{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:40:45Z","timestamp":1654112445188},"reference-count":19,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7,1]]},"abstract":"<p>A semi-fragile reversible watermarking algorithm for 2D CAD engineering graphics with accurate tampering localization is proposed. Firstly, all vertices in the 2D CAD engineering graphics are extracted and partitioned into groups. After that, the relative distance of these vertices are calculated, and the assigned group number is used as watermark. Finally, the watermark is embedded into the factor of relative distance by using an improved difference expansion. Experimental results and analysis show that the proposed algorithm can obtain a large capacity, good invisibility, and robust against translation, rotation, and uniform scaling. At the same time, it can detect malicious attacks such as entity modification, addition and deletion, and can locate the tampering areas with a high precision. As for the watermarked 2D CAD engineering graphics passing authentication, the original 2D CAD engineering graphics can be completely recovered. It has great potential in the application of integrity protection and content authentication of 2D CAD engineering graphics.<\/p>","DOI":"10.4018\/ijdcf.2015070101","type":"journal-article","created":{"date-parts":[[2015,7,23]],"date-time":"2015-07-23T13:44:36Z","timestamp":1437659076000},"page":"1-18","source":"Crossref","is-referenced-by-count":1,"title":["A Semi-Fragile Reversible Watermarking for 2D CAD Engineering Graphics with Accurate Tampering Localization"],"prefix":"10.4018","volume":"7","author":[{"given":"Min","family":"Long","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha, China"}]},{"given":"Yan","family":"Liu","sequence":"additional","affiliation":[{"name":"Hunan University, Changsha, China"}]},{"given":"Fei","family":"Peng","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Hunan University, Changsha, China"}]}],"member":"2432","reference":[{"key":"ijdcf.2015070101-0","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-012-0732-x"},{"key":"ijdcf.2015070101-1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652535"},{"issue":"10","key":"ijdcf.2015070101-2","first-page":"2096","article-title":"Semi-fragile watermarking algorithm for 2D engineering graphics based on improved odd-even quantization","volume":"31","author":"R.Guo","year":"2010","journal-title":"Journal of Chinese Computer Systems"},{"issue":"2","key":"ijdcf.2015070101-3","first-page":"372","article-title":"Reversible watermarking algorithm based on difference expansion for 2D engineering drawings","volume":"15","author":"L.Li","year":"2010","journal-title":"Journal of Image and Graphics"},{"issue":"1","key":"ijdcf.2015070101-4","first-page":"79","article-title":"An information hiding algorithm for two-dimensional engineering graphics Based on Chaotic Grouping","volume":"37","author":"M.Long","year":"2009","journal-title":"Tien Tzu Hsueh Pao"},{"key":"ijdcf.2015070101-5","doi-asserted-by":"publisher","DOI":"10.1109\/ICMA.2010.5589062"},{"key":"ijdcf.2015070101-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2010.08.004"},{"key":"ijdcf.2015070101-7","doi-asserted-by":"publisher","DOI":"10.4018\/jdcf.2011010104"},{"issue":"7","key":"ijdcf.2015070101-8","first-page":"1134","article-title":"Reversible watermarking algorithm in wavelet domain for 2D CAD engineering graphics","volume":"16","author":"F.Peng","year":"2011","journal-title":"Journal of Image and Graphics"},{"key":"ijdcf.2015070101-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2011.03.011"},{"key":"ijdcf.2015070101-10","first-page":"326","article-title":"Security issues of vector maps and a reversible authentication scheme","author":"C. Y.Shao","year":"2005","journal-title":"Proceedings of 2005 national doctoral forum (Transportation Engineering)"},{"issue":"2","key":"ijdcf.2015070101-11","first-page":"206","article-title":"Study on lossless data hiding algorithm for digital vector maps","volume":"12","author":"C. Y.Shao","year":"2007","journal-title":"Journal of Image and Graphics"},{"key":"ijdcf.2015070101-12","first-page":"19","article-title":"Reversible watermarking by difference expansion","author":"J.Tian","year":"2002","journal-title":"Proceedings of Workshop on Multimedia and Security"},{"key":"ijdcf.2015070101-13","doi-asserted-by":"publisher","DOI":"10.1145\/1022431.1022459"},{"key":"ijdcf.2015070101-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.cad.2011.11.001"},{"key":"ijdcf.2015070101-15","doi-asserted-by":"crossref","unstructured":"Wang, X. T., Shao, C. Y., Xu, X. G., Niu, X. M.(2007). Reversible data-hiding scheme for 2-D vector maps based on difference expansion, IEEE Transactions on Information forensics and security, 2(3), 311-320.","DOI":"10.1109\/TIFS.2007.902677"},{"key":"ijdcf.2015070101-16","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.224"},{"issue":"10","key":"ijdcf.2015070101-17","first-page":"3820","article-title":"Reversible and implementation of fragile watermark for vector graphics","volume":"28","author":"L.Zheng","year":"2011","journal-title":"Application Research of Computers"},{"key":"ijdcf.2015070101-18","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2009.00990"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=134051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:13:08Z","timestamp":1654110788000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijdcf.2015070101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":19,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijdcf.2015070101","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}