Abstract
A semi-fragile watermarking algorithm for authenticating 2D engineering graphics based on log-polar coordinates mapping is proposed. Firstly, the coordinates of vertices of entities are mapped to the log-polar coordinate system to obtain the invariance of translation, scaling and rotation. Then the watermark is embedded in the mantissa of the real-valued log-polar coordinates via bit substitution. Theoretical analysis and experimental results show that the proposed algorithm is not only robust against incidental operations such as rotation, translation and scaling, but can also detect and locate malicious attacks such as entity modification, entity addition/deletion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography. Morgan Kaufmann, San Francisco (2008)
Yang, Y., Sun, X., Yang, H., Li, C.T., Xiao, R.: A Contrast-Sensitive Reversible Visible Image Watermarking Technique. IEEE Transactions on Circuits and Systems for Video Technology (accepted, 2009)
Gupta, G., Pieprzyk, J.: Reversible and Blind Database Watermarking Using Difference Expansion. International Journal of Digital Crime and Forensics 1(2), 42–54 (2009)
Li, C.T., Si, H.: Wavelet-based Fragile Watermarking Scheme for Image Authentication. Journal of Electronic Imaging 16(1), 013009-1–013009-9 (2007)
Ohbuchi, R., Masuda, H., Aono, M.: Watermarking Three-Dimensional Polygonal Models. In: Proceeding of the ACM Multimedia 1997, pp. 261–272 (1997)
Chou, C.M., Tseng, D.C.: A Public Fragile Watermarking Scheme for 3D Model Authentication. Computer-Aided Design 38(11), 1154–1165 (2005)
Wang, W.B., Zheng, G.Q.: A Numerically Stable Fragile Watermarking Scheme for Authenticating 3D Models. Computer-Aided Design 40, 634–645 (2008)
Wu, H.T., Cheung, Y.-M.: A fragile watermarking scheme for 3D meshes. In: Proceedings of the 7th Workshop on Multimedia and Security, New York, pp. 117–124 (2005)
Solachidis, V., Pitas, I.: Watermarking Polygonal Lines Using Fourier Descriptors. IEEE Computer Graphics and Applications 3(24), 44–51 (2004)
Gou, H., Wu, M.: Data Hiding in Curves with Application to Fingerprinting Maps. IEEE Trans. Signal Processing 10(53), 3988–4005 (2005)
Huang, X.F., Peng, F., Deng, T.: A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System. In: Proceedings of International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 339–342. IEEE Press, Harbin (2008)
Huang, X.S., Gu, J.W.: Survey of Watermarking Techniques for CAD Graphic Data. Journal of Engineering Graphic 6, 140–146 (2005) (in chinese)
Zhang, W., Ren, X.Y., Zhang, G.L.: An Robust Object Locating Method Based On Log-polar Transform and Affine Transform. Journal of Image and Graphics 11(9), 1255–1259 (2006) (in Chinese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Peng, F., Guo, RS., Li, CT., Long, M. (2010). A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation. In: Weerasinghe, D. (eds) Information Security and Digital Forensics. ISDF 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 41. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11530-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-11530-1_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11529-5
Online ISBN: 978-3-642-11530-1
eBook Packages: Computer ScienceComputer Science (R0)