Onion-Hash: A Compact and Robust 3D Perceptual Hash for Asset Authentication

被引:0
|
作者
Prummer, Michael [1 ]
Regnath, Emanuel [1 ]
Kosch, Harald [2 ]
机构
[1] Siemens AG, D-81739 Munich, Germany
[2] Univ Passau, Innstr 41, D-94032 Passau, Germany
关键词
3D perceptual hash; Tamper detection; 3D model authentication; Intellectual property; Shape retrieval; SEARCH;
D O I
10.1016/j.cad.2024.103752
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The digitalization of manufacturing processes and recent trends, such as the Industrial Metaverse, are continuously increasing in adoption in various critical industries, resulting in a surging demand for 3D CAD models and their exchange. Following this, it becomes necessary to protect the intellectual property of content designers in increasingly decentralized production environments where 3D assets are repeatedly shared online within the ecosystem. CAD models can be protected by traditional security methods such as watermarking, which embeds additional information into the file. Nevertheless, malicious actors may find ways to remove the information from a file. To authenticate and protect 3D models without relying on additional information, we propose a robust 3D perceptual hash generated based on the prevalent geometric features. Furthermore, our geometry-based approach generates compact and tamper-resistant fingerprints for a 3D model by projecting multiple spherical sliced layers of intersection points into cluster distances. The resulting hash links the 3D model to an owner, supporting the detection of counterfeits. The approach was benchmarked for similarity search and evaluated against established state-of-the-art shape retrieval techniques. The results show promising resistance against arbitrary transformations and manipulations, with our approach detecting 25.6% more malicious tampering attacks than the baseline.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Perceptual Hash Secure Speech Authentication System Based on an Improved Chained DES in the Cloud Environment
    Huang, Yi-Bo
    Pu, Xiang-Rong
    Zhang, Qiu-Yu
    International Journal of Network Security, 2022, 24 (05) : 933 - 946
  • [32] Self-Authentication Scheme Based on Semi-Fragile Watermarking and Perceptual Hash Function
    Rhayma, Hanen
    Makhloufi, Achraf
    Ben Hmida, Ahmed
    2014 FIRST INTERNATIONAL IMAGE PROCESSING, APPLICATIONS AND SYSTEMS CONFERENCE (IPAS), 2014,
  • [33] Robust hash generation technique for content-based image authentication using histogram
    Vadlamudi, Lokanadham Naidu
    Vaddella, Rama Prasad V.
    Devara, Vasumathi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (11) : 6585 - 6604
  • [34] A Compact Hardware Implementation of SM3 Hash Function
    Ao, Tianyong
    He, Zhangqing
    Rao, Jinli
    Dai, Kui
    Zou, Xuecheng
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 846 - 850
  • [35] Robust hash generation technique for content-based image authentication using histogram
    Lokanadham Naidu Vadlamudi
    Rama Prasad V. Vaddella
    Vasumathi Devara
    Multimedia Tools and Applications, 2016, 75 : 6585 - 6604
  • [36] Learning to Hash Logistic Regression for Fast 3D Scan Point Classification
    Behley, Jens
    Kersting, Kristian
    Schulz, Dirk
    Steinhage, Volker
    Cremers, Armin B.
    IEEE/RSJ 2010 INTERNATIONAL CONFERENCE ON INTELLIGENT ROBOTS AND SYSTEMS (IROS 2010), 2010, : 5960 - 5965
  • [37] Real-time hash aggregation for blockchain system with 3D sensor network
    Hirai, Kensei
    Akiyama, Kuon
    Shinkuma, Ryoichi
    Mine, Aramu
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [38] A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
    Das, Ashok Kumar
    Odelu, Vanga
    Goswami, Adrijit
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [39] 2D Hash Chain robust Random Key Distribution scheme
    Ehdaie, Mohammad
    Alexiou, Nikos
    Ahmadian, Mahmoud
    Aref, Mohammad Reza
    Papadimitratos, Panos
    INFORMATION PROCESSING LETTERS, 2016, 116 (05) : 367 - 372
  • [40] WTA Hash-based Multimodal Feature Fusion for 3D Human Action Recognition
    Ye, Jun
    Li, Kai
    Hua, Kien A.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM), 2015, : 184 - 190