Skip to main content

A Fractal Watermark Solution for Product Data

  • Conference paper
Book cover Computer Supported Cooperative Work in Design III (CSCWD 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4402))

  • 938 Accesses

Abstract

Copyright and integrity protection over product data is becoming an urgent requirement, because in a Distributed Networked Manufacturing environment, enterprises have to interact with each other to share product data. In this paper, we introduce a novel watermarking solution for product data based on the idea of fractal, which classifies product data watermarks into three tiers: fractal watermark, tree-structure watermark, and tree-node watermark. It embeds watermarks not only in value-carrying nodes but also in product structures that “glue” all the nodes together by embedding multiple structure watermarks in product data. Simulation results show that the proposed technique is robust against various forms of malicious attacks of product data, and naturally immune from structure transformation attacks and subtractive (sub-tree) attacks. Moreover, the solution can protect tree-structure data whose knowledge is mainly embodied in the tree structure efficiently. It is very easy to implement and popularize.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R. (ed.): IH 1996. LNCS, vol. 1174. Springer, Heidelberg (1996)

    Google Scholar 

  2. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding -A Survey. Proceedings of the IEEE 87(7), 1062–1078 (1999)

    Article  Google Scholar 

  3. Bender, W., et al.: Techniques for Data Hiding. IBM Systems Journal 35(3-4), 313–336 (1996)

    Article  Google Scholar 

  4. Tirkel, A.Z., et al.: Electronic watermark. In: The Digital Image Computing - Techniques and Applications, Proceedings, vol. 2, Sydney, Australia, pp. 666–673 (1993)

    Google Scholar 

  5. Ruanaidh, J.J.K.O., Dowling, W.J., Boland, F.M.: Watermarking digital images for copyright protection. IEEE Proceedings, Vision, Image and Signal Processing 143(4), 250–256 (1996)

    Article  Google Scholar 

  6. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process 66(3), 283–301 (1998)

    Article  MATH  Google Scholar 

  7. Bone, Y.L., Tewfik, A.H., Hamdy, K.N.: Digital watermarks for audio signals. In: Proc. International Conference on Multimedia Computing and Systems, Hiroshima, pp. 473–480 (1996)

    Google Scholar 

  8. Ohbuchi, R., Masuda, H., Aono, M.: Watermarking 3D polygonal models. In: Proc. Fifth ACM International Multimedia Conference, pp. 261–272 (1997)

    Google Scholar 

  9. Ohbuchi, R., Takahasi, S., Miyazawa, T.: Watermarking 3D Polygonal Meshes in the Mesh Spectral Domain. In: Proc. Graphics Interface, pp. 9–17 (2001)

    Google Scholar 

  10. Ohbuchi, R., Mukaiyama, A., Takahashi, S.: A Frequency-Domain Approach to Watermarking 3D Shapes. Computer Graphics Forum 21(3), 1–10 (2002)

    Article  Google Scholar 

  11. Wagner, M.G.: Robust Watermarking of Polygonal Meshes. In: Proc. International Conference on Geometric Modeling & Processing, Hong Kong, pp. 201–208 (2000)

    Google Scholar 

  12. Aspert, N., Drelie, E., Ebrahimi, T.: Steganography for three-dimensional Polygonal Meshes. In: Proc. SPIE 47th Annual Meeting, Application of Digital Image Processing XXV, Seattle (2002)

    Google Scholar 

  13. Fornaro, C., Sanna, A.: Private Key Watermarking for Authentication of CSG Models. Computer-Aided Design 32, 727–735 (2000)

    Article  Google Scholar 

  14. Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12(2), 157–169 (2003)

    Article  Google Scholar 

  15. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Transactions on Knowledge and Data Engineering 16(6), 1–17 (2004)

    Article  Google Scholar 

  16. Thomborson, C., Nagra, J.: Threading Software Watermarks. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 208–223. Springer, Heidelberg (2004)

    Google Scholar 

  17. Yuan, L., Pari, P.R., Qu, G.: Soft IP protection: watermarking HDL codes. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 224–238. Springer, Heidelberg (2004)

    Google Scholar 

  18. Atallah, M.J., et al.: Natural language watermarking and tamperproofing. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 196–212. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  19. Chang, L.-P., et al.: Natural Language Watermarking Using Semantic Substitution for Chinese Text. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 129–140. Springer, Heidelberg (2004)

    Google Scholar 

  20. Sion, R.: Proving ownership over categorical data. In: Proc. IEEE International Conference on Data Engineering, pp. 584–596 (2004)

    Google Scholar 

  21. Sion, R., Atallah, M., Prabhakar, S.: Resilient rights protection for sensor streams. In: Proc. 30th International Conference on VLDB, Toronto, Canada, pp. 732–743 (2004)

    Google Scholar 

  22. Sion, R., Atallah, M., Prabhakar, S.: Resilient information hiding for abstract semi-structures. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 141–153. Springer, Heidelberg (2004)

    Google Scholar 

  23. Ng, W., Lau, H.-L.: Effective Approaches for Watermarking XML Data. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol. 3453, pp. 68–80. Springer, Heidelberg (2005)

    Google Scholar 

  24. Inoue, S., et al.: A Proposal on Information Hiding Methods using XML. In: Proc. First NLP and XML Workshop, Tokyo, Japan, pp. 55–62 (2001)

    Google Scholar 

  25. Chen, G., et al.: Watermarking Abstract Tree-Structured Data. In: Fan, W., Wu, Z., Yang, J. (eds.) WAIM 2005. LNCS, vol. 3739, pp. 221–232. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  26. Barnsley, M.F., Rising, H.: Fractals Everywhere, 2nd edn. Academic Press, Boston (1993)

    MATH  Google Scholar 

  27. Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–83 (1883)

    Google Scholar 

  28. Harte, T., Bors, A.G.: Watermarking Graphical Objects. In: Proc. IEEE International Conference on Image, Rochester, New York (2002)

    Google Scholar 

  29. Craver, S., et al.: Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications 16(4), 573–586 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Weiming Shen Junzhou Luo Zongkai Lin Jean-Paul A. Barthès Qi Hao

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, K., Chen, G., Zang, C., Dong, J. (2007). A Fractal Watermark Solution for Product Data. In: Shen, W., Luo, J., Lin, Z., Barthès, JP.A., Hao, Q. (eds) Computer Supported Cooperative Work in Design III. CSCWD 2006. Lecture Notes in Computer Science, vol 4402. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72863-4_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72863-4_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72862-7

  • Online ISBN: 978-3-540-72863-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics