A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation

A semi-fragile watermarking algorithm for authenticating 2D engineering graphics based on log-polar coordinates mapping is proposed. Firstly, the coordinates of vertices of entities are mapped to the log-polar coordinate system to obtain the invariance of translation, scaling and rotation. Then the watermark is embedded in the mantissa of the real-valued log-polar coordinates via bit substitution. Theoretical analysis and experimental results show that the proposed algorithm is not only robust against incidental operations such as rotation, translation and scaling, but can also detect and locate malicious attacks such as entity modification, entity addition/deletion.

[1]  Gaurav Gupta,et al.  Reversible and blind database watermarking using difference expansion , 2008, e-Forensics '08.

[2]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[3]  Hao-Tian Wu,et al.  A fragile watermarking scheme for 3D meshes , 2005, MM&Sec '05.

[4]  Fei Peng,et al.  A Capacity Variable Watermarking Algorithm for 2D Engineering Graphic Based on Complex Number System , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[5]  Xingming Sun,et al.  A Contrast-Sensitive Reversible Visible Image Watermarking Technique , 2009, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Z. Tianxu An Robust Object Locating Method Based on Log-polar Transform and Affine Transform , 2006 .

[7]  Ioannis Pitas,et al.  Watermarking Polygonal Lines Using Fourier Descriptors , 2004, IEEE Computer Graphics and Applications.

[8]  Din-Chang Tseng,et al.  A public fragile watermarking scheme for 3D model authentication , 2006, Comput. Aided Des..

[9]  Chang-Tsun Li,et al.  Wavelet-based fragile watermarking scheme for image authentication , 2007, J. Electronic Imaging.

[10]  Jun-Hai Yong,et al.  A numerically stable fragile watermarking scheme for authenticating 3D models , 2008, Comput. Aided Des..

[11]  Min Wu,et al.  Data hiding in curves with application to fingerprinting maps , 2005 .

[12]  Hiroshi Masuda,et al.  Watermaking three-dimensional polygonal models , 1997, MULTIMEDIA '97.