEEE international conference on image processing, Atlanta, GA, USA, pp 1385–1388

  8. Kwon KR, Lee SH, Lee EJ, Kwon SG (2006) Watermarking for 3D CAD drawings based on three components. Lect Notes Comput Sci 4109:217–225

    Article  Google Scholar 

  9. Kwon SH, Kim TW, Choi HI, Moon HP, Park SH, Shin HJ, Sohn JK (2011) Blind digital watermarking of rational Béier and B-spline curves and surfaces with robustness against affine transformations and möius reparameterization. Comput Aided Des 43(6):629–638

    Article  Google Scholar 

  10. Lavoué G, Denis F, Dupont F (2007) Subdivision surface watermarking. Comput Graph-UK 31(3):480–492

    Article  Google Scholar 

  11. Lee JJ, Cho NI, Lee SU (2004) Watermarking algorithms for 3D NURBS graphic data. EURASIP J Appl Sig P 2004(14):2142–2152

    Article  MathSciNet  Google Scholar 

  12. Lee SH, Kwon KR (2010) CAD drawing watermarking scheme. Digital Signal Process 20(5):1379–1399

    Article  Google Scholar 

  13. Lee SH, Kwon KR (2012) Robust 3D mesh model hashing based on feature object. Digital Signal Process 22(5):744–759

    Article  MathSciNet  Google Scholar 

  14. Li J, Liu HM, Huang JW, Shi YQ (2012) Reference index-based H.264 video watermarking scheme. ACM Trans Multimed Comput 8(2s):33:1–33:22

    Google Scholar 

  15. Mooney A, Keating JG, Heffernan DM (2006) A detailed study of the generation of optically detectable watermarks using the logistic map. Chaos, Soliton Fractals 30(5):1088–1097

    Article  MATH  MathSciNet  Google Scholar 

  16. Ohbuchi R, Masuda H (2000) Managing CAD data as a multimedia data type using digital watermarking. In: Proceedings of the IFIP TC5 WG5.2 fourth workshop on knowledge intensive CAD to knowledge intensive engineering, Parma, Italy, pp 103–116

  17. Ohbuchi R, Masuda H, Aono M (1999) A shape-preserving data embedding algorithm for NURBS curves and surfaces. In: Proceedings of the computer graphics international, Alberta, Canada, pp 180–187

  18. Peng F, Guo RS, Li CT, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput Aided Des 42(12):1207–1216

    Article  Google Scholar 

  19. Peng F, Lei YZ, Long M, Sun XM (2011) A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput Aided Des 43(8):1018–1024

    Article  Google Scholar 

  20. Singh J, Garg P, De A (2012) Multiplicative watermarking of audio in DFT magnitude. Multimed Tools Appl 61(2):1–23

    Google Scholar 

  21. Su ZY, Li WQ, Kong JS, Dai YW, Tang WQ (2013) Watermarking 3d capd models for topology verification. Comput Aided Des 45(7):1042–1052

    Article  Google Scholar 

  22. Su ZY, Zhou L, Li WQ, Dai YW, Tang WQ (2013) Topology authentication for capd models based on laplacian coordinates. Comput Graph-UK 37(4):269–279

    Article  Google Scholar 

  23. Wang K, Lavoué G, Denis F, Baskurt A (2008) A comprehensive survey on three-dimensional mesh watermarking. IEEE Trans Multimedia 10(8):1513–1527

    Article  Google Scholar 

  24. Wang K, Lavoué G, Denis F, Baskurt A (2011) Robust and blind mesh watermarking based on volume moments. Comput Graph-UK 35(1):1–19

    Article  MATH  Google Scholar 

Download references

Acknowledgements

This work is supported in part by the National Natural Science Foundation of China (NO.61170250, NO.61103201). The models used in this paper are the courtesy of Beijing Zhongke Fulong Computer Technology Co., Ltd. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jianshou Kong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Su, Z., Zhou, L., Liu, G. et al. Authenticating topological integrity of process plant models through digital watermarking. Multimed Tools Appl 73, 1687–1707 (2014). https://doi.org/10.1007/s11042-013-1677-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1677-4

Keywords

Navigation