Onion-Hash: A Compact and Robust 3D Perceptual Hash for Asset Authentication

IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, SOFTWARE ENGINEERING Computer-Aided Design Pub Date : 2024-06-22 DOI:10.1016/j.cad.2024.103752
Michael Prummer , Emanuel Regnath , Harald Kosch
{"title":"Onion-Hash: A Compact and Robust 3D Perceptual Hash for Asset Authentication","authors":"Michael Prummer ,&nbsp;Emanuel Regnath ,&nbsp;Harald Kosch","doi":"10.1016/j.cad.2024.103752","DOIUrl":null,"url":null,"abstract":"<div><p>The digitalization of manufacturing processes and recent trends, such as the Industrial Metaverse, are continuously increasing in adoption in various critical industries, resulting in a surging demand for 3D CAD models and their exchange. Following this, it becomes necessary to protect the intellectual property of content designers in increasingly decentralized production environments where 3D assets are repeatedly shared online within the ecosystem. CAD models can be protected by traditional security methods such as watermarking, which embeds additional information into the file. Nevertheless, malicious actors may find ways to remove the information from a file. To authenticate and protect 3D models without relying on additional information, we propose a robust 3D perceptual hash generated based on the prevalent geometric features. Furthermore, our geometry-based approach generates compact and tamper-resistant fingerprints for a 3D model by projecting multiple spherical sliced layers of intersection points into cluster distances. The resulting hash links the 3D model to an owner, supporting the detection of counterfeits. The approach was benchmarked for similarity search and evaluated against established state-of-the-art shape retrieval techniques. The results show promising resistance against arbitrary transformations and manipulations, with our approach detecting 25.6% more malicious tampering attacks than the baseline.</p></div>","PeriodicalId":50632,"journal":{"name":"Computer-Aided Design","volume":"175 ","pages":"Article 103752"},"PeriodicalIF":3.0000,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer-Aided Design","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0010448524000794","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
引用次数: 0

Abstract

The digitalization of manufacturing processes and recent trends, such as the Industrial Metaverse, are continuously increasing in adoption in various critical industries, resulting in a surging demand for 3D CAD models and their exchange. Following this, it becomes necessary to protect the intellectual property of content designers in increasingly decentralized production environments where 3D assets are repeatedly shared online within the ecosystem. CAD models can be protected by traditional security methods such as watermarking, which embeds additional information into the file. Nevertheless, malicious actors may find ways to remove the information from a file. To authenticate and protect 3D models without relying on additional information, we propose a robust 3D perceptual hash generated based on the prevalent geometric features. Furthermore, our geometry-based approach generates compact and tamper-resistant fingerprints for a 3D model by projecting multiple spherical sliced layers of intersection points into cluster distances. The resulting hash links the 3D model to an owner, supporting the detection of counterfeits. The approach was benchmarked for similarity search and evaluated against established state-of-the-art shape retrieval techniques. The results show promising resistance against arbitrary transformations and manipulations, with our approach detecting 25.6% more malicious tampering attacks than the baseline.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
洋葱散列:用于资产认证的紧凑而稳健的 3D 感知哈希算法
制造流程的数字化和工业元宇宙等最新趋势在各关键行业的应用不断增加,导致对 3D CAD 模型及其交换的需求激增。因此,在日益分散的生产环境中,三维资产在生态系统中反复在线共享,因此有必要保护内容设计者的知识产权。CAD 模型可以通过传统的安全方法进行保护,如在文件中嵌入附加信息的水印。然而,恶意行为者可能会找到从文件中删除信息的方法。为了验证和保护三维模型而不依赖附加信息,我们提出了一种基于普遍几何特征生成的稳健三维感知散列。此外,我们基于几何特征的方法通过将多个球形切片层的交点投影到集群距离中,为三维模型生成紧凑、防篡改的指纹。由此产生的哈希值将三维模型与所有者联系起来,从而支持对假冒产品的检测。对该方法进行了相似性搜索基准测试,并与现有的最先进形状检索技术进行了评估。结果表明,该方法具有良好的抗任意变换和篡改能力,比基准方法多检测出 25.6% 的恶意篡改攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computer-Aided Design
Computer-Aided Design 工程技术-计算机:软件工程
CiteScore
5.50
自引率
4.70%
发文量
117
审稿时长
4.2 months
期刊介绍: Computer-Aided Design is a leading international journal that provides academia and industry with key papers on research and developments in the application of computers to design. Computer-Aided Design invites papers reporting new research, as well as novel or particularly significant applications, within a wide range of topics, spanning all stages of design process from concept creation to manufacture and beyond.
期刊最新文献
Extracting fiber paths from the optimized lamination parameters of variable-stiffness laminated shells based on physic-informed neural network A Hybrid Recognition Framework for Highly Interacting Machining Features Based on Primitive Decomposition, Learning and Reconstruction Editorial Board SITF: A Self-Supervised Iterative Training Framework for Point Cloud Denoising Two-Level High-Resolution Structural Topology Optimization with Equilibrated Cells
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1