340
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Zero watermarking algorithm for BIM data based on distance partitioning and local feature

, , &
Pages 251-265 | Received 14 Sep 2023, Accepted 24 Nov 2023, Published online: 04 Jan 2024

ABSTRACT

Zero watermarking constructs the watermark information according to the characteristics of the original data, without changing the data structure and data accuracy. Maintaining high data accuracy is the premise of building information modelling (BIM) usability, so zero watermarking is a hotspot in the research of BIM data security protection. BIM model is a type of 3D model, however, most of the existing zero watermarking algorithms for 3D models are difficult to be better applied to BIM data due to data structure differences. To solve this problem, a zero-watermarking algorithm for BIM data based on distance partitioning and skewness measure is proposed. Firstly, after spatial partitioning based on element paradigm value, the mapping relationship between different partitions and watermarking bits is established. Then, the skewness of elements is calculated, and the skewness measure sign is used as the feature to obtain the binary sequence. Finally, the dissimilarity operation is performed on the binary sequence and the original watermarking sequence which was disordered to construct the zero watermark of the BIM data. The experimental results show that the zero watermarks constructed from different BIM data are unique and robust to translation, rotation, element deletion, element addition, and format conversion attacks. In addition, the superiority of this paper’s algorithm over the comparison algorithm in terms of robustness is compared. Therefore, the proposed algorithm can effectively provide technical support for BIM data copyright protection.

1. Introduction

Building information modelling (BIM) data have become important data source for smart city construction due to the ability to express the full elemental information of the city, which helps in the description of urban geographic entities and micro-analysis (Chen et al. Citation2022; Kim and Kim Citation2023; Zhu et al. Citation2021). However, as the use of BIM data becomes more and more widespread, illegal use and leakage of data have been occurring (Lou and Lu Citation2022). Digital watermarking technology, as a cutting-edge technology, provides a solution for BIM data copyright protection by tightly linking copyright information to the original data (Lopez Citation2002; Zhang et al. Citation2020, Citation2023). Existing digital watermarking techniques can be divided into two categories: lossy and lossless watermarking. Lossy watermarking embeds copyright information into original data and inevitably causes a drop in data accuracy (Abulkasim, Jamjoom, and Abbas Citation2022; Delmotte et al. Citation2020; Hamidi et al. Citation2019; Sayahi et al. Citation2023; Zhang et al. Citation2023). This loss of accuracy can have a negative impact on the availability of BIM data. Lossless watermarking constructs the watermark sequence without changing the accuracy of the data (Hu and Xiang Citation2021; Xia et al. Citation2023; Yu et al. Citation2022). Therefore, for BIM data that requires high data accuracy, it is more advantageous to use lossless watermarking to protect data security.

As a lossless watermarking technology, zero watermarking uses the features of the original data to construct a watermarking sequence while completely maintaining the accuracy of the data (Tsai, Lai, and Lo Citation2013). It effectively balances the imperceptibility and robustness of digital watermarking, enabling copyright identification, infringement tracking, and content authentication throughout the data’s lifecycle (Liu et al. Citation2023; Wang et al. Citation2023; Xia et al. Citation2021). Therefore, zero watermarking is a hotspot in the research of BIM data security protection.

BIM model is a type of 3D model, so 3D model zero watermarking algorithms could provide a reference for BIM data zero watermarking research. Existing zero-watermarking algorithms for 3D models can be classified into two categories.

The first type is the global feature-based zero watermarking algorithm, which uses the geometric elements of the original data that reflect the overall features of the model as watermark construction primitives (Daoui et al. Citation2022; Li, Yang, and Jin Citation2023; Liu et al. Citation2020; Wang et al. Citation2019, Citation2011). This breed of algorithms harnesses the model’s overarching geometric attributes, employing maths methods, such as moment invariants (Daoui et al. Citation2022; Wang et al. Citation2011), wavelet transform (Li, Yang, and Jin Citation2023; Liu et al. Citation2020), etc. to distil pertinent features. For example, Daoui improved the computation of the Hahn moment invariant and used an optimized sine-cosine algorithm to compute the local parameters of the Hahn invariants. After the above processing, a zero watermark of the experimental 3D model was obtained. Experiments have demonstrated that this algorithm is resistant to translation, rotation, and other attacks. However, because the algorithm uses feature extraction that relies on the overall shape of the model, the zero watermark is not resistant to attacks that crop the shape of the model (Daoui et al. Citation2022). In addition, unlike 3D mesh models, BIM data are fine monolithic models with prominent hierarchical characteristics and low redundancy, making it difficult to perform invariant extraction and zero watermark construction based on the above algorithms. In summary, global feature-based zero watermarking algorithms are robust to some geometric attacks, but attacks that break the overall shape of models will result in watermark detection failure and have low applicability for BIM data.

The second type is the local feature-based zero watermarking algorithm, which uses local geometric features such as vertex distances of the original model as watermark construction primitives (Cui, Ni, and Zhao Citation2017; Jing et al. Citation2019; Lee et al. Citation2023; Liu et al. Citation2021; Wang and Zhan Citation2019). These approaches harness skewness measure (Lee et al. Citation2023), spherical integral invariants (Cui, Ni, and Zhao Citation2017), shape diameter function (Wang and Zhan Citation2019), etc. to glean local features and construct the zero watermarks. For example, Liu calculated the three-ring neighbourhood areas surrounding vertices and projected the one-ring neighbourhood of medium-area vertices onto the tangent plane. Through the utilization of the Beamlet transform, the mesh on both sides of the X-axis of the tangent plane was extracted and the zero watermark of the 3D mesh model was constructed. This algorithm is highly robust to attacks such as clipping (Liu et al. Citation2021). Compared to global features, local features are less affected by attacks that destroy the overall shape of the 3D models, which effectively improves the robustness of zero watermarks. However, most of the current algorithms of this type are used for data such as 3D mesh models and point cloud models, and BIM models have different data structures from them, so local features such as three-ring neighbourhood’s area do not work well with BIM data. At present, some scholars have proposed some zero watermarking algorithms for BIM data based on local features after in-depth research, and provide feasible solutions to the problem that existing 3D model watermarking algorithms cannot be used directly on BIM data. However, existing algorithms do not sufficiently consider the presence of element editing attacks, it is difficult to resist the impact of some operations in the use of BIM data on the correct extraction of watermarks (Jing et al. Citation2019).

In summation, global feature-based zero watermarking algorithms make full use of the overall structural features of 3D models, but such algorithms cannot resist attacks that destroy the overall shape of the models. In contrast, local features-based zero watermarking algorithms are less affected by such attacks, which can effectively improve the robustness of zero watermarking. However, most of the existing zero watermarking algorithms based on local features target 3D mesh models and point cloud models, while BIM data has different data structures, so existing 3D modelling algorithms cannot be directly used for BIM data. Therefore, it is necessary to analyse the structural characteristics of BIM data and select appropriate local features to construct robust watermarks.

Aiming at solving the above problems, this study introduces a novel zero watermarking algorithm based on BIM data characteristics, centred on the principles of distance partitioning and employing the statistical technique of skewness measure to construct watermark information, which solves the problem that existing zero watermarking algorithms for 3D models are difficult to be well applied to BIM data. The subsequent sections of this paper are organized as follows: Section II describes the scheme principle of the proposed algorithm. Section III provides an exposition of the algorithm’s implementation details. Section IV presents the experimental results and confirms the advantages of the algorithm over the comparison algorithm. In section V, an exploration of the algorithm’s extensibility is presented. Finally, in Section VI, we draw conclusions based on our research and suggest directions for future research.

2. Basic idea and preliminaries

2.1. Basic idea

The key to the zero-watermarking algorithm for BIM data is to ensure the uniqueness and robustness of the constructed watermark, so the local features of BIM data that are relatively stable should be selected to construct watermarks. Feature invariants such as curvature are commonly used in 3D model watermarking algorithms. However, although BIM data is also a type of visual 3D model, it has layered characteristics that make it difficult to design watermarking with feature invariants such as curvature. In the research process, a conspicuous observation made is that the utilization of BIM data tends to preserve structural stability, thereby preventing any proclivity towards tilting or distortion that might compromise the spatial structure of the building. This tendency emphasizes the important concept that various forms of attacks rarely change the distribution of important model components in the overall space. Consequently, the relative distances of the elements in relation to the model’s base point emerge as an obvious stabilizing feature. In addition, compared to the distance of individual elements, feature extraction methods based on groups of elements are more resistant to attacks such as deletion. Deletion or movement of an element does not change the characteristics of the entire group. For this reason, in this paper, this stable feature of BIM data is exploited for watermarking bit mapping and paradigm statistics analysis to finally obtain a unique and robust zero watermark sequence.

2.2. Spherical coordinate

Inherently composed of elements, BIM data distinguishes itself by variances in spatial dispositions, these spatial dispositions, fundamentally stemming from the distribution disparities among elements within the model’s coordinate framework, engender the essence of BIM data’s uniqueness and distinguishability. Thus, a logical approach entails extracting relatively stable attributes from these spatial arrangements of elements and subsequently engendering a zero-watermark reflective of these attributes. To extract such stable features, the distribution of elements in space can be quantitatively described by converting all the vertex coordinates of the model to spherical coordinates through EquationEquation (1).

(1) ri=xixc2+yiyc2+zizc2θi=tan1yiycxixcϕi=cos1zizcxixc2+yiyc2+zizc2,i[1,N](1)

where N is the total number of elements, Vixi,yi,zi is the original coordinate of the element, which is calculated as shown in EquationEquation (2), Viri,θi,ϕi is the spherical coordinate of the element, Vcxc,yc,zcis the base point of the model, ri is the paradigm value, which is often used to describe the spatial distribution of vertices of a 3D model.

(2) V={((boxi.Xmaxboxi.Xmin)2,(boxi.Ymaxboxi.Ymin)2,\break(boxi.Zmaxboxi.Zmin)2)|i[1,N]}(2)
where boxi is the cubic enclosure of the element.

2.3. Distance partitioning

Within the realm of BIM data’s utilization and transmission, changes in the coordinates of the elements and the update of the model constraint relationship caused by operations such as translation bear the potential to introduce errors into watermark bit mapping. In response, devising a watermark bit mapping approach characterized by a measure of stability can improve the ability of zero watermarking to resist attacks. A core premise of BIM data availability is its verticality and structural steadfastness, so the model will not be easily distorted and tilted, exemplified by the vertical orientation of walls and floors. This indicates that the distance from the element to the model base point is relatively stable. Therefore, relatively stable features can be extracted from the spatial distribution characteristics of the elements, and then a zero-watermark reflecting such features can be constructed. To extract such stable features, it is first necessary to quantitatively describe the distribution of elements in space. Mathematically, the distance characteristic of elements can be expressed in terms of the paradigm value. In this paper, this feature is fully considered in designing the watermark mapping rules. The elements’ paradigm value can be sorted and then partitioned to watermark bit mapping with the element group as the basic unit.

illustrates the process of converting the BIM data coordinate system to a spherical coordinate system and watermark mapping. The spherical coordinate system is centred on the project base point and spatially partitioned. This transformation engenders a spatial partitioning predicated on paradigm value, with each distinct spatial region corresponding to a watermark bit within the watermark sequence. On the right side of , a watermark sequence of length n is shown. The movement and deletion of individual elements will not affect the overall watermark mapping relationship, so this mapping relationship is more secure.

Figure 1. Watermark bit mapping relationship.

Figure 1. Watermark bit mapping relationship.

2.4. Skewness measure

The statistical characteristics of data distribution can reflect the laws with stability in the data, which can be used for the extraction of local geometric characteristic invariants of BIM data. Skewness measure is a statistical analysis method to identify whether the group distribution is symmetric or not, if the data is symmetrically presented, the skewness measure value should be zero, and the positive or negative number of the asymmetric state indicates that the distribution of the values tends to be smaller and larger, respectively, and this positivity or negativity can be used to characterize the watermark information. The skewness measure is calculated according to EquationEquation (3).

(3) αj=i=1krirˉ3k×σ3,j[1,n](3)
where αj is the skewness measure for elements’ paradigm value in the partition, n is the watermark length, k is the number of elements in the partition, ri is the paradigm value, rˉ is the average of elements’ paradigm value in the partition, and σ is the standard deviation of elements’ paradigm value in the partition.

3. Proposed methods

3.1. Pre-processing and distance partitioning

Distance partitioning is to map the watermarked bits and then extract the local feature values within the partition. We fully consider the stability of the BIM data structure and partition the model space based on the paradigm values after transforming the spherical coordinate system, with each space indexing one bit of watermark information.

Step 1: Exclude annotations, combinatorial models and other less used elements, and filter the target types of elements. Then, each element coordinate V is calculated according to EquationEquation (2). In addition, obtain the model base point Vcxc,yc,zc.

Step 2: Convert all coordinates to spherical coordinates according to EquationEquation (1), and sort all the paradigm value ri to obtain maximum paradigm value rmax and minimum paradigm value rmin. If rmax>2×rmax1 or rmin<2×rmin+1, it means that the mutability of the boundary element is too high and it is not suitable to be used as a boundary element, delete this element from the sequence. After screening, obtain the final rmax and rmin.

Step 3: Distance partitioning. Partition the space region into n regions, partition is expressed as Cj,j[1,n]. The paradigm value r of each element conforms to EquationEquation (4).

(4) rminr<rmin+rmaxrminn,j=1rmin+j1×rmaxrminnr<rmin+j×rmaxrminn,j1,nrmin+n1×rmaxrminnrrmax,j=n(4)
where n is the watermark length, rmax is the maximum paradigm value, and rmin is the minimum paradigm value. After completing this step, zero watermark construction or zero watermark extraction can be performed.

3.2. Watermark construction

The zero-watermark construction process is shown in .

Figure 2. The flowchart of the watermark construction process.

Figure 2. The flowchart of the watermark construction process.

The watermark construction steps are as follows:

Step 1: Constructing the binary sequence. Based on the paradigm value of all the elements in the partition Cj, the skewness measure is calculated as in EquationEquation (3), and the binary sequence Wj is obtained according to the positivity and negativity of the skewness measure values, as shown in EquationEquation (5).

(5) Wj=0,αj<01,αj0,j1,n(5)

where j(j=1,2,3) represents the binary sequence index, and n is the watermark length. Wj is the binary value, and αj is the skewness measure value. When the skewness measure is 0, it indicates that the number of element paradigms is symmetric, and then the binary value is set to 1. When the skewness metrics of all partitions have been computed, the binary sequence Wis obtained.

Step 2: Obtain the watermark sequence. Operate as in EquationEquation (6) for the binary sequence Wto obtain the zero-watermark sequence W.

(6) W =WW0(6)
where W is the binary sequence, W0is the original watermark information being encrypted based on the secret key, and W is the zero-watermark sequence. is exclusive OR () operation.

Finally, the zero-watermark is registered to the IPR of the trusted third-party intellectual property protection centre, and the timestamp mechanism is introduced to achieve the copyright protection of the BIM data.

3.3. Watermark detection

The watermark detection process is similar to the zero-watermark construction, and the flow is shown in .

Figure 3. The flowchart of the watermark detection process.

Figure 3. The flowchart of the watermark detection process.

The detection steps are as follows:

Step 1: Constructing the binary sequence. This step is the same as step 1 of the zero-watermark construction. The binary sequence Wis constructed by Calculating the paradigm skewness values.

Step 2: Obtain the original watermark. Obtain the registered watermark sequence W in the IPR database and perform the exclusive OR () operation as in EquationEquation (7), the encrypted original watermark W0 is generated.

(7) W0=WW(7)
where W0 is the encrypted original watermark, W is the binary sequence extracted from the BIM data according to step 1, and W is the watermark sequence obtained from the IPR database. After decrypting the W0 using the secret key, the original watermark is obtained.

4. Experiments and results

4.1. Experimental data

To validate the applicability of the proposed zero watermarking algorithm across diverse BIM data variants, two distinct categories of data were employed as experimental samples: two architectural models and two structural models. As shown in , the selected data sets are all BIM data in RVT format. are architectural models, with the main element types of walls, columns, floor slabs, etc. are structural models, with the main element types of structural columns, structural beams, and structural frames. The basic information of the original BIM data is shown in .

Figure 4. Experimental data.

Figure 4. Experimental data.

Table 1. Basic information of the experimental data.

4.2. Experimental design and evaluation indicators

To verify the effectiveness of the algorithm, this paper designs uniqueness experiments and various attack experiments to evaluate the usability and robustness of the algorithm. A binary sequence of length 64 is selected as the original watermark sequence.

The normalized correlation coefficient (NC) is a quantitative index that measures the similarity between the extracted zero watermark and the original copyright information. When BIM data is attacked or data traceability is required, the NC value can be calculated as according to EquationEquation (8) to determine data copyright ownership.

(8) NC=XOR(W0,W0)n(8)

where W0 is the original watermark sequence, W0 is the watermark sequence detected from the BIM data, n is the watermark length, and XOR () is the exclusive OR () operation.

The higher the NC value is, the higher the similarity between the two sequences. If the NC value is greater than the threshold value, it can be determined that the testing party owns the copyright of the BIM data. In practice, the NC threshold is an empirical value, that should be set according to the specific application requirements and usage scenarios, and these requirements may vary from one scenario to another. In this paper, the experimental threshold is set to 0.75.

4.3. Uniqueness experiment

Uniqueness is an important metric to gauge the practicality of a zero watermark. A unique zero watermark ought to be constructed according to the data features and be significantly different from the zero watermarks extracted from other data. In light of this, we design uniqueness experiments, utilizing four constructed zero watermarks from distinct experimental datasets as reference points. These watermarks were then compared with the zero watermarks derived from other BIM datasets. The outcome of this operation was measured via the NC value. A value exceeding the threshold underscores the presence of congruent watermarking information between the datasets. Importantly, these evaluations were conducted without subjecting the BIM data to attacks. shows the experimental results of zero watermark uniqueness for each experimental data.

Table 2. Uniqueness experiment results.

As can be seen from , except for the experimental data with its own NC value of 1, the maximum NC value in the experiments was 0.59, which was lower than the set NC coefficient value of 0.75, indicating the heightened differentiation and inherent uniqueness characterizing the zero watermarks constructed by this algorithm across diverse BIM data. In summary, the zero-watermarking algorithm for BIM data proposed in this paper has uniqueness.

4.4. Robustness experiments

The unintentional or intentional attacks that may occur in BIM data usage and transmission scenarios are fully considered, and experiments were designed for translation, rotation, element attacks, and format conversion attacks. Jing et al.‘s zero watermarking algorithm for BIM data (Jing et al. Citation2019) was used as the comparison algorithm, which also partitions the distance of the elements, but extracts the feature values with a sequence of distance.

4.4.1. Translation attack

Translation is a common operation on BIM data, entailing changes in model coordinate information. There may exist horizontal translation attacks and vertical translation attacks. Vertical translation attack often occurs in the BIM data and terrain and other data suite of application scenarios, and subject to the constraints of the model as a whole translation, the model relative to the distance from the project base point remains unchanged, so the model local coordinate system and the coordinates of the elements do not change. Watermark extraction is not affected in this case. The horizontal translation attack is the relative translation of the project base point, the coordinates of the elements change. The spatial relationship of the elements of the BIM model subject to the constraints of the existence of spatial relationships and the mechanism of automatic updating, so when some of the elements find large translation changes, it may cause the automatic deletion, addition, and displacement of the elements, thus causing noise in the extraction of the watermark. As shown in , horizontal translation attacks manifest as comprehensive movements across the entire model, potentially altering the morphology of select elements due to the inherent constraints embedded within the model structure.

Figure 5. Experimental data before and after translation.

Figure 5. Experimental data before and after translation.

In summary, to verify the robustness of the algorithm against horizontal translation attacks, a series of experiments is architected, spanning translation distances from 50 metres to 250 metres in 50-metre increments. The experimental results are shown in and .

Figure 6. Result of horizontal translation attacks.

Figure 6. Result of horizontal translation attacks.

Table 3. Result of translation attacks.

From the analysis of and , it can be seen that the horizontal translation attacks had a more substantial influence on the watermark extraction of the two architectural models. While both algorithms registered the NC value below 1.00, the proposed algorithm showcased the NC value consistently surpassing 0.90. By contrast, Jing’s algorithm faltered – particularly evidenced by architectural model 1’s failure to detect the watermark when translation surpassed 150 meters. Overall, the proposed algorithm resists translation attacks better than Jing’s, which is because the change of some elements does not affect the skewness measure sign. In conclusion, the experimental results are consistent with the theoretical analyses, the proposed algorithm is strongly robust to BIM data horizontal translation attacks and outperforms comparison algorithms.

4.4.2. Rotation attack

Rotation is a common type of geometric attack on zero watermarking, and under this type of attack, automatic element deletion, update, etc., may also occur in BIM data. Taking the architectural model 1 as an example, as shown in , the original data has been rotated by 60° and 180° with different degrees of element deletion, which may affect the zero-watermark construction. To scrutinize the algorithm’s robustness in withstanding rotation-induced attacks, this paper designs rotational attack experiments with clockwise rotation direction and 60° interval intensity, and the experimental results are shown in and .

Figure 7. Experimental data before and after rotation.

Figure 7. Experimental data before and after rotation.

Figure 8. Result of rotating attacks.

Figure 8. Result of rotating attacks.

Table 4. Result of rotating attacks.

From and , it can be seen that the proposed algorithm and Jing’s can correctly detect copyright information under different intensities of rotation attacks with Experimental data extracting zero watermark NC value above the threshold value of 0.75. This is because the two algorithms’ zero watermarking only relies on the elements’ paradigm value – features unaffected by the rotation of the model. However, the deletion and addition of elements caused by rotation caused some impact, the lowest NC value of architectural model 1 watermarking under Jing’s was only 0.86, compared with the NC value of 0.98 under the proposed with the same intensity of attack, which was obviously more capable of resisting changes such as element addition and deletion caused by rotation. In conclusion, the proposed scheme can effectively resist rotational attacks better than the comparison algorithms, which effectively improves the applicability of the algorithms.

4.4.3. Element attacks

In the realm of BIM data’s practical utilization, the addition and removal of elements emerge as common attacks, which not only make the watermark bit grouping change but also may cause the spatial location of neighbouring elements to change, leading to the zero-watermark construction error. Therefore, for the robustness of the algorithm to resist the element attack, taking into account the actual production and use of data requirements, this paper designs element deletion and addition experiments from 10% to 40% in 10% intervals. Part of the data attack results are shown in , and the experimental results are shown in and .

Figure 9. Experimental data before and after element attacks.

Figure 9. Experimental data before and after element attacks.

Figure 10. Result of element attacks.

Figure 10. Result of element attacks.

Table 5. Result of element attacks.

From the analysis of and , it can be seen that both the proposed algorithm and Jing’s algorithm were affected by the element attack, but the NC value of the proposed algorithm was higher than the threshold value and significantly better than Jing’s. This is because the deletion or addition of elements will destroy the arrangement order of the distance feature values of Jing’s, which will make the zero-watermarked grouping not uniform with the original grouping, and ultimately make it difficult to confirm the copyright information. However, the skewness measure symbols remain relatively unaffected by this phenomenon. Drilling down into specific datasets, architectural model 1—owing to its modest number of elements – evinces considerable susceptibility to element attacks. However, the NC values of zero watermarks, derived from the proposed algorithm, consistently surpassed the 0.75 threshold, in stark contrast to Jing’s algorithm which falters in detecting copyright information under multiple intensities. In a parallel vein, both algorithms’ NC values for architectural model 2 exceeded the threshold, yet Jing’s algorithm’s watermark notably introduced significant noise at attack intensities of 20% and beyond. In structural model 1 and structural model 2, the NC values of the proposed algorithms were higher than 0.85, while Jing’s was difficult to resist the element deletion attack, with the lowest NC value of only 0.59. In conclusion, theoretical and experimental results are the same, the proposed algorithms are better than Jing’s in element attack, and they can resist the different intensity element attacks, which can satisfy the daily use.

4.4.4. Format conversion attack

To meet the diverse usage requirements, BIM data is frequently subjected to format conversion for integration into alternative scenarios. Among the common format conversions, BIM data is transmuted into formats like FBX or IFC, both of which subsist as 3D models. shows the experimental data after format conversion. In principle, this format transformation should have no bearing on the extraction of zero watermarks. In order to verify the ability of the proposed to resist format conversion attacks, this paper designs experiments, and the experimental results are shown in .

Figure 11. The experimental data after format conversion.

Figure 11. The experimental data after format conversion.

Table 6. Result of format conversion attacks.

As can be seen from , neither the proposed algorithm nor Jing’s algorithm succumbed to the influence of format conversion attacks. This is because the format conversion does not affect the distribution relationship of the elements in the model space, the four experimental data can be completely detected with zero watermark information after the format conversion, and the theory is consistent with the experimental results.

5. Discussion

The algorithm proposed in this paper, to some extent, solves the problem that existing local feature-based algorithms cannot be well applied to BIM data and obtain better watermarking robustness. The experiments in Section Ⅳ prove the above point. To better understand the proposed watermarking algorithm, this section next gives more discussion from two aspects to consider the shortcomings of the algorithm and directions for further research.

5.1. Analysis of algorithmic applicability

In the watermarking algorithm proposed in this paper, the elements with similar values of paradigms are grouped into a zone, and the mathematical analysis of the value of paradigms in the zone is performed to obtain the watermark value. Although this approach improves the robustness, accordingly, BIM models with a small number of total elements may receive limitations. Some of these models may have multiple vertices in some partitions, while others have few or no vertices, which may result in the zero-watermark extracted from the model not being unique enough to resist attacks during use.

To delve into this matter further, we elected to conduct experimentation using architectural model 1—possession of the lowest total element count. The original number of vertices for the model is 669. Delete some vertices or introduce noise randomly to change the count of vertices. Subsequently, perform various types of attack experiments on the model to observe the zero-watermarking robustness. The results of the experiment are shown in .

Table 7. Experimental results of vertex number variation.

From the analysis in , it can be seen that as the total count of vertices increased, the ability of the zero watermark to resist kinds of attacks increased. When the vertex number of points reached 2500, the zero watermark NC values were all 1.00. The watermark can be completely detected. In conclusion, a more uniform vertex distribution and a more total number of vertices mean stronger robustness. This illustrates the point that BIM data with too small several elements may cause a significant reduction in watermark robustness. This finding can provide some references for subsequent research. Such as finding ways to increase the number of watermark carrier elements in BIM data to improve the robustness of zero watermarking.

5.2. Analysis of watermark length

In the algorithm proposed in this paper, multiple elements of the model correspond to one bit of watermark information, so the length of the watermark sequence should be much smaller than the total number of points of the model, otherwise it may lead to the lack of uniqueness and robustness of the zero watermark. In the experiments of this paper, a 64-bit binary sequence is chosen to carry copyright information. To discuss the effect of watermark sequence length on watermark robustness, the experimental data building model 2 with more total vertices is chosen to carry out all kinds of attack experiments with watermark lengths of 32, 64, 128, 256, and 512, and the experimental results are shown in .

Table 8. Experimental results of watermark length variation.

From , it can be seen that as the watermark length increased, the allotment of elements within each distance partition undergone a concomitant contraction. This reduction invariably engenders a decline in the resilience of locally extracted feature values – a pivotal facet contributing to watermark robustness. When the watermark length reached 512, the NC value of the extracted watermark after increasing 30% of the elements was only 0.69—a value falling below the established threshold of 0.75. Therefore, it can be concluded that in the algorithm of this paper, the watermark length shows a negative correlation with the zero watermark. That is to say, to ensure the ability of zero watermarks to resist attacks, it is impossible to choose too long watermark information. This problem is one of the limitations of this algorithm. How to improve the watermark capacity will be an important direction for scholars to study next.

6. Conclusion

Aiming at the demand for copyright protection of BIM data and the problem that zero watermarking of existing 3D models does not apply to BIM data, a zero watermarking algorithm based on distance partitioning and skewness measure of BIM data is proposed. This algorithm is based on the element spatial distribution characteristics of the model elements to partition, and establish the mapping relationship between the watermarking bits and the spatial location of the model, which improves the robustness of the algorithm. At the same time, using the skewness measure of the element paradigm value in each partition to construct the watermarking information, and this kind of local characteristics with a certain fault tolerance makes the algorithm resistant to element attacks. Experiments show that the constructed algorithm in this paper has uniqueness and the ability to resist translation, rotation, element deletion, element increase, and format conversion attacks are better than the comparison algorithm. The theory is consistent with the empirical evidence. In conclusion, the proposed algorithm provides an effective and feasible scheme for BIM data copyright protection, which has certain practical value for security protection. In the future, how to increase the watermark embedding capacity and improve the robustness will be the direction of deeper research on zero watermarking of BIM data.

Author contributions

Qianwen Zhou, Changqing Zhu, Na Ren, and Qifei Zhou performed the conceptualization; Qianwen Zhou, Changqing Zhu, and Na Ren performed the methodology; Qianwen Zhou and Na Ren performed the validation; Qianwen Zhou and Changqing Zhu performed the formal analysis; Qianwen Zhou performed the original writing; Qianwen Zhou and Na Ren performed the review & editing; Qianwen Zhou and Changqing Zhu performed the visualization; Changqing Zhu, Na Ren, and Qifei Zhou performed the supervision; Changqing Zhu, Na Ren, and Qifei Zhou performed the funding acquisition.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Data availability statement

The data and codes that support the findings of this study are available from the corresponding author upon reasonable request.

Additional information

Funding

This work was supported by the National Natural Science Foundation of China [42071362] and [42301482]; the National Key Research and Development Program of China [2023YFB3907100]; and Open Project of Hunan Engineering Research Center of Geographic Information Security and Application [HNGISA2023002].

References

  • Abulkasim, H., M. Jamjoom, and S. Abbas. 2022. “Securing Copyright Using 3D Objects Blind Watermarking Scheme.” Computers Materials & Continua 72 (3): 5969–5983. https://doi.org/10.32604/cmc.2022.027999.
  • Chen, Y., D. Huang, Z. Liu, M. Osmani, and P. Demian. 2022. “Construction 4.0, Industry 4.0, and Building Information Modeling (BIM) for Sustainable Building Development within the Smart City.” Sustainability 14 (16): 10028. https://doi.org/10.3390/su141610028.
  • Cui, C., R. Ni, and Y. Zhao 2017. “Robust Zero Watermarking for 3D Triangular Mesh Models Based on Spherical Integral Invariants.” In Digital Forensics and Watermarking: 16th International Workshop, IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings 16 (pp. 318–330). Springer International Publishing.
  • Daoui, A., H. Karmouni, M. Sayyouri, and H. Qjidaa. 2022. “Robust 2D and 3D Images Zero-Watermarking Using Dual Hahn Moment Invariants and Sine Cosine Algorithm.” Multimedia Tools and Applications 81 (18): 25581–25611. https://doi.org/10.1007/s11042-022-12298-0.
  • Delmotte, A., K. Tanaka, H. Kubo, T. Funatomi, and Y. Mukaigawa. 2020. “Blind 3D-Printing Watermarking Using Moment Alignment and Surface Norm Distribution.” IEEE Transactions on Multimedia 23:3467–3482. https://doi.org/10.1109/TMM.2020.3025660.
  • Hamidi, M., A. Chetouani, M. El Haziti, M. El Hassouni, and H. Cherifi. 2019. “Blind Robust 3D Mesh Watermarking Based on Mesh Saliency and Wavelet Transform for Copyright Protection.” Information 10 (2): 67. https://doi.org/10.3390/info10020067.
  • Hu, R., and S. Xiang. 2021. “Lossless Robust Image Watermarking by Using Polar Harmonic Transform.” Signal Processing 179:107833. https://doi.org/10.1016/j.sigpro.2020.107833.
  • Jing, M., N. Ren, C. Q. Zhu, and Z. C. Zhou. 2019. “The Zero Watermarking Algorithm Based on Distance Partition for BIM Modeling.” Journal of Beijing University of Posts and Telecommunications 42 (5): 100.
  • Kim, C., and J. Kim. 2023. “Spatial Spillovers of Sport Industry Clusters and Community Resilience: Bridging a Spatial Lens to Building a Smart Tourism City.” Information Processing & Management 60 (3): 103266. https://doi.org/10.1016/j.ipm.2023.103266.
  • Lee, J. S., Y. C. Chen, C. J. Chew, W. C. Hung, Y. Y. Fan, and B. Li. 2023. “Constructing Gene Features for Robust 3D Mesh Zero-Watermarking.” Journal of Information Security & Applications 73:103414. https://doi.org/10.1016/j.jisa.2022.103414.
  • Liu, Z., Z. Li, G. Wang, Y. Tian, and L. Zheng. 2023. “Robust Zero-Watermarking Algorithm for Diffusion-Weighted Images Based on Multiscale Feature Fusion.” Multimedia Systems 29 (5): 1–17. https://doi.org/10.1007/s00530-023-01127-5.
  • Liu, J., J. Ma, J. Li, M. Huang, N. Sadiq, and Y. Ai. 2020. “Robust Watermarking Algorithm for Medical Volume Data in Internet of Medical Things.” Institute of Electrical and Electronics Engineers Access 8:93939–93961. https://doi.org/10.1109/ACCESS.2020.2995015.
  • Liu, G., Q. Wang, L. Wu, R. Pan, B. Wan, and Y. Tian. 2021. “Zero-watermarking method for resisting rotation attacks in 3D models.” Neurocomputing 421:39–50. https://doi.org/10.1016/j.neucom.2020.09.013.
  • Li, D., Z. Yang, and X. Jin. 2023. “Zero Watermarking Scheme for 3D Triangle Mesh Model Based on Global and Local Geometric Features.” Multimedia Tools and Applications 82 (28): 1–14. https://doi.org/10.1007/s11042-023-15288-y.
  • Lopez, C. 2002. “Watermarking of Digital Geospatial Datasets: A Review of Technical, Legal and Copyright Issues.” International Journal of Geographical Information Science 16 (6): 589–607. https://doi.org/10.1080/13658810210129148.
  • Lou, J., and W. Lu. 2022. “Construction Information Authentication and Integrity Using Blockchain-Oriented Watermarking Techniques.” Automation in Construction 143:104570. https://doi.org/10.1016/j.autcon.2022.104570.
  • Sayahi, I., M. Jallouli, A. B. Mabrouk, M. A. Mahjoub, and C. B. Amar. 2023. “Robust Hybrid Watermarking Approach for 3D Multiresolution Meshes Based on Spherical Harmonics and Wavelet Transform.” Multimedia Tools and Applications 82 (26): 1–26. https://doi.org/10.1007/s11042-023-14722-5.
  • Tsai, H. H., Y. S. Lai, and S. C. Lo. 2013. “A Zero-Watermark Scheme with Geometrical Invariants Using SVM and PSO Against Geometrical Attacks for Image Protection.” Journal of Systems and Software 86 (2): 335–348. https://doi.org/10.1016/j.jss.2012.08.040.
  • Wang, K., G. Lavoué, F. Denis, and A. Baskurt. 2011. “Robust and Blind Mesh Watermarking Based on Volume Moments.” Computers & Graphics 35 (1): 1–19. https://doi.org/10.1016/j.cag.2010.09.010.
  • Wang, C., X. Wang, Z. Xia, and C. Zhang. 2019. “Ternary Radial Harmonic Fourier Moments Based Robust Stereo Image Zero-Watermarking Algorithm.” Information Sciences 470:109–120. https://doi.org/10.1016/j.ins.2018.08.028.
  • Wang, X., and Y. Zhan. 2019. “A Zero-Watermarking Scheme for Three-Dimensional Mesh Models Based on Multi-Features.” Multimedia Tools and Applications 78 (19): 27001–27028. https://doi.org/10.1007/s11042-017-4666-1.
  • Wang, S., L. Zhang, Q. Zhang, and Y. Li. 2023. “A Zero-Watermarking Algorithm for Vector Geographic Data Based on Feature Invariants.” Earth Science Informatics 16 (1): 1073–1089. https://doi.org/10.1007/s12145-022-00886-5.
  • Xia, Z., X. Wang, B. Han, Q. Li, X. Wang, C. Wang, and T. Zhao. 2021. “Color Image Triple Zero-Watermarking Using Decimal-Order Polar Harmonic Transforms and Chaotic System.” Signal Processing 180:107864. https://doi.org/10.1016/j.sigpro.2020.107864.
  • Xia, Z., C. Wang, B. Ma, Q. Li, H. Zhang, M. Wang, and X. Wang. 2023. “Geometric Attacks Resistant Double Zero-Watermarking Using Discrete Fourier Transform and Fractional-Order Exponent-Fourier Moments.” Digital Signal Processing 140:104097. https://doi.org/10.1016/j.dsp.2023.104097.
  • Yu, K., L. Chen, Z. Fu, Y. Wang, and T. Lu. 2022. “A Coding Layer Robust Reversible Watermarking Algorithm for Digital Image in Multi-Antenna System.” Signal Processing 199:108630. https://doi.org/10.1016/j.sigpro.2022.108630.
  • Zhang, M., W. Ding, Y. Li, J. Sun, and Z. Liu. 2023. “Color Image Watermarking Based on a Fast Structure-Preserving Algorithm of Quaternion Singular Value Decomposition.” Signal Processing 208:108971. https://doi.org/10.1016/j.sigpro.2023.108971.
  • Zhang, L., H. Yan, R. Zhu, and P. Du. 2020. “Combinational Spatial and Frequency Domains Watermarking for 2D Vector Maps.” Multimedia Tools and Applications 79 (41–42): 31375–31387. https://doi.org/10.1007/s11042-020-09573-3.
  • Zhu, J., Y. Tan, X. Wang, and P. Wu. 2021. “BIM/GIS Integration for Web GIS-Based Bridge Management.” Annals of GIS 27 (1): 99–109. https://doi.org/10.1080/19475683.2020.1743355.