Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors

This paper investigates the joint authentication of topology and geometry information of 2D engineering computer-aided design graphics, which focus more on topological modeling than geometric modeling of objects. A robust hashing scheme is proposed for joint topology and geometry authentication. The covariance matrices of descriptors are explored to fuse and encode both topology and geometry features of different types into a compact representation. First, a normalized binary shape texture is rendered for each geometric object through the render-to-texture technique. Then, for each geometric object, geometry features are computed based on statistical features that are extracted from image rings. Additionally, topology features are generated according to the topological relations among joint objects. To generate hash codes of the graphic, all geometric objects are first grouped according to their geometry features. Then, for each group, the covariance matrices of descriptors are applied to fuse both the topology and geometry features of all objects, and the intermediate hash codes of each group are computed based on the covariance matrices. The final hash sequence is formed by concatenating the intermediate hash codes that correspond to each group. Secret keys are introduced into both feature extraction and hash construction. The hashes are robust against topology-preserving graphic manipulations and sensitive to malicious attacks. By decomposing the hashes, the locations of tampered objects can be determined. Experimental results are presented to evaluate the performance and show the effectiveness of the method.

[1]  R. Gray,et al.  Vector quantization , 1984, IEEE ASSP Magazine.

[2]  Shichao Zhang,et al.  Robust Image Hashing With Ring Partition and Invariant Vector Distance , 2016, IEEE Transactions on Information Forensics and Security.

[3]  Jianru Xue,et al.  A Visual Model-Based Perceptual Image Hash for Content Authentication , 2015, IEEE Transactions on Information Forensics and Security.

[4]  Zhiyong Su,et al.  A unified framework for authenticating topology integrity of 2D heterogeneous engineering CAD drawings , 2017, Multimedia Tools and Applications.

[5]  Weiming Shen,et al.  Systems integration and collaboration in architecture, engineering, construction, and facilities management: A review , 2010, Adv. Eng. Informatics.

[6]  Pol Cirujeda,et al.  A 3D Scene Registration Method via Covariance Descriptors and an Evolutionary Stable Strategy Game Theory Solver , 2015, International Journal of Computer Vision.

[7]  Fatih Murat Porikli,et al.  Region Covariance: A Fast Descriptor for Detection and Classification , 2006, ECCV.

[8]  Liujuan Cao,et al.  Nonlinear scrambling-based reversible watermarking for 2D-vector maps , 2012, The Visual Computer.

[9]  Asifullah Khan,et al.  A recent survey of reversible watermarking techniques , 2014, Inf. Sci..

[10]  R.G. Baraniuk,et al.  Compressive Sensing [Lecture Notes] , 2007, IEEE Signal Processing Magazine.

[11]  Atilla Baskurt,et al.  A Comprehensive Survey on Three-Dimensional Mesh Watermarking , 2008, IEEE Transactions on Multimedia.

[12]  A. Ben Hamza,et al.  Information-theoretic hashing of 3D objects using spectral graph theory , 2009, Expert Syst. Appl..

[13]  Di Xiao,et al.  A high capacity combined reversible watermarking scheme for 2-D CAD engineering graphics , 2013, Multimedia Tools and Applications.

[14]  Hiroshi Masuda,et al.  8. Managing CAD Data as a Multimedia Data Type Using Digital Watermarking , 2000, Knowledge Intensive CAD.

[15]  Zhenjun Tang,et al.  Robust image hashing using ring-based entropies , 2013, Signal Process..

[16]  Hamid Laga,et al.  Covariance-Based Descriptors for Efficient 3D Shape Matching, Retrieval, and Classification , 2015, IEEE Transactions on Multimedia.

[17]  Ki-Ryong Kwon,et al.  CAD drawing watermarking scheme , 2010, Digit. Signal Process..

[18]  Ki-Ryong Kwon,et al.  Polyline curvatures based robust vector data hashing , 2013, Multimedia Tools and Applications.

[19]  Zhiyong Su,et al.  Topology authentication for piping isometric drawings , 2015, Comput. Aided Des..

[20]  Michael Lederhose,et al.  CAPD - computer-aided plant design , 2004, Comput. Chem. Eng..

[21]  Xinpeng Zhang,et al.  Robust Hashing for Image Authentication Using Zernike Moments and Local Features , 2013, IEEE Transactions on Information Forensics and Security.

[22]  Chi-Man Pun,et al.  Multi-scale image hashing using adaptive local feature extraction for robust tampering detection , 2016, Signal Process..

[23]  Robert M. Gray,et al.  An Algorithm for Vector Quantizer Design , 1980, IEEE Trans. Commun..

[24]  Ross E. Swaney,et al.  Optimization of process plant layout with pipe routing , 2005, Comput. Chem. Eng..

[25]  Andrea Sanna,et al.  Public key watermarking for authentication of CSG models , 2000, Comput. Aided Des..

[26]  Tom Davis,et al.  Opengl programming guide: the official guide to learning opengl , 1993 .

[27]  Richard G. Baraniuk,et al.  Compressive Sensing , 2008, Computer Vision, A Reference Guide.

[28]  Fei Peng,et al.  Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting , 2014, Comput. Aided Des..

[29]  Ki-Ryong Kwon,et al.  Robust Hashing of Vector Data Using Generalized Curvatures of Polyline , 2013, IEICE Trans. Inf. Syst..