期刊文献+

基于哈希的二维工程CAD图拓扑关系认证技术

Topology Authentication of 2D Engineering CAD Drawings Based on Hashing
下载PDF
导出
摘要 针对二维工程CAD图拓扑关系完整性认证问题,提出一种基于哈希的拓扑完整性认证算法。该算法首先提取图纸的拓扑关系生成拓扑图;其次对图中的组件进行编码,并提出一种局部拓扑量化模式(LTQP),实现各组件拓扑特征的量化;然后将组件按照其编码分成5类,基于各组件的LTQP值,利用离散余弦变换生成每类组件的哈希序列;最后将每类组件的哈希序列进行合并,得到完整的图纸哈希序列。实验结果表明,该算法对旋转、缩放和平移等非恶意操作具有鲁棒性,同时对恶意拓扑攻击具有脆弱性,采用将组件分类来生成哈希序列的方式,能够对受到拓扑攻击的组件的种类进行定位。 Since it's difficult to authenticate the topological relation in the2-dimensional engineering CAD drawing,a topological integrity authentication algorithm is proposed based on Hashing in thispaper.Firstly,the algorithm extracts the topological relations of the drawings to generate the topology graph.Secondly,the components in the engineering CAD drawing are encoded,and the local topological quantization pattern(LTQP)is proposed to quantize the topological features of each component.Then,the components are divided into five categories according to their coding,and a Hash sequence is generated by discrete cosine transform based on the LTQP values.Finally,the Hash sequence of each category is combined to obtain the complete Hash sequence of the drawing.The experimental results show that the algorithmis robust to rotation,scaling and translation in engineering CAD drawings,and is vulnerable to the change of topological connection.By classifying the components to generate a Hash sequence,the algorithm can locate the type of components which is subjected to the topology attack.
作者 马晓斌 叶颖 苏智勇 MA Xiaobin;YE Ying;SU Zhiyong(School of Automation, Nanjing University of Science and Technology, Nanjing Jiangsu 210094, China)
出处 《图学学报》 CSCD 北大核心 2017年第4期476-482,共7页 Journal of Graphics
基金 国家自然科学基金项目(61300160)
关键词 工程CAD图 拓扑认证 局部拓扑量化模式 离散余弦变换 哈希 engineering CAD drawing topology authentication local topological quantization pattern discrete cosine transform Hashing
  • 相关文献

参考文献5

二级参考文献141

  • 1黄晓生,顾景文.CAD图形数据数字水印技术综述[J].工程图学学报,2005,26(6):140-146. 被引量:12
  • 2唐驾时,欧阳克俭.logistic模型的倍周期分岔控制[J].物理学报,2006,55(9):4437-4441. 被引量:17
  • 3Koch E,Zhao J.Towards robust and hidden image copyright labeling[C] //Proc.1995 IEEE Workshop on Nonlinear Signal and Image Processing,1995:452-455.
  • 4Zhao J,Koch E.A digital watermarking system for multimedia copyright protection[C] //Proc.ACM Multimedia 96,1996:443-444.
  • 5Bors A G,Pitas I.Image watermarking using DCT domain constraints[C] //IEEE Int.Conf,on Image Processing,1996:231-234.
  • 6Cox I,et al.Secure spread spectrum watermarking for images[C] //Audio,and Video.IEEE Int'1 Conf.on Image Processing,1996:243-246.
  • 7Hartung B,Hartung F,Girod B.Digital watermarking of raw and compressed video[C] //Pros.European EOS/SPIE Symp:Advanced Imaging and Network Technologies,Society of Photo-Optical Instrumentation Engineers,1996:205-213.
  • 8Boney L,Tewfik A I,Hamdy K I.Digital watermarks for audio signals[C] //Proc.of EUSIPCO 96,1996:1697-1700.
  • 9Ohbuchi R,Masuda H,Aono M.Watermarking three-dimensional polygonal models[C] //Proceedings of the ACM Multimedia'97,1997:261-272.
  • 10Ichikawa S,Chiyama H,Akabane K.Redundancy in 3D polygon models and its application to digital signature[J].International Journal of Algorithms,Data Structures and Techniques for Computer Graphics and Visualization,2002,10(1):225-232.

共引文献151

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部