A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
Introduction
With the explosive growth of the internet and the development of digital design and processing, many traditional materials can be represented in digital forms for exhibition and can be accessed via internets. However, copyright violation and illegal manipulation of multimedia are also becoming serious problems in cyberspace. Traditional cryptographic systems can protect the information to a certain degree, but it still has some drawbacks [1]. On the other hand, watermarking has been viewed as an efficient solution to protect the copyright and the integrity of digital data, and thus has been paid significant attention in recent years [2], [3].
The functions of semi-fragile watermarking are similar to those of the digital signatures used in cryptosystems [4], [5]. However, for many multimedia applications, semi-fragile watermarking is superior to digital signatures because of the following two main reasons [4]. (1) Apart from verifying content integrity, semi-fragile watermarking systems can also locate tampering while cryptosystems cannot. (2) Cryptosystems provide no protection to the media after the media is decrypted while the digital watermark becomes part of the content of the media at all times after embedding, thus providing protection at all times.
Since the publication of the first paper on watermarking for 3D models by Ohbuchi et al. [6], many watermarking schemes [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], [18], [19], [20] have been proposed to serve a similar purpose, but little work has been done in watermarking for 2D vector graphics, which are commonly used in geographical information systems (GIS) and computer aided design (CAD). However, with the rapid development of CAD collaborative design techniques, engineers can design various parts of a product at different locations or on different systems, and transfer them to one location or system for final incorporation at a later stage. As these CAD files (such as DWG and DXF files) are usually transferred via insecure networks, how to protect their integrity is a serious issue to be addressed. Therefore, it is our intention in this work to propose a semi-fragile watermarking scheme for verifying the integrity of 2D vector graphics.
The remainder of this paper is organized as follows. Related work is presented in Section 2. In Section 3, the watermarking algorithm is described in detail. In Section 4, the capabilities of this algorithm are discussed. The analyses of experimental results and performance are conducted in Section 5. Finally, Section 6 concludes the work.
Section snippets
Watermarking for 3D models
Ohbuchi proposed a few classic schemes for 3D models in [6], [7]. These methods generally embed data by modifying the topology or adding new vertices. The original 3D model is not needed for watermark extraction and these methods are robust against affine transformation. However, they cannot resist attacks such as randomization of coordinates, re-meshing, smoothing, and simplification operations. Yu proposed a robust watermarking for 3D polygonal models based on vertex scrambling [8]. In order
2D CAD engineering graphics
Engineering graphics play an important role in design and manufacturing. A 2D CAD engineering graphic is a vector graphic composed of entities such as points, lines, arcs, polygons, circles, elliptic circles, etc, and the vertex is a basic element of the entities. Every entity also has its own properties such as handle value, colour, line type, etc. The characteristics of 2D CAD engineering graphics are as follows [30]:
- •
The data of 2D CAD engineering graphics include geometry and topology
Analysis of the watermarking algorithm
The proposed algorithm can detect some malicious attacks on 2D CAD engineering graphics. The attacks include modification and entity addition/deletion. It is robust against some general operations such as translation, rotation and scaling.
Experimental results
The experiments explained in this section are carried out on a PC with CPU P4 2.2 GHz, RAM 1 GB, WinXP Professional, AutoCAD 2006 and Visual C++6.0. Fifty different 2D CAD engineering graphics are used in the experiments. Fig. 3 illustrates one of them. Taking Fig. 3 as an example, the corresponding watermarked version generated with the proposed watermark embedding method is shown in Fig. 4. Comparing these two figures, we can see that the proposed watermark embedding algorithm meets the
Conclusions
In this paper, we have proposed a semi-fragile watermarking algorithm for verifying the content integrity of 2D CAD engineering graphics. The principle of the proposed watermarking algorithm cannot only be applicable to 2D graphics in DXF and DWG formats, but also to other kinds of 2D vector graphics, with a slight change to the grouping and the watermark generation methods according to the specifics of the formats. As the watermark is generated by hashing the content of the graphics and
Acknowledgements
The work is supported by the Fundamental Research Funds for the Central Universities of Hunan University.
References (32)
- et al.
Data embedding algorithms for geometrical and non-geometrical targets in three-dimensional polygonal models
Computer Communications
(1998) - et al.
Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry
Signal Processing
(2003) - et al.
Public key watermarking for authentication of CSG models
Computer-Aided Design
(2000) - et al.
A numerically stable fragile watermarking scheme for authenticating 3D models
Computer-Aided Design
(2008) - et al.
Digital watermarking and steganography
(2008) - et al.
A contrast-sensitive reversible visible image watermarking technique
IEEE Transactions on Circuits and Systems for Video Technology
(2009) - et al.
Reversible and blind database watermarking using difference expansion
International Journal of Digital Crime and Forensics
(2009) - et al.
Wavelet-based fragile watermarking scheme for image authentication
Journal of Electronic Imaging
(2007) - et al.
Image forensics using generalised Benford’s law for improving image authentication detection rates in semi-fragile watermarking
International Journal of Digital Crime and Forensics
(2010) - et al.
Watermarking three-dimensional polygonal models through geometric and topological modifications
IEEE Journal on Selected Areas in Communication
(1998)