{"id":"https://openalex.org/W2770793517","doi":"https://doi.org/10.1109/tifs.2017.2777341","title":"Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors","display_name":"Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors","publication_year":2017,"publication_date":"2017-11-23","ids":{"openalex":"https://openalex.org/W2770793517","doi":"https://doi.org/10.1109/tifs.2017.2777341","mag":"2770793517"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2017.2777341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2777341","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086331195","display_name":"Zhiyong Su","orcid":"https://orcid.org/0000-0001-9483-5268"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyong Su","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077313323","display_name":"Ying Ye","orcid":"https://orcid.org/0000-0002-7721-5451"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Ye","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100665639","display_name":"Qi Zhang","orcid":"https://orcid.org/0000-0003-0709-3273"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Zhang","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101414940","display_name":"Weiqing Li","orcid":"https://orcid.org/0000-0002-1929-3654"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiqing Li","raw_affiliation_strings":["School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080275149","display_name":"Yuewei Dai","orcid":"https://orcid.org/0000-0003-1522-9257"},"institutions":[{"id":"https://openalex.org/I36399199","display_name":"Nanjing University of Science and Technology","ror":"https://ror.org/00xp9wg62","country_code":"CN","type":"education","lineage":["https://openalex.org/I36399199"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuewei Dai","raw_affiliation_strings":["School of Automation, Nanjing University of Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Nanjing University of Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I36399199"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086331195"],"corresponding_institution_ids":["https://openalex.org/I36399199"],"apc_list":null,"apc_paid":null,"fwci":0.3641,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.69818294,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"13","issue":"4","first_page":"1018","last_page":"1030"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14339","display_name":"Image Processing and 3D Reconstruction","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10824","display_name":"Image Retrieval and Classification Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6089613437652588},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.6066875457763672},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5880528092384338},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36942794919013977},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3392038345336914},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3303239345550537},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2751607298851013}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6089613437652588},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.6066875457763672},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5880528092384338},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36942794919013977},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3392038345336914},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3303239345550537},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2751607298851013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2017.2777341","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2017.2777341","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8963858378","display_name":null,"funder_award_id":"61300160","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W242449877","https://openalex.org/W1540630416","https://openalex.org/W1549083695","https://openalex.org/W1828611686","https://openalex.org/W1968701669","https://openalex.org/W1980469078","https://openalex.org/W1981771437","https://openalex.org/W1986460167","https://openalex.org/W2001108668","https://openalex.org/W2012049660","https://openalex.org/W2012187833","https://openalex.org/W2013781793","https://openalex.org/W2034329195","https://openalex.org/W2041501561","https://openalex.org/W2044147643","https://openalex.org/W2057410091","https://openalex.org/W2065757454","https://openalex.org/W2070279769","https://openalex.org/W2094605916","https://openalex.org/W2096571195","https://openalex.org/W2104266187","https://openalex.org/W2134383396","https://openalex.org/W2146916812","https://openalex.org/W2167690872","https://openalex.org/W2183964636","https://openalex.org/W2190207313","https://openalex.org/W2529554728","https://openalex.org/W2913399920","https://openalex.org/W4244017338","https://openalex.org/W6638487463"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2544423928","https://openalex.org/W2052122378","https://openalex.org/W2053286651","https://openalex.org/W2181743346","https://openalex.org/W2187401768","https://openalex.org/W2181413294","https://openalex.org/W2159024673","https://openalex.org/W3023219121"],"abstract_inverted_index":{"This":[0],"paper":[1],"investigates":[2],"the":[3,76,105,116,133,143,152,163,174,209,211,225,229,232],"joint":[4,35,109],"authentication":[5],"of":[6,11,26,43,56,115,136,148,156,213,231],"topology":[7,36,52,99,144],"and":[8,37,49,53,145,151,191,202,227],"geometry":[9,38,54,84,127,146],"information":[10],"2D":[12],"engineering":[13],"computer-aided":[14],"design":[15],"graphics,":[16],"which":[17],"focus":[18],"more":[19],"on":[20,89,162],"topological":[21,106],"modeling":[22,25],"than":[23],"geometric":[24,73,82,119],"objects.":[27,110],"A":[28],"robust":[29,197],"hashing":[30],"scheme":[31],"is":[32,69,170],"proposed":[33],"for":[34,71,80,130],"authentication.":[39],"The":[40,166,194],"covariance":[41,134,164],"matrices":[42,135],"descriptors":[44,137],"are":[45,86,93,101,121,138,159,185,196,221],"explored":[46],"to":[47,104,125,140,180,204,223],"fuse":[48,141],"encode":[50],"both":[51,142,188],"features":[55,85,91,100,147],"different":[57],"types":[58],"into":[59,187],"a":[60,64],"compact":[61],"representation.":[62],"First,":[63],"normalized":[65],"binary":[66],"shape":[67],"texture":[68],"rendered":[70],"each":[72,81,131,157,181],"object":[74],"through":[75],"render-to-texture":[77],"technique.":[78],"Then,":[79,129],"object,":[83],"computed":[87,160],"based":[88,161],"statistical":[90],"that":[92,178],"extracted":[94],"from":[95],"image":[96],"rings.":[97],"Additionally,":[98],"generated":[102],"according":[103,124],"relations":[107],"among":[108],"To":[111],"generate":[112],"hash":[113,154,168,176,192],"codes":[114,155,177],"graphic,":[117],"all":[118,149],"objects":[120,215],"first":[122],"grouped":[123],"their":[126],"features.":[128],"group,":[132],"applied":[139],"objects,":[150],"intermediate":[153,175],"group":[158],"matrices.":[165],"final":[167],"sequence":[169],"formed":[171],"by":[172],"concatenating":[173],"correspond":[179],"group.":[182],"Secret":[183],"keys":[184],"introduced":[186],"feature":[189],"extraction":[190],"construction.":[193],"hashes":[195],"against":[198],"topology-preserving":[199],"graphic":[200],"manipulations":[201],"sensitive":[203],"malicious":[205],"attacks.":[206],"By":[207],"decomposing":[208],"hashes,":[210],"locations":[212],"tampered":[214],"can":[216],"be":[217],"determined.":[218],"Experimental":[219],"results":[220],"presented":[222],"evaluate":[224],"performance":[226],"show":[228],"effectiveness":[230],"method.":[233]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
