Abstract
In recent years, digital watermarking has received increasing attention in the copyright protection of engineering graphics. The existing two-dimensional transform domain-based engineering graphic watermarking methods have low security and weak robustness, which greatly restrict their practical application. Research on such engineering graphics watermarking should be strengthened, and new algorithms should be developed to avoid these defects of previous watermarking methods, so as to achieve the purpose of copyright protection. This paper proposes an effective watermarking algorithm based on cellular automata transform (CA) transform and reversible state loop maximum length cellular automata (RSL-MLCA). Firstly, the engineering graphic is decomposed into CA frequency domain, and then the watermark is encrypted by RSL-MLCA and Fibonacci transform. Finally, the encrypted watermark information is embedded into the low frequency domain of the engineering graphic. To the best of our knowledge, this is the first time that CA has introduced for protecting engineering graphics copyright. Experimental results show that our CA-based watermarking algorithm can simultaneously improve the imperceptibility, robustness and security.














Similar content being viewed by others
References
Peng, F., Long, Q., Lin, Z.X., Long, M.: A reversible watermarking for authenticating 2D CAD engineering graphics based on iterative embedding and virtual coordinates. Multimed. Tools Appl. 78, 26885–26905 (2019)
Namasudra, S., Roy, P.: A new table based protocol for data accessing in cloud computing. J. Inform. Sci. Eng. 33, 585–609 (2017)
Peng, F., Ming, W., Zhang, X., Long, M.: A reversible visible watermarking for 2D CAD engineering graphics based on graphics fusion. Signal Process. Image Commun. 78, 426–436 (2019)
Das, S., Namasudra, S.: A lightweight and anonymous mutual authentication scheme for medical big data in distributed smart healthcare systems. IEEE/ACM Trans. Comput. Biol. Bioinf. 21(4), 1106–1116 (2024)
Murmu, A., Kumar, P., Moparthi, N.R., Namasudra, S., Lorenz, P.: Reliable federated learning with gan model for robust and resilient future healthcare system. IEEE Trans. Netw. Serv. Manage. (2024). https://doi.org/10.1109/TNSM.2024.3422376
Rahman, M., Murmu, A., Kumar, P., Moparthi, N.R., Namasudra, S.: A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems. J. Inf. Secur. Appl. 80, 103677 (2024)
Su, Q., Chen, B.: Robust color image watermarking technique in the spatial domain. Soft Comput. 22, 91–106 (2018)
Xiaobin, Z., et al.: Robust image hiding network with Frequency and Spatial Attentions. Pattern Recognit. 155, 110691 (2024)
Jobin, A., Varghese, P.: An imperceptible spatial domain color image watermarking scheme. J. King Saud Univ. Comput. Inform. Sci. (2016). https://doi.org/10.1016/j.jksuci.2016.12.004
Hosameldeen, O., Halima, N.B.: A hybrid ROI-embedding based watermarking technique using DWT and DCT transforms. J. Theor. Appl. Inform. Technol. 81, 514–528 (2015)
Chang, X., Chen, B., Ding, W., Liao, X.: A DNN robust video watermarking method in dual-tree complex wavelet transform domain. J. Inf. Secur. Appl. 85, 103868 (2024)
Li, Z., Zhang, H., Liu, X., Wang, C., Wang, X.: Blind and safety-enhanced dual watermarking algorithm with chaotic system encryption based on RHFM and DWT-DCT. Digit. Signal Process. 115, 103062 (2021)
Peng, F., Sun, X.: Information hiding algorithm for two-dimensional engineering graphics based on characteristics. Comput. Eng. Appl. 43(15), 53–56 (2007)
Huang, X., Peng, F., Deng T.: A Capacity variable watermarking algorithm for 2D engineering graphic based on complex number system. In: 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 339–342. Harbin, China, (2008)
Li, Y., Xu, L. A blind watermarking of vector graphic images. In: Proceedings of the 5th International Conference on Computational Intelligence and Multimedia Applications, pp. 424–429, ICCIMA (2003)
Kang, X., Huang, J., Shi, Y., Lin, Y.: A DWT-DFT composite watermarking scheme robust to both affine transform and JPEG compression. IEEE T. Circ. Syst. 13, 776–786 (2003)
Asikuzzaman, M., Alam, M.J., Lambert, A.J., Pickering, M.R.: Robust DT CWT-based DIBR 3D video watermarking using chrominance embedding. IEEE Trans. Multimed. 18(9), 1733–1748 (2016)
Chang, C.S., Shen, J.J.: Features classification forest: a novel development that is adaptable to robust blind watermarking techniques. IEEE Trans. Image Process 26(8), 3921–3935 (2017)
Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. Image Process. 10(5), 783–791 (2001)
Wang, Y., Doherty, J.F., Van Dyck, R.E.: A wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans. Image Process. 11(2), 77–88 (2002)
Chu, W.C.: DCT-based image watermarking using subsampling. IEEE Trans. Multimedia 5(1), 34–38 (2003)
Wong, P., Au, O., Yiu, Y.: A novel blind multiple watermarking technique for images circuits and systems for video technology. IEEE Trans. Circ. Syst. Video Technol. 13(8), 813–830 (2003)
Wang, Y., Yang, C., Zhu, C.: A multiple watermarking algorithm for vector geographic data based on coordinate mapping and domain subdivision. Multimed. Tools Appl. 77, 19261–19279 (2018)
Takahashi, A., Nishimura, R., Suzuki, Y.: Multiple watermarks for stereo audio signals using phase-modulation techniques. IEEE Trans. Signal Process. 53(2), 806–815 (2005)
Lafe, O.: Data compression and encryption using cellular automata transforms. IEEE Int. Jt. Symp. Intell. Syst. 10, 234–241 (1996)
Dalhoum, A.L.A., Mahafzah, B.A., Awwad, A.A., Aldhamari, I., Ortega, A., Alfonseca, M.: Digital Image Scrambling Using 2D Cellular Automata. IEEE Multimed. 19(4), 28–36 (2012)
Funding
This research was funded by the National Natural Science Foundation of China, grant number 62275177, 61975138, Sichuan Province International Cooperation Research Program, grant number 2023YFH0030, Chengdu Science and Technology Program, grant number 2022-GH02-00001-H7, Natural Science Foundation of Guangdong Province, grant number 2021A1515011091 and Educational Commission of Guangdong Province, grant number 2020ZDZX3056.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that no competing interests relevant to the content of this article.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, X., Liu, S., Li, X. et al. Engineering graphics copyright protection via CAT and reversi-ble state loop maximum length cellular automata. J Comput Virol Hack Tech 21, 2 (2025). https://doi.org/10.1007/s11416-024-00542-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11416-024-00542-0