Technical Section: Topology authentication for CAPD models based on Laplacian coordinates

  • Authors:
  • Zhiyong Su;Lang Zhou;Weiqing Li;Yuewei Dai;Weiqing Tang

  • Affiliations:
  • School of Automation, Nanjing University of Science and Technology, Nanjing 210094, China;School of Information Engineering, Nanjing University of Finance and Economics, Nanjing 210046, China;School of Computer Science, Nanjing University of Science and Technology, Nanjing 210094, China;School of Automation, Nanjing University of Science and Technology, Nanjing 210094, China;Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China and Beijing Zhongke Fulong Computer Technology Co., Ltd., Beijing 100085, China

  • Venue:
  • Computers and Graphics
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Topology authentication for computer-aided plant design (CAPD) models features intrinsically complex topological relations. This study investigates a semi-fragile watermarking scheme for CAPD models represented by parametric solids, which offers a solution to the problem of topology authentication. We first analyze the geometrical and topological structures of CAPD models. Then, we propose an effective semi-fragile watermarking method for topology authentication, which is based on Laplacian coordinates and quantization index modulation (QIM), against several attacks. We compute the custom Laplacian coordinate vector for each marked connection point according to the topological relation among joint plant components. The topology-based watermark for each marked connection point is generated from selected attributes of its joint plant component. Watermarks are inserted into the coordinates of marked connection points by adjusting the lengths of their Laplacian coordinate vectors. Both experimental results and theoretical analysis demonstrate that our approach can not only detect and locate malicious topology attacks, such as component modification and joint ends modification, but is also robust against various non-malicious attacks, such as similarity transformations and level-of-detail (LOD).