[go: up one dir, main page]

Peng et al., 2020 - Google Patents

A semi-fragile reversible watermarking for authenticating 2D engineering graphics based on improved region nesting

Peng et al., 2020

Document ID
4427947554817545396
Author
Peng F
Lin Z
Zhang X
Long M
Publication year
Publication venue
IEEE Transactions on Circuits and Systems for Video Technology

External Links

Snippet

To achieve high tampering localization precision and low distortion, a semi-fragile reversible watermarking for authenticating 2D engineering graphics is proposed based on an improved region nesting and a novel watermark generation. First, an intensive investigation …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Similar Documents

Publication Publication Date Title
Peng et al. A semi-fragile reversible watermarking for authenticating 2D engineering graphics based on improved region nesting
Abubahia et al. Advancements in GIS map copyright protection schemes-a critical review
Wang et al. Reversible fragile watermarking for 2-D vector map authentication with localization
Wang et al. Reversible fragile watermarking for locating tampered blocks in 2D vector maps
Peng et al. A general region nesting-based semi-fragile reversible watermarking for authenticating 3D mesh models
Su et al. Watermarking 3D CAPD models for topology verification
US11983789B1 (en) Generation method, detection method, generation device, and detection device of zero watermarking for trajectory data, and storage medium
Lin et al. A reversible watermarking for authenticating 2D vector graphics based on bionic spider web
CN112446814B (en) A Fragile Watermarking Method for Vector Map Data to Locate and Tamper Entity Groups
Liu et al. A zero-watermarking scheme with embedding timestamp in vector maps for Big Data computing
Peng et al. A semi-fragile reversible watermarking for authenticating 3D models based on virtual polygon projection and double modulation strategy
Peng et al. A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation
Wang et al. RST invariant fragile watermarking for 2D vector map authentication
Chou et al. Affine-transformation-invariant public fragile watermarking for 3D model authentication
Peng et al. A reversible watermarking for 2D vector map based on triple differences expansion and reversible contrast mapping
CN106599727B (en) A Vector Map Integrity Authentication Method
Molaei et al. A blind fragile watermarking method for 3D models based on geometric properties of triangles
Chou et al. Technologies for 3d model watermarking: A survey
CN103377320A (en) Method for selective certification of vector geographic data semi-fragile watermarking
Wang et al. 2D vector map fragile watermarking with region location
Peng et al. A reversible watermarking for 2D engineering graphics based on difference expansion with adaptive interval partitioning
Hu et al. A dual watermarking algorithm for trajectory data based on robust watermarking and fragile watermarking
Borah et al. Watermarking techniques for three dimensional (3D) mesh authentication in spatial domain
Tsai et al. A Low‐Complexity Region‐Based Authentication Algorithm for 3D Polygonal Models
Mabrouk et al. Fragile watermarking techniques for 3d model authentication