• Title/Summary/Keyword: 3D Printing Security

Search Result 10, Processing Time 0.026 seconds

Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain

  • Pham, Giao N.;Kwon, Ki-Ryong;Lee, Eung-Joo;Lee, Suk-Hwan
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.4
    • /
    • pp.152-159
    • /
    • 2017
  • Three-dimensional (3D) printing is applied to many areas of life, but 3D printing models are stolen by pirates and distributed without any permission from the original providers. Moreover, some special models and anti-weapon models in 3D printing must be secured from the unauthorized user. Therefore, 3D printing models must be encrypted before being stored and transmitted to ensure access and to prevent illegal copying. This paper presents a selective encryption algorithm for 3D printing models based on clustering and the frequency domain of discrete cosine transform. All facets are extracted from 3D printing model, divided into groups by the clustering algorithm, and all vertices of facets in each group are transformed to the frequency domain of a discrete cosine transform. The proposed algorithm is based on encrypting the selected coefficients in the frequency domain of discrete cosine transform to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The decrypting error is approximated to be zero. The proposed algorithm provides a better method and more security than previous methods.

An Effective Encryption Algorithm for 3D Printing Model Based on Discrete Cosine Transform

  • Pham, Ngoc-Giao;Moon, Kwnag-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.1
    • /
    • pp.61-68
    • /
    • 2018
  • In this paper, we present an effective encryption algorithm for 3D printing models in the frequency domain of discrete cosine transform to prevent illegal copying, access in the secured storage and transmission. Facet data of 3D printing model is extracted to construct a three by three matrix that is then transformed to the frequency domain of discrete cosine transform. The proposed algorithm is based on encrypting the DC coefficients of matrixes of facets in the frequency domain of discrete cosine transform in order to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The proposed algorithm is provide a better method and more security than previous methods.

3D Printing Watermarking Method Based on Radius Curvature of 3D Triangle

  • Pham, Ngoc-Giao;Song, Ha-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1951-1959
    • /
    • 2017
  • Due to the fact that 3D printing is applied to many areas of life, 3D printing models are often used illegally without any permission from the original providers. This paper presents a novel watermarking algorithm for the copyright protection and ownership identification for 3D printing based on the radius curvature of 3D triangle. 3D triangles are extracted and classified into groups based on radius curvature by the clustering algorithm, and then the mean radius curvature of each group will be computed for watermark embedding. The watermark data is embedded to the groups of 3D triangle by changing the mean radius curvature of each group. In each group, we select a 3D triangle which has the nearest radius curvature with the changed mean radius curvature. Finally, we change the vertices of the selected facet according to the changed radius curvature has been embedded watermark. In experiments, the distance error between the original 3D printing model and the watermarked 3D printing model is approximate zero, and the Bit Error Rate is also very low. From experimental results, we verify that the proposed algorithm is invisible and robustness with geometric attacks rotation, scaling and translation.

Didactic Principles Of Education Students 3D-printing

  • Lukianchuk, Iurii;Tulashvili, Yurii;Podolyak, Volodymyr;Horbariuk, Roman;Kovalchuk, Vasyl;Bazyl, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.443-450
    • /
    • 2022
  • The method of studying 3D-technologies abroad and in Ukraine is considered. The analysis of educational resources and experience of use of the equipment in branch is carried out. The didactic principles of the educational process for 3D-printing specialists are determined. The use of FDM technology and the ability to minimize the occurrence of defects in the future have been studied. An analysis of the international experience of the educational process of relevant specialists in the field. The content of training for 3D printing specialists has been developed. The experience of using 3D-technologies is described and the list of recommendations for elimination of defects during production of products by means of additive technologies is made. The recommendations will be useful not only for beginners, but also for experienced professionals in additive technologies. The need to study such experience is the main condition for the development of enterprises in Ukraine that plan to automate their own production. A 3D printing engineer must know the basics of economics and marketing, because his responsibilities include optimizing workflows to reduce the cost and speed up printing. Therefore, the knowledge gained from practical experience presented and in building for learning 3D printing engineers by the authors will be important.

The Role of Computer Technologies in Contemporary Jewelry

  • Romanenkova, Julia;Bratus, Ivan;Gnatiuk, Liliia;Zaitseva, Veronika;Karpenko, Olga;Misko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.71-76
    • /
    • 2022
  • The article aims to consider the role of computer technologies in contemporary jewelry art. The importance of computer programming, 3D-modeling and 3D-printing for the process of jewelry creating, its advertising and sales is emphasized. Both the positive features of the possibility of using computer technologies in jewelry and their shortcomings are considered. The process of changing the nature of jewelry design after the start of the use of digital technologies is highlighted. The issue of changing the perception and evaluation of a work of jewelry art, the creation of which uses mechanization, has been updated.

3D Printing Open Source Software Security Vulnerabilities Analysis and Alternative Software Studies (3D프린팅 오픈소스 소프트웨어 보안취약점 분석 및 대체 소프트웨어에 대한 연구)

  • Kim, Jae-Min;Lee, Deok-Gyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.428-430
    • /
    • 2020
  • 국내 3D프린터 사용자가 확산되며 3D프린터의 외부확인을 할 수 있는 기능을 원하는 국내 사용자들은 주로 사용하는 원격 모니터링 기능을 수행하는 오픈 소스인 OctoPrint (이하 옥토프린트)사용한다. 하지만 최근, 옥토프린트에 대한 보안 이슈가 등장하였고 이를 경험한 사용자들에게 새로운 보안 방안이 요구된다. 본 논문에서는 옥토프린트의 단점과 보안 취약점을 설명하고, 옥토프린트의 공식 사이트에서 권장하는 보안 설정을 분석하여 특징을 조사하였다. 기존 옥토프린트의 편의성 개선을 위해서 동일 기능을 수행하는 프로토타입을 구현하여 앞으로의 원격 제어 모니터링 시스템 구현에 대해 연구하였다.

Digital Competencies Required for Information Science Specialists at Saudi Universities

  • Yamani, Hanaa;AlHarthi, Ahmed;Elsigini, Waleed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.212-220
    • /
    • 2021
  • The objectives of this research were to identify the digital competencies required for information science specialists at Saudi universities and to examine whether there existed conspicuous differences in the standpoint of these specialists due to years of work experience with regard to the importance of these competencies. A descriptive analytical method was used to accomplish these objectives while extracting the required digital competency list and ascertaining its importance. The research sample comprised 24 experts in the field of information science from several universities in the Kingdom of Saudi Arabia. The participants in the sample were asked to complete a questionnaire prepared to acquire the pertinent data in the period between January 5, 2021 and January 20, 2021. The results reveal that the digital competencies required for information science specialists at Saudi universities encompass general features such as the ability to use computer, Internet, Web2, Web3, and smartphone applications, digital learning resource development, data processing (big data) and its sharing via the Internet, system analysis, dealing with multiple electronic indexing applications and learning management systems and its features, using electronic bibliographic control tools, artificial intelligence tools, cybersecurity system maintenance, ability to comprehend and use different programming languages, simulation, and augmented reality applications, and knowledge and skills for 3D printing. Furthermore, no statistically significant differences were observed between the mean ranks of scores of specialists with less than 10 years of practical experience and those with practical experience of 10 years or more with regard to conferring importance to digital competencies.

A Fatigue Life Prediction by Growth Characteristics of a Small Surface Crack (작은 표면균열의 성장특성에 의한 수명예측)

  • Suh, Chang-Min;Lim, Chang-Soon;Gang, Yong-Gu
    • Journal of Ocean Engineering and Technology
    • /
    • v.3 no.2
    • /
    • pp.617-617
    • /
    • 1989
  • This paper deals with a fatigue life prediction of a surface crack based on the experimentally obtained relationship between surface crack length ratio $a/a_{f}$ and cycle ratio $N/N_{f}$ using micro computer. Firstly $a/a_{f}$-$N/N_{f}$ curves obtained from experimental tests, were assumed as three curves UC(the upper limit curve), LC(the lower limit curve) and MC(the middle curve), and these were utilized to predict the fatigue life. Comparing the calculated values which represent the characteristics of crack growth behaviors from the three assumed curves with the experimental ones, it has been found that in the stable crack growth region, they coincide reasonably well each other. And the differences between the fatigue lives obtained from the assumed curves and the experimental fatigue life did not exceed 20%. Using the characteristics of $a/a_{f}$-$N/N_{f}$ curves, it is possible to predict the da/dN-Kmax curves and the S-$N_{f}$ curves.

Privacy-preserving Customized Order Service Protocol based on Smart Contract in Smart Factory (프라이버시를 제공하는 스마트 컨트랙트 기반의 스마트 팩토리 주문제작 프로토콜)

  • Lee, YongJoo;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.215-222
    • /
    • 2019
  • Advances in technologies about 3D (three-dimensional) printing and smart factory related issues will have the effect of reducing the cost of building a smart factory and making various types of service available. Manufacturers and service providers of small assets work with outside experts to provide small amounts of customized ordering services. If customers have to disclose their private information to subscribe to a new service, they may be reluctant to use it and the availability of developed technology may cause slow progress. We propose a new protocol for customized order service for smart factory. The proposed approach is designed to meet requirements of security and based on smart contract in IoT convergence network. We analyzed the requirements of the proposed approach which provided anonymity, privacy, fairness, and non-repudiation. We compared it with closely related studies to show originality and differences.

Digital Barrier-Free and Psychosocial Support for Students with Disabilities in Distance Learning Environments

  • Kravchenko, Oksana;Koliada, Natalia;Berezivska, Larysa;Dikhtyarenko, Svitlana;Baida, Svitlana;Danylevych, Larysa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.15-24
    • /
    • 2022
  • The article clarifies the conditions for information, digital and educational accessibility for higher education seekers with disabilities in terms of distance learning caused by quarantine restrictions. It is established that such conditions are regulated by international and Ukrainian legal documents (The Standard Rules on the Equalization of Opportunities for Persons with Disabilities, Convention on the Rights of Persons with Disabilities, Sustainable Development Goals, Law of Ukraine "On Education", Law of Ukraine "On Higher Education", Strategy for the Development of Higher Education in Ukraine 2021-2031, Development Strategy areas of innovation for the period up to 2030, Development strategy of the sphere of innovation activity for the period up to 2030). As a part of information barrierlessness, Higher Education Institutions (HEI) should provide access to information in various formats and using technologies, in particular Braille script, large-type printing, audio description (audio descriptive commenting), sign language interpretation, subtitling, a format suitable for reading by screen access programs, formats of simple speech, easy-to-read formats, means of alternative communication. The experience of Pavlo Tychyna Uman State Pedagogical University is described. In particular, special attention is paid to the study of sign language: in view of this, the initiative group implemented the project "Learning to hear and overcome social isolation together" with the financial support of the British Council in Ukraine. Within the framework of digital accessibility, the official website of the Faculty of Social and Psychological Education has been adapted for the visually impaired in accordance with WCAG 2.0 World Standards. In 2021, Pavlo Tychyna Uman State Pedagogical University implemented the project "Cultural, Recreational and Tourist Cherkasy Region: Inclusive Social 3D Map" funded by the Ukrainian Cultural Foundation; a site with available content for online travel in the region to provide barrier-free access to the historical and cultural heritage of Cherkasy region was created. Educational accessibility is achieved by increasing the number of people with special educational needs, receiving education in inclusive groups; activities of the Center for Social and Educational Integration and Inclusive Rehabilitation Social Tourism "Bez barieriv" ("Without barriers"); implementation of a research topic for financing the Ministry of Education and Science of Ukraine: "Social and psychological rehabilitation of children and youth with special educational needs by means of inclusive tourism"; implementation of the project "Social inclusion of distance educational process"; development of information campaigns to popularize the ideas of accessibility, the need for its implementation, ongoing training programs and competitions, etc.