Information Security and Digital Forensics. First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers

Research Article

A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation

Download
518 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11530-1_2,
        author={Fei Peng and Re-Si Guo and Chang-Tsun Li and Min Long},
        title={A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation},
        proceedings={Information Security and Digital Forensics. First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers},
        proceedings_a={ISDF},
        year={2012},
        month={5},
        keywords={semi-fragile watermarking integrity verification data hiding content authentication engineering graphics},
        doi={10.1007/978-3-642-11530-1_2}
    }
    
  • Fei Peng
    Re-Si Guo
    Chang-Tsun Li
    Min Long
    Year: 2012
    A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation
    ISDF
    Springer
    DOI: 10.1007/978-3-642-11530-1_2
Fei Peng1,*, Re-Si Guo1,*, Chang-Tsun Li2,*, Min Long3,*
  • 1: Hunan University
  • 2: University of Warwick
  • 3: Changsha University of Science, and Technology
*Contact email: pengfei@hnu.cn, hnu_grs@163.com, c-t.li@warwick.ac.uk, longm@tom.com

Abstract

A semi-fragile watermarking algorithm for authenticating 2D engineering graphics based on log-polar coordinates mapping is proposed. Firstly, the coordinates of vertices of entities are mapped to the log-polar coordinate system to obtain the invariance of translation, scaling and rotation. Then the watermark is embedded in the mantissa of the real-valued log-polar coordinates via bit substitution. Theoretical analysis and experimental results show that the proposed algorithm is not only robust against incidental operations such as rotation, translation and scaling, but can also detect and locate malicious attacks such as entity modification, entity addition/deletion.