首页 | 本学科首页   官方微博 | 高级检索  
     


Topology authentication for piping isometric drawings
Affiliation:1. School of Automation, Nanjing University of Science and Technology, Nanjing, PR China;2. Institute of Food Crops, Jiangsu Academy of Agricultural Sciences, Nanjing, PR China;3. School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, PR China;4. Institute of Computing Technology, Chinese Academy of Sciences, Beijing, Nanjing, PR China;1. Department of Mechanical Engineering,PG Scholar, Vardhaman College of Engineering,., India;2. Department of Mechanical Engineering, Associate Professor, Vardhaman College of Engineering, India;3. Department of Mechanical Engineering, Associate Professor, Narsimha Reddy Engineering College, India;1. Texas A&M University, College Station, TX, United States;2. Universitat Politècnica de València, Valencia, Spain;3. Universitat Jaume I, Castellón, Spain
Abstract:Piping isometric drawings, which feature their intrinsical topological relation rather than just geometrical shape, are important industrial art works in the field of Computer-Aided Design (CAD). This paper takes a fresh look at the topology integrity authentication of piping isometric drawings, which has not been mentioned before in the literature, from the digital watermarking perspective. A blind and semi-fragile watermarking based algorithm is proposed to address the referred interesting issue. The topology authentication problem of piping isometric drawings is investigated. In addition to the stretching operation, both global and local similarity transformation operations, which are critical problems in the case of watermarking embedding and extraction, are analyzed in detail. The topological graph is extracted and constructed from the drawing firstly. Then, similarity transformation invariants are constructed as watermarks carriers for each node. After that, the topological relation among joint components is encoded into singular watermarks for each node of the graph. These generated topology sensitive watermarks are embedded into geometrical invariants of each node via quantization index modulation. Theoretical analysis and experimental results demonstrate that our approach yields a strong ability in detecting and locating unauthorized topology attacks while achieves robustness against both global and local similarity transformations especially the stretching operation. The proposed scheme can be employed to authenticate topology integrity for each of the drawings derived from the model individually in industry practices.
Keywords:Topology authentication  Topology integrity  Local similarity transformations  Product and manufacturing information (PMI)  Watermarking  Piping isometric drawing
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号