Topology authentication for piping isometric drawings

Piping isometric drawings, which feature their intrinsical topological relation rather than just geometrical shape, are important industrial art works in the field of Computer-Aided Design (CAD). This paper takes a fresh look at the topology integrity authentication of piping isometric drawings, which has not been mentioned before in the literature, from the digital watermarking perspective. A blind and semi-fragile watermarking based algorithm is proposed to address the referred interesting issue. The topology authentication problem of piping isometric drawings is investigated. In addition to the stretching operation, both global and local similarity transformation operations, which are critical problems in the case of watermarking embedding and extraction, are analyzed in detail. The topological graph is extracted and constructed from the drawing firstly. Then, similarity transformation invariants are constructed as watermarks carriers for each node. After that, the topological relation among joint components is encoded into singular watermarks for each node of the graph. These generated topology sensitive watermarks are embedded into geometrical invariants of each node via quantization index modulation. Theoretical analysis and experimental results demonstrate that our approach yields a strong ability in detecting and locating unauthorized topology attacks while achieves robustness against both global and local similarity transformations especially the stretching operation. The proposed scheme can be employed to authenticate topology integrity for each of the drawings derived from the model individually in industry practices. The topology authentication problem of piping isometric drawings is addressed.A semi-fragile watermarking scheme for the topology authentication is proposed.The proposed scheme is robust against local similarity transformations.The proposed scheme is invariant to the stretching operation on pipes.The proposed scheme provides good tamper localization accuracy.

[1]  Ki-Ryong Kwon,et al.  A New Digital Watermarking for Architectural Design Drawing Using LINEs and ARCs Based on Vertex , 2003, IWDW.

[2]  Zhiyong Peng,et al.  Watermarking 2D Vector Maps on Spatial Topology Domain , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[3]  Ki-Ryong Kwon,et al.  Copyright protection of architectural CAD drawing using the multiple watermarking scheme , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[4]  Ki-Ryong Kwon,et al.  Watermarking for 3D CAD Drawings Based on Three Components , 2006, SSPR/SPR.

[5]  Hiroshi Masuda,et al.  8. Managing CAD Data as a Multimedia Data Type Using Digital Watermarking , 2000, Knowledge Intensive CAD.

[6]  Din-Chang Tseng,et al.  Affine-Transformation-Invariant Public Fragile Watermarking for 3D Model Authentication , 2009, IEEE Computer Graphics and Applications.

[7]  Nam Ik Cho,et al.  Watermarking Algorithms for 3D NURBS Graphic Data , 2004, EURASIP J. Adv. Signal Process..

[8]  Deepa Kundur,et al.  Analysis and design of secure watermark-based authentication systems , 2006, IEEE Transactions on Information Forensics and Security.

[9]  Daniel P. Huttenlocher,et al.  Fast affine point matching: an output-sensitive method , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[10]  Ross E. Swaney,et al.  Optimization of process plant layout with pipe routing , 2005, Comput. Chem. Eng..

[11]  Nana Wang,et al.  Reversible fragile watermarking for 2-D vector map authentication with localization , 2012, Comput. Aided Des..

[12]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[13]  Daniel R. Fuhrmann,et al.  Sampling theorems for linear time-varying systems with bandlimited inputs , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[14]  Ki-Ryong Kwon,et al.  3D CAD Drawing Watermarking Based on Three Components , 2006, 2006 International Conference on Image Processing.

[15]  Ki-Ryong Kwon,et al.  CAD drawing watermarking scheme , 2010, Digit. Signal Process..

[16]  Jun-Hai Yong,et al.  A numerically stable fragile watermarking scheme for authenticating 3D models , 2008, Comput. Aided Des..

[17]  Hao-Tian Wu,et al.  Reversible Watermarking by Modulation and Security Enhancement , 2010, IEEE Transactions on Instrumentation and Measurement.

[18]  Michael Lederhose,et al.  CAPD - computer-aided plant design , 2004, Comput. Chem. Eng..

[19]  Rui Yang,et al.  Geometric Invariant Audio Watermarking Based on an LCM Feature , 2011, IEEE Transactions on Multimedia.

[20]  Hao-Tian Wu,et al.  A Sequential Quantization Strategy for Data Embedding and Integrity Verification , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Caiming Zhang,et al.  A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models , 2012, TOMCCAP.

[22]  Zhiyong Su,et al.  Watermarking 3D CAPD models for topology verification , 2013, Comput. Aided Des..

[23]  Koichi Harada Parity enhanced topology based spot area watermarking method for copyright protection of layered 3D triangular mesh data , 2006 .

[24]  Ralf Steinmetz Editorial note and call for nominations: Nicolas D. Georganas best paper award , 2012, TOMCCAP.

[25]  William Puech,et al.  Topological synchronization mechanism for robust watermarking on 3D semi-regular meshes , 2011, 2011 IEEE International Conference on Multimedia and Expo.

[26]  Zhiyong Su,et al.  Authenticating topological integrity of process plant models through digital watermarking , 2013, Multimedia Tools and Applications.

[27]  Zhiyong Su,et al.  Topology authentication for CAPD models based on Laplacian coordinates , 2013, Comput. Graph..

[28]  Y.-L. Chen,et al.  Detecting Recompression of JPEG Images via Periodicity Analysis of Compression Artifacts for Tampering Detection , 2011, IEEE Transactions on Information Forensics and Security.

[29]  Xin Li,et al.  Hardware Implementation of a Digital Watermarking System for Video Authentication , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[30]  Fei Peng,et al.  A reversible watermarking scheme for two-dimensional CAD engineering graphics based on improved difference expansion , 2011, Comput. Aided Des..

[31]  Hiroshi Masuda,et al.  A shape-preserving data embedding algorithm for NURBS curves and surfaces , 1999, 1999 Proceedings Computer Graphics International.

[32]  Fei Peng,et al.  A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation , 2010, Comput. Aided Des..