کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
441806 691946 2013 11 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Topology authentication for CAPD models based on Laplacian coordinates
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر گرافیک کامپیوتری و طراحی به کمک کامپیوتر
پیش نمایش صفحه اول مقاله
Topology authentication for CAPD models based on Laplacian coordinates
چکیده انگلیسی

Topology authentication for computer-aided plant design (CAPD) models features intrinsically complex topological relations. This study investigates a semi-fragile watermarking scheme for CAPD models represented by parametric solids, which offers a solution to the problem of topology authentication. We first analyze the geometrical and topological structures of CAPD models. Then, we propose an effective semi-fragile watermarking method for topology authentication, which is based on Laplacian coordinates and quantization index modulation (QIM), against several attacks. We compute the custom Laplacian coordinate vector for each marked connection point according to the topological relation among joint plant components. The topology-based watermark for each marked connection point is generated from selected attributes of its joint plant component. Watermarks are inserted into the coordinates of marked connection points by adjusting the lengths of their Laplacian coordinate vectors. Both experimental results and theoretical analysis demonstrate that our approach can not only detect and locate malicious topology attacks, such as component modification and joint ends modification, but is also robust against various non-malicious attacks, such as similarity transformations and level-of-detail (LOD).

Figure optionsDownload high-quality image (213 K)Download as PowerPoint slideHighlights
► We propose a watermarking scheme for topology authentication of CAPD models.
► Topological information among plant components is exploited to generate watermarks.
► Watermark bits are embedded into a subset of the model's connection points.
► The scheme is semi-fragile and blind.
► It is robust against similarity transformations and simplification.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computers & Graphics - Volume 37, Issue 4, June 2013, Pages 269–279
نویسندگان
, , , , ,