{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T03:33:48Z","timestamp":1768620828183,"version":"3.49.0"},"reference-count":25,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1,1]]},"abstract":"<p>Quantization index modulation (QIM) is widely used in watermarking, but QIM cannot be applied to reversible watermarking directly due to its inherent limitations. In this paper, an improvement is made to QIM to make it suitable for reversible watermarking. Based on the improved QIM (IQIM), a reversible watermarking scheme for 2D CAD engineering graphics is proposed. The relative amplitudes and the relative phases of entity vertices are used as hosts to carry the watermark, respectively, and the data recovery is controlled by a secret key. Experimental results indicate that the proposed scheme can strike a good balance between capacity, imperceptibility, robustness, security and complexity.<\/p>","DOI":"10.4018\/jdcf.2011010104","type":"journal-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T17:46:05Z","timestamp":1354643165000},"page":"53-69","source":"Crossref","is-referenced-by-count":21,"title":["An Effective Reversible Watermarking for 2D CAD Engineering Graphics Based on Improved QIM"],"prefix":"10.4018","volume":"3","author":[{"given":"Fei","family":"Peng","sequence":"first","affiliation":[{"name":"Hunan University, China"}]},{"given":"Yu-Zhou","family":"Lei","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]}],"member":"2432","reference":[{"key":"jdcf.2011010104-0","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"jdcf.2011010104-1","unstructured":"Cai, Z. C., Sun, W., Xiong, C. Z., & Qi, D. X. (2005). Watermarking of two-dimensional engineering graph based on the orthogonal complete U-system, In Proceedings of the Ninth International Conference on Computer Aided Design and Computer Graphics (pp. 205-209)."},{"key":"jdcf.2011010104-2","doi-asserted-by":"crossref","unstructured":"Celik, M. U., Sharma, G., Tekalp, A. M., & Saber, E. (2002). Reversible data hiding. In Proceedings of the International Conference on Image Processing (pp. 57-60).","DOI":"10.1109\/ICIP.2002.1039911"},{"key":"jdcf.2011010104-3","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"jdcf.2011010104-4","doi-asserted-by":"crossref","unstructured":"Chen, B., & Wornell, G. W. (1998). Digital watermarking and information embedding using dither modulation. In Proceedings of the Second Workshop on Multimedia Signal Processing (pp. 273-278).","DOI":"10.1109\/MMSP.1998.738946"},{"key":"jdcf.2011010104-5","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1117\/12.384995","article-title":"Preprocessed and post processed quantization index modulation methods for digital watermarking. In","volume":"3971","author":"B.Chen","year":"2000","journal-title":"Proceedings of SPIE: Security and Watermarking of Multimedia"},{"key":"jdcf.2011010104-6","doi-asserted-by":"publisher","DOI":"10.1109\/18.923725"},{"key":"jdcf.2011010104-7","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.903553"},{"key":"jdcf.2011010104-8","unstructured":"De, V. C., Delaigle, J. E., & Macq, B. (2001). Circular interpretation of histogram for reversible watermarking. In Proceedings of the Fourth Workshop on Multimedia Signal Processing (pp. 345-350)."},{"issue":"3","key":"jdcf.2011010104-9","first-page":"161","article-title":"Reversible watermarking: Current status and key issues.","volume":"2","author":"J. B.Feng","year":"2006","journal-title":"International Journal of Network Security"},{"key":"jdcf.2011010104-10","unstructured":"Honsinger, I. C. W., Jones, P., Rabbani, M., & Stoffel, J. C. (1999). Lossless recovery of an original image containing embedded data. Retrieved from http:\/\/www.freepatentsonline.com\/6278791.html"},{"key":"jdcf.2011010104-11","doi-asserted-by":"crossref","unstructured":"Huang, X. F., Peng, F., & Deng, T. (2008). A capacity variable watermarking algorithm for 2D engineering graphic based on complex number system. In Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 339-342).","DOI":"10.1109\/IIH-MSP.2008.112"},{"key":"jdcf.2011010104-12","unstructured":"Kwon, K. R., Jang, B. J., Lee, E. J., & Huh, Y. (2004). Copyright protection of architectural CAD drawing using the multiple watermarking schemes. In Proceedings of the International Conference on Multimedia and Expo (pp. 871-874)."},{"key":"jdcf.2011010104-13","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"jdcf.2011010104-14","doi-asserted-by":"crossref","unstructured":"Niu, X. M., Song, W., Lu, M. Y., & Huang, W. (2008). A 3D model authentication algorithm based on reversible watermarking. In Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 1286-1289).","DOI":"10.1109\/IIH-MSP.2008.203"},{"key":"jdcf.2011010104-15","doi-asserted-by":"crossref","unstructured":"Shi, Y. Q., Ni, Z., Zou, D., Liang, C., & Xuan, G. (2004). Lossless data hiding: fundamentals, algorithms and applications. In Proceedings of the 2004 International Symposium on Circuits and Systems (pp. 33-36).","DOI":"10.1109\/ISCAS.2004.1329201"},{"key":"jdcf.2011010104-16","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"jdcf.2011010104-17","doi-asserted-by":"crossref","unstructured":"Voigt, M., Yang, B., & Busch, C. (2004). Reversible watermarking of 2D-vector data. In Proceedings of the 2004 workshop on Multimedia and security (pp. 160-165).","DOI":"10.1145\/1022431.1022459"},{"key":"jdcf.2011010104-18","first-page":"1889","article-title":"Reversible data hiding for point-sampled geometry.","volume":"23","author":"P. C.Wang","year":"2007","journal-title":"Journal of Information Science and Engineering"},{"key":"jdcf.2011010104-19","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902677"},{"key":"jdcf.2011010104-20","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.101"},{"key":"jdcf.2011010104-21","doi-asserted-by":"publisher","DOI":"10.1049\/el.2009.1504"},{"key":"jdcf.2011010104-22","unstructured":"Wu, H. T., & Cheung, Y. M. (2005). A reversible data hiding approach to mesh authentication. In Proceedings of the 2005 International Conference on Web Intelligence (pp. 774- 777)."},{"key":"jdcf.2011010104-23","first-page":"797","article-title":"Reversible watermarking of 3D mesh models by prediction-error expansion. 10th Multimedia","volume":"N-A","author":"H. T.Wu","year":"2008","journal-title":"Signal Processing"},{"key":"jdcf.2011010104-24","unstructured":"Xuan, G. R., Yang, C. Y., Shi, Y. Q., & Ni, Z. (2004). Reversible data hiding based on wavelet spread spectrum. In Proceedings of the 6th Workshop on Multimedia Signal Processing (pp. 211-214)."}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=52778","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:02:56Z","timestamp":1654106576000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2011010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2011010104","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}