DOI QR코드

DOI QR Code

An Effective Encryption Algorithm for 3D Printing Model Based on Discrete Cosine Transform

  • Pham, Ngoc-Giao (Dept. of IT Convergence and Application Engineering, Pukyong National University) ;
  • Moon, Kwnag-Seok (Dept. of Electronics Engineering, Pukyong National University) ;
  • Lee, Suk-Hwan (Dept. of Information Security, Tongmyong University) ;
  • Kwon, Ki-Ryong (Dept. of IT Convergence and Application Engineering, Pukyong National University)
  • Received : 2017.11.15
  • Accepted : 2018.01.05
  • Published : 2018.01.31

Abstract

In this paper, we present an effective encryption algorithm for 3D printing models in the frequency domain of discrete cosine transform to prevent illegal copying, access in the secured storage and transmission. Facet data of 3D printing model is extracted to construct a three by three matrix that is then transformed to the frequency domain of discrete cosine transform. The proposed algorithm is based on encrypting the DC coefficients of matrixes of facets in the frequency domain of discrete cosine transform in order to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The proposed algorithm is provide a better method and more security than previous methods.

Keywords

References

  1. United States Government Accountability Office, 3D Printing Opportunities, Challenges, and Policy Implications of Additive Manufacturing, USA, 2015.
  2. A.T. Kearney, 3D Printing: A Manufacturing Revolution, Korea, 2015.
  3. G. Strang, "The Discrete Cosine Transform," Society for Industrial and Applied Mathematics, Vol. 41, No. 1, pp. 135-147, 1999.
  4. S.H. Lee, S.G. Kwon, and K.R. Kwon, "Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol," Journal of Korea Multimedia Society, Vol. 12, No. 2, pp. 244-256, 2009.
  5. Q. Ai, Q. Liu, D. Zhou, L. Yang, and Q. Xi, "A New Digital Watermarking Scheme for 3D Triangular Mesh Models," Journal of Signal Processing, Vol. 89, pp. 2159-2170, 2009. https://doi.org/10.1016/j.sigpro.2009.04.031
  6. E. Marc, Y. Maetz, and D. Gwenael, "Geometry-preserving Encryption for 3D Meshes," Proceeding of Conference: Compression at Representation Signal Audio, pp. 7-12, 2013.
  7. X.T. Cai, F.Z. He, W.D. Li, X.X. Li, and Y.Q. Wu, "Encryption Based Partial Sharing of CAD Models," Integrated Computer-Aided Engineering, Vol. 22, pp. 243-260, 2015. https://doi.org/10.3233/ICA-150487
  8. X.T. Cai, W.D. Li, F.Z. He, and X.X. Li, "Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment," Journal of Manufacturing Science and Engineering, Vol. 137, pp. 1-10, 2015.
  9. X.T. Cai, F.Z. He, W.D. Li, X.X. Li, and Y.Q. Wu, "Parametric and Adaptive Encryption of Feature-Based Computer-Aided Design Models for Cloud-based Collaboration," Integrated Computer-Aided Engineering, Vol. 24, pp. 129-142, 2017. https://doi.org/10.3233/ICA-160535
  10. STL format in 3D printing, https://all3dp.com/what-is-stl-file-format-extension-3d-printing, accessed 2018.
  11. The Virtual Reality Modeling Language, http://www.cacr.caltech.edu/-slombey/asci/vrml/, accessed 2018.
  12. RSA Lab., Password-Based Cryptography Standard, 2006.