A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation
نویسندگان
چکیده
A semi-fragile watermarking algorithm for authenticating 2D engineering graphics based on log-polar coordinates mapping is proposed. Firstly, the coordinates of vertices of entities are mapped to the log-polar coordinate system to obtain the invariance of translation, scaling and rotation. Then the watermark is embedded in the mantissa of the real-valued log-polar coordinates via bit substitution. Theoretical analysis and experimental results show that the proposed algorithm is not only robust against incidental operations such as rotation, translation and scaling, but can also detect and locate malicious attacks such as entity modification, entity addition/deletion.
منابع مشابه
Perceptible Content Retrieval in DCT Domain and Semi-Fragile Watermarking Technique for Perceptible Content Authentication
Digital watermarking was commenced to copyright protection and ownership verification of multimedia data. However the evolution of the watermark focused on different security aspects of multimedia data such as integrity and authenticity. Fragile and semi-fragile watermarking schemes were introduced to accomplish these requirements. In this paper, we propose semi-fragile watermarking scheme to a...
متن کاملVisual Tracking using Kernel Projected Measurement and Log-Polar Transformation
Visual Servoing is generally contained of control and feature tracking. Study of previous methods shows that no attempt has been made to optimize these two parts together. In kernel based visual servoing method, the main objective is to combine and optimize these two parts together and to make an entire control loop. This main target is accomplished by using Lyapanov theory. A Lyapanov candidat...
متن کاملDual Domain Semi-fragile Watermarking for Image Authentication
Techniques to establish the authenticity and integrity of digital images are becoming increasingly essential for secure transacting. Ideally, the authentication algorithm should distinguish incidental integrity maintaining distortions such as lossy compression from malicious manipulations. This has motivated research into semi-fragile watermarking. A novel watermarking algorithm is proposed in ...
متن کاملFRAGILE and SEMI - FRAGILE WATERMARKING TECHNIQUES for IMAGE AUTHENTICATION
Techniques to establish the authenticity and integrity of digital images are becoming increasly essential over the Intermet. The authentication algorithm should distinguish malicious manipulations from the original watermarked image[1]. Fragile watermarking is recomended for a very sensible image authentication scheme, able to localize the slightest changes occured to the marked image. The frag...
متن کاملA Genetic Algorithm based Optimization Method in 3D Solid Reconstruction from 2D Multi-View Engineering Drawings
There are mainly two categories for a 3D reconstruction from 2D drawings: B-Rep and CSG that both these methods have serious weaknesses despite being useful. B-Rep method which has been older and have wider function range is problematic because of high volume of calculations and vagueness in answers and CSG method has problem in terms of very limited range of volumes and drawings that it can an...
متن کامل