Skip to main content

Advertisement

Log in

Engineering graphics copyright protection via CAT and reversi-ble state loop maximum length cellular automata

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

In recent years, digital watermarking has received increasing attention in the copyright protection of engineering graphics. The existing two-dimensional transform domain-based engineering graphic watermarking methods have low security and weak robustness, which greatly restrict their practical application. Research on such engineering graphics watermarking should be strengthened, and new algorithms should be developed to avoid these defects of previous watermarking methods, so as to achieve the purpose of copyright protection. This paper proposes an effective watermarking algorithm based on cellular automata transform (CA) transform and reversible state loop maximum length cellular automata (RSL-MLCA). Firstly, the engineering graphic is decomposed into CA frequency domain, and then the watermark is encrypted by RSL-MLCA and Fibonacci transform. Finally, the encrypted watermark information is embedded into the low frequency domain of the engineering graphic. To the best of our knowledge, this is the first time that CA has introduced for protecting engineering graphics copyright. Experimental results show that our CA-based watermarking algorithm can simultaneously improve the imperceptibility, robustness and security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Peng, F., Long, Q., Lin, Z.X., Long, M.: A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multimed. Tools Appl. 78, 26885–26905 (2019)

    Article  Google Scholar 

  2. Namasudra, S., Roy, P.: A new table based protocol for data accessing in cloud computing. J. Inform. Sci. Eng. 33, 585–609 (2017)

    MathSciNet  Google Scholar 

  3. Peng, F., Ming, W., Zhang, X., Long, M.: A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion. Signal Process. Image Commun. 78, 426–436 (2019)

    Article  Google Scholar 

  4. Das, S., Namasudra, S.: A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems. IEEE/ACM Trans. Comput. Biol. Bioinf. 21(4), 1106–1116 (2024)

    Article  Google Scholar 

  5. Murmu, A., Kumar, P., Moparthi, N.R., Namasudra, S., Lorenz, P.: Reliable federated learning with gan model for robust and resilient future healthcare system. IEEE Trans. Netw. Serv. Manage. (2024). https://doi.org/10.1109/TNSM.2024.3422376

    Article  Google Scholar 

  6. Rahman, M., Murmu, A., Kumar, P., Moparthi, N.R., Namasudra, S.: A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. J. Inf. Secur. Appl. 80, 103677 (2024)

    Google Scholar 

  7. Su, Q., Chen, B.: Robust color image watermarking technique in the spatial domain. Soft Comput. 22, 91–106 (2018)

    Article  Google Scholar 

  8. Xiaobin, Z., et al.: Robust image hiding network with Frequency and Spatial Attentions. Pattern Recognit. 155, 110691 (2024)

    Article  Google Scholar 

  9. Jobin, A., Varghese, P.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ. Comput. Inform. Sci. (2016). https://doi.org/10.1016/j.jksuci.2016.12.004

    Article  Google Scholar 

  10. Hosameldeen, O., Halima, N.B.: A hybrid ROI-embedding based watermarking technique using DWT and DCT transforms. J. Theor. Appl. Inform. Technol. 81, 514–528 (2015)

    Google Scholar 

  11. Chang, X., Chen, B., Ding, W., Liao, X.: A DNN robust video watermarking method in dual-tree complex wavelet transform domain. J. Inf. Secur. Appl. 85, 103868 (2024)

    Google Scholar 

  12. Li, Z., Zhang, H., Liu, X., Wang, C., Wang, X.: Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digit. Signal Process. 115, 103062 (2021)

    Article  Google Scholar 

  13. Peng, F., Sun, X.: Information hiding algorithm for two-dimensional engineering graphics based on characteristics. Comput. Eng. Appl. 43(15), 53–56 (2007)

    Google Scholar 

  14. Huang, X., Peng, F., Deng T.: A Capacity variable watermarking algorithm for 2D engineering graphic based on complex number system. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 339–342. Harbin, China, (2008)

  15. Li, Y., Xu, L. A blind watermarking of vector graphic images. In: Proceedings of the 5th International Conference on Computational Intelligence and Multimedia Applications, pp. 424–429, ICCIMA (2003)

  16. Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE T. Circ. Syst. 13, 776–786 (2003)

    Article  Google Scholar 

  17. Asikuzzaman, M., Alam, M.J., Lambert, A.J., Pickering, M.R.: Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding. IEEE Trans. Multimed. 18(9), 1733–1748 (2016)

    Article  Google Scholar 

  18. Chang, C.S., Shen, J.J.: Features classification forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans. Image Process 26(8), 3921–3935 (2017)

    Article  MathSciNet  Google Scholar 

  19. Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process. 10(5), 783–791 (2001)

    Article  Google Scholar 

  20. Wang, Y., Doherty, J.F., Van Dyck, R.E.: A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2), 77–88 (2002)

    Article  Google Scholar 

  21. Chu, W.C.: DCT-based image watermarking using subsampling. IEEE Trans. Multimedia 5(1), 34–38 (2003)

    Article  MathSciNet  Google Scholar 

  22. Wong, P., Au, O., Yiu, Y.: A novel blind multiple watermarking technique for images circuits and systems for video technology. IEEE Trans. Circ. Syst. Video Technol. 13(8), 813–830 (2003)

    Article  Google Scholar 

  23. Wang, Y., Yang, C., Zhu, C.: A multiple watermarking algorithm for vector geographic data based on coordinate mapping and domain subdivision. Multimed. Tools Appl. 77, 19261–19279 (2018)

    Article  Google Scholar 

  24. Takahashi, A., Nishimura, R., Suzuki, Y.: Multiple watermarks for stereo audio signals using phase-modulation techniques. IEEE Trans. Signal Process. 53(2), 806–815 (2005)

    Article  MathSciNet  Google Scholar 

  25. Lafe, O.: Data compression and encryption using cellular automata transforms. IEEE Int. Jt. Symp. Intell. Syst. 10, 234–241 (1996)

    Article  Google Scholar 

  26. Dalhoum, A.L.A., Mahafzah, B.A., Awwad, A.A., Aldhamari, I., Ortega, A., Alfonseca, M.: Digital Image Scrambling Using 2D Cellular Automata. IEEE Multimed. 19(4), 28–36 (2012)

    Article  Google Scholar 

Download references

Funding

This research was funded by the National Natural Science Foundation of China, grant number 62275177, 61975138, Sichuan Province International Cooperation Research Program, grant number 2023YFH0030, Chengdu Science and Technology Program, grant number 2022-GH02-00001-H7, Natural Science Foundation of Guangdong Province, grant number 2021A1515011091 and Educational Commission of Guangdong Province, grant number 2020ZDZX3056.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shouxin Liu.

Ethics declarations

Conflict of interest

The authors declare that no competing interests relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, X., Liu, S., Li, X. et al. Engineering graphics copyright protection via CAT and reversi-ble state loop maximum length cellular automata. J Comput Virol Hack Tech 21, 2 (2025). https://doi.org/10.1007/s11416-024-00542-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11416-024-00542-0

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy