Onion-Hash: A Compact and Robust 3D Perceptual Hash for Asset Authentication

被引:0
|
作者
Prummer, Michael [1 ]
Regnath, Emanuel [1 ]
Kosch, Harald [2 ]
机构
[1] Siemens AG, D-81739 Munich, Germany
[2] Univ Passau, Innstr 41, D-94032 Passau, Germany
关键词
3D perceptual hash; Tamper detection; 3D model authentication; Intellectual property; Shape retrieval; SEARCH;
D O I
10.1016/j.cad.2024.103752
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The digitalization of manufacturing processes and recent trends, such as the Industrial Metaverse, are continuously increasing in adoption in various critical industries, resulting in a surging demand for 3D CAD models and their exchange. Following this, it becomes necessary to protect the intellectual property of content designers in increasingly decentralized production environments where 3D assets are repeatedly shared online within the ecosystem. CAD models can be protected by traditional security methods such as watermarking, which embeds additional information into the file. Nevertheless, malicious actors may find ways to remove the information from a file. To authenticate and protect 3D models without relying on additional information, we propose a robust 3D perceptual hash generated based on the prevalent geometric features. Furthermore, our geometry-based approach generates compact and tamper-resistant fingerprints for a 3D model by projecting multiple spherical sliced layers of intersection points into cluster distances. The resulting hash links the 3D model to an owner, supporting the detection of counterfeits. The approach was benchmarked for similarity search and evaluated against established state-of-the-art shape retrieval techniques. The results show promising resistance against arbitrary transformations and manipulations, with our approach detecting 25.6% more malicious tampering attacks than the baseline.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Hash Function for 3D Mesh Model Authentication
    Lee, Suk-Hwan
    Kwon, Ki-Ryong
    Kim, Dong Kyue
    Kwon, Oh-Jun
    2015 21ST KOREA-JAPAN JOINT WORKSHOP ON FRONTIERS OF COMPUTER VISION, 2015,
  • [2] A Secure Perceptual Hash Algorithm for Image Content Authentication
    Weng, Li
    Preneel, Bart
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 108 - 121
  • [3] A Novel Perceptual Hash Algorithm for Multispectral Image Authentication
    Ding, Kaimeng
    Chen, Shiping
    Meng, Fan
    ALGORITHMS, 2018, 11 (01)
  • [4] Robust image authentication using hash function
    Kobayashi, H
    Kiya, H
    TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : A435 - A438
  • [5] A novel evaluation method for perceptual hash algorithm in authentication mode
    Liu, Zhaoqing
    Li, Qiong
    Liu, Jingrui
    Niu, Xiamu
    FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [6] Image authentication based on perceptual hash using Gabor filters
    Wang, Lina
    Jiang, Xiaqiu
    Lian, Shiguo
    Hu, Donghui
    Ye, Dengpan
    SOFT COMPUTING, 2011, 15 (03) : 493 - 504
  • [7] Perceptual hash algorithm for integrity authentication of remote sensing image
    Ding, Kaimeng
    Zhu, Changqing
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2014, 44 (04): : 723 - 727
  • [8] Image authentication based on perceptual hash using Gabor filters
    Lina Wang
    Xiaqiu Jiang
    Shiguo Lian
    Donghui Hu
    Dengpan Ye
    Soft Computing, 2011, 15 : 493 - 504
  • [9] Image alignment based perceptual image hash for content authentication
    Wang, Xiaofeng
    Zhou, Xiaorui
    Zhang, Qian
    Xu, Bingchao
    Xue, Jianru
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2020, 80
  • [10] Robust Perceptual Image Hash Using Gabor Filters
    Wang, Lina
    Jiang, Xiaqiu
    Hu, Donghui
    Ye, Dengpan
    Lian, Shiguo
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 53 - +