Onion-Hash: A Compact and Robust 3D Perceptual Hash for Asset Authentication

被引:0
|
作者
Prummer, Michael [1 ]
Regnath, Emanuel [1 ]
Kosch, Harald [2 ]
机构
[1] Siemens AG, D-81739 Munich, Germany
[2] Univ Passau, Innstr 41, D-94032 Passau, Germany
关键词
3D perceptual hash; Tamper detection; 3D model authentication; Intellectual property; Shape retrieval; SEARCH;
D O I
10.1016/j.cad.2024.103752
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The digitalization of manufacturing processes and recent trends, such as the Industrial Metaverse, are continuously increasing in adoption in various critical industries, resulting in a surging demand for 3D CAD models and their exchange. Following this, it becomes necessary to protect the intellectual property of content designers in increasingly decentralized production environments where 3D assets are repeatedly shared online within the ecosystem. CAD models can be protected by traditional security methods such as watermarking, which embeds additional information into the file. Nevertheless, malicious actors may find ways to remove the information from a file. To authenticate and protect 3D models without relying on additional information, we propose a robust 3D perceptual hash generated based on the prevalent geometric features. Furthermore, our geometry-based approach generates compact and tamper-resistant fingerprints for a 3D model by projecting multiple spherical sliced layers of intersection points into cluster distances. The resulting hash links the 3D model to an owner, supporting the detection of counterfeits. The approach was benchmarked for similarity search and evaluated against established state-of-the-art shape retrieval techniques. The results show promising resistance against arbitrary transformations and manipulations, with our approach detecting 25.6% more malicious tampering attacks than the baseline.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] FEATURE MATCHING OF MULTI-VIEW 3D MODELS BASED ON HASH BINARY ENCODING
    Li, H.
    Zhao, T.
    Li, N.
    Cai, Q.
    Du, J.
    NEURAL NETWORK WORLD, 2017, 27 (01) : 95 - 105
  • [42] Protecting secret keys with fuzzy fingerprint vault based on a 3D geometric hash table
    Lee, Sungju
    Moon, Daesung
    Jung, Seunghwan
    Chung, Yongwha
    ADAPTIVE AND NATURAL COMPUTING ALGORITHMS, PT 2, 2007, 4432 : 432 - +
  • [43] An Improved Perceptual Hash Algorithm Based on U-Net for the Authentication of High-Resolution Remote Sensing Image
    Ding, Kaimeng
    Yang, Zedong
    Wang, Yingying
    Liu, Yueming
    APPLIED SCIENCES-BASEL, 2019, 9 (15):
  • [44] Hash Encoding and Brightness Correction in 3D Industrial and Environmental Reconstruction of Tidal Flat Neural Radiation
    Ge, Huilin
    Wang, Biao
    Zhu, Zhiyu
    Zhu, Jin
    Zhou, Nan
    SENSORS, 2024, 24 (05)
  • [45] 基于Hash函数的分块3D网格模型脆弱水印算法
    孔祥增
    李应
    计算机应用与软件, 2009, 26 (04) : 85 - 86
  • [46] A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images
    Ding, Kaimeng
    Liu, Yueming
    Xu, Qin
    Lu, Fuqiang
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2020, 9 (08)
  • [47] A 3D-hash function for fast image indexing and retrieval
    Mughal, M. Shahazad
    Nawaz, M.
    Ahmad, Farhan
    Shahzad, Saadia
    Bhatti, A. K.
    Mohsin, S.
    COMPUTER GRAPHICS, IMAGING AND VISUALISATION: NEW ADVANCES, 2007, : 341 - +
  • [48] 3D asset virtualisation
    Somali, Saeed Al
    Karkoutli, Issam
    Hydrocarbon Engineering, 2015, 20 (03): : 99 - 104
  • [49] A robust video hash scheme based on 2D-DCT temporal maximum occurrence
    Chen, Qian
    Tian, Jun
    Yang, Lei
    Wu, Dapeng
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (12) : 1369 - 1377
  • [50] 一类3D四翼倍增混沌系统及Hash函数算法
    齐芳
    张晓丹
    聂少敏
    赵经纬
    贺思涵
    济南大学学报(自然科学版), 2016, 30 (03) : 195 - 202