Abstract
Process plant models, which feature their intrinsical complex topological relation, are important industrial art works in the field of Computer-Aided Design (CAD). This paper investigates the topology authentication problem for process plant models. Compared with the widely studied watermarking based geometrical information protection and authentication techniques for traditional mechanical CAD drawings, topology authentication is still in its infancy and offers very interesting potentials for improvements. A semi-fragile watermarking based algorithm is proposed to address this interesting issue in this paper. We encode the topological relation among joint plant components into the watermark bits based on the hamming code. A subset of the model’s connection points are selected as mark points for watermark embedding. Then those topology sensitive watermark bits are embedded into selected mark points via bit substitution. Theoretical analysis and experimental results demonstrate that our approach yields a strong ability in detecting and locating malicious topology attacks while achieves robustness against various non-malicious attacks.
Similar content being viewed by others
References
Chang CC, Chen KN, Lee CF, Liu LJ (2011) A secure fragile watermarking scheme based on chaos-and-hamming code. J Syst Softw 84(9):1462–1470
Coatrieux G, Pan W, Cuppens-Boulahia N, Cuppens F, Roux C (2013) Reversible watermarking based on invariant image classification and dynamic histogram shifting. IEEE Trans Inf Forensics Secur 8(1):111–120
Dow MR (1987) Integration of calculation models and CAD systems in building services design. Comput Aided Des 19(5):226–232
Feng XQ, Zhang WY, Liu YN (2012) Double watermarks of 3D mesh model based on feature segmentation and redundancy information. Multimed Tools Appl 1–19. doi:10.1007/s11042-012-1039-7
Gao XF, Zhang CM, Huang Y, Deng ZG (2012) A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models. ACM Trans Multimed Comput 8(S2):34:1–34:21
Hamming RW (1950) Error detecting and error correcting codes. Bell Syst Tech J 26(2):147–160
Kwon KR, Chang HJ, Jung GS, Moon KS, Lee SH (2006) 3D CAD drawing watermarking based on three components. In: Proceedings of the IEEE international conference on image processing, Atlanta, GA, USA, pp 1385–1388
Kwon KR, Lee SH, Lee EJ, Kwon SG (2006) Watermarking for 3D CAD drawings based on three components. Lect Notes Comput Sci 4109:217–225
Kwon SH, Kim TW, Choi HI, Moon HP, Park SH, Shin HJ, Sohn JK (2011) Blind digital watermarking of rational Béier and B-spline curves and surfaces with robustness against affine transformations and möius reparameterization. Comput Aided Des 43(6):629–638
Lavoué G, Denis F, Dupont F (2007) Subdivision surface watermarking. Comput Graph-UK 31(3):480–492
Lee JJ, Cho NI, Lee SU (2004) Watermarking algorithms for 3D NURBS graphic data. EURASIP J Appl Sig P 2004(14):2142–2152
Lee SH, Kwon KR (2010) CAD drawing watermarking scheme. Digital Signal Process 20(5):1379–1399
Lee SH, Kwon KR (2012) Robust 3D mesh model hashing based on feature object. Digital Signal Process 22(5):744–759
Li J, Liu HM, Huang JW, Shi YQ (2012) Reference index-based H.264 video watermarking scheme. ACM Trans Multimed Comput 8(2s):33:1–33:22
Mooney A, Keating JG, Heffernan DM (2006) A detailed study of the generation of optically detectable watermarks using the logistic map. Chaos, Soliton Fractals 30(5):1088–1097
Ohbuchi R, Masuda H (2000) Managing CAD data as a multimedia data type using digital watermarking. In: Proceedings of the IFIP TC5 WG5.2 fourth workshop on knowledge intensive CAD to knowledge intensive engineering, Parma, Italy, pp 103–116
Ohbuchi R, Masuda H, Aono M (1999) A shape-preserving data embedding algorithm for NURBS curves and surfaces. In: Proceedings of the computer graphics international, Alberta, Canada, pp 180–187
Peng F, Guo RS, Li CT, Long M (2010) A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation. Comput Aided Des 42(12):1207–1216
Peng F, Lei YZ, Long M, Sun XM (2011) A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion. Comput Aided Des 43(8):1018–1024
Singh J, Garg P, De A (2012) Multiplicative watermarking of audio in DFT magnitude. Multimed Tools Appl 61(2):1–23
Su ZY, Li WQ, Kong JS, Dai YW, Tang WQ (2013) Watermarking 3d capd models for topology verification. Comput Aided Des 45(7):1042–1052
Su ZY, Zhou L, Li WQ, Dai YW, Tang WQ (2013) Topology authentication for capd models based on laplacian coordinates. Comput Graph-UK 37(4):269–279
Wang K, Lavoué G, Denis F, Baskurt A (2008) A comprehensive survey on three-dimensional mesh watermarking. IEEE Trans Multimedia 10(8):1513–1527
Wang K, Lavoué G, Denis F, Baskurt A (2011) Robust and blind mesh watermarking based on volume moments. Comput Graph-UK 35(1):1–19
Acknowledgements
This work is supported in part by the National Natural Science Foundation of China (NO.61170250, NO.61103201). The models used in this paper are the courtesy of Beijing Zhongke Fulong Computer Technology Co., Ltd. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Su, Z., Zhou, L., Liu, G. et al. Authenticating topological integrity of process plant models through digital watermarking. Multimed Tools Appl 73, 1687–1707 (2014). https://doi.org/10.1007/s11042-013-1677-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1677-4