Peng et al., 2020 - Google Patents
A semi-fragile reversible watermarking for authenticating 2D engineering graphics based on improved region nestingPeng et al., 2020
- Document ID
- 4427947554817545396
- Author
- Peng F
- Lin Z
- Zhang X
- Long M
- Publication year
- Publication venue
- IEEE Transactions on Circuits and Systems for Video Technology
External Links
Snippet
To achieve high tampering localization precision and low distortion, a semi-fragile reversible watermarking for authenticating 2D engineering graphics is proposed based on an improved region nesting and a novel watermark generation. First, an intensive investigation …
- 230000002441 reversible 0 title abstract description 41
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T17/00—Three dimensional [3D] modelling, e.g. data description of 3D objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Peng et al. | A semi-fragile reversible watermarking for authenticating 2D engineering graphics based on improved region nesting | |
| Abubahia et al. | Advancements in GIS map copyright protection schemes-a critical review | |
| Wang et al. | Reversible fragile watermarking for 2-D vector map authentication with localization | |
| Wang et al. | Reversible fragile watermarking for locating tampered blocks in 2D vector maps | |
| Peng et al. | A general region nesting-based semi-fragile reversible watermarking for authenticating 3D mesh models | |
| Su et al. | Watermarking 3D CAPD models for topology verification | |
| US11983789B1 (en) | Generation method, detection method, generation device, and detection device of zero watermarking for trajectory data, and storage medium | |
| Lin et al. | A reversible watermarking for authenticating 2D vector graphics based on bionic spider web | |
| CN112446814B (en) | A Fragile Watermarking Method for Vector Map Data to Locate and Tamper Entity Groups | |
| Liu et al. | A zero-watermarking scheme with embedding timestamp in vector maps for Big Data computing | |
| Peng et al. | A semi-fragile reversible watermarking for authenticating 3D models based on virtual polygon projection and double modulation strategy | |
| Peng et al. | A semi-fragile watermarking algorithm for authenticating 2D CAD engineering graphics based on log-polar transformation | |
| Wang et al. | RST invariant fragile watermarking for 2D vector map authentication | |
| Chou et al. | Affine-transformation-invariant public fragile watermarking for 3D model authentication | |
| Peng et al. | A reversible watermarking for 2D vector map based on triple differences expansion and reversible contrast mapping | |
| CN106599727B (en) | A Vector Map Integrity Authentication Method | |
| Molaei et al. | A blind fragile watermarking method for 3D models based on geometric properties of triangles | |
| Chou et al. | Technologies for 3d model watermarking: A survey | |
| CN103377320A (en) | Method for selective certification of vector geographic data semi-fragile watermarking | |
| Wang et al. | 2D vector map fragile watermarking with region location | |
| Peng et al. | A reversible watermarking for 2D engineering graphics based on difference expansion with adaptive interval partitioning | |
| Hu et al. | A dual watermarking algorithm for trajectory data based on robust watermarking and fragile watermarking | |
| Borah et al. | Watermarking techniques for three dimensional (3D) mesh authentication in spatial domain | |
| Tsai et al. | A Low‐Complexity Region‐Based Authentication Algorithm for 3D Polygonal Models | |
| Mabrouk et al. | Fragile watermarking techniques for 3d model authentication |