Technique for Protecting Copyrights of Digital Data for 3-D Printing, and Its Application to Low Infill Density Objects (original) (raw)

Copyright Protection for 3D Printing by Embedding Information Inside Real Fabricated Objects

Proceedings of the 10th International Conference on Computer Vision Theory and Applications, 2015

This paper proposes a technique that can protect the copyrights of digital content for 3D printers. It embeds the information on copyrights inside real objects fabricated with 3D printers by forming a fine structure inside the objects as a watermark. Information on copyrights is included in the content before data are input into the 3D printer. This paper also presents a technique that can non-destructively read out information from inside real objects by using thermography. We conducted experiments where we structured fine cavities inside the objects by disposition, which expressed binary code depending on whether or not the code was at a designated position. The results obtained from the experiments demonstrated that binary code could be read out successfully when we used micro-cavities with a horizontal size of 2 x 2 mm, and character information using ASCCI code could be embedded and read out correctly. These results demonstrated the feasibility of the technique we propose.

Number of Detectable Gradations in X-Ray Photographs of Cavities Inside 3-D Printed Objects

IEICE Transactions on Information and Systems

We evaluated a technique for protecting the copyright of digital data for 3-D printing. To embed copyright information, the inside of a 3-D printed object is constructed from fine domains that have different physical characteristics from those of the object's main body surrounding them, and to read out the embedded information, these fine domains inside the objects are detected using nondestructive inspections such as Xray photography or thermography. In the evaluation, copyright information embedded inside the 3-D printed object was expressed using the depth of fine cavities inside the object, and X-ray photography were used for reading them out from the object. The test sample was a cuboid 46 mm wide, 42 mm long, and 20 mm deep. The cavities were 2 mm wide and 2 mm long. The difference in the depths of the cavities appeared as a difference in the luminance in the X-ray photographs, and 21 levels of depth could be detected on the basis of the difference in luminance. These results indicate that under the conditions of the experiment, each cavity expressed 4 to 5 bits of information with its depth. We demonstrated that the proposed technique had the possibility of embedding a sufficient volume of information for expressing copyright information by using the depths of cavities.

Securing Copyright Using 3D Objects Blind Watermarking Scheme

Computers, Materials & Continua

Recently, securing Copyright has become a hot research topic due to rapidly advancing information technology. As a host cover, watermarking methods are used to conceal or embed sensitive information messages in such a manner that it was undetectable to a human observer in contemporary times. Digital media covers may often take any form, including audio, video, photos, even DNA data sequences. In this work, we present a new methodology for watermarking to hide secret data into 3-D objects. The technique of blind extraction based on reversing the steps of the data embedding process is used. The implemented technique uses the features of the 3-D object vertex' discrete cosine transform to embed a grayscale image with high capacity. The coefficient of vertex and the encrypted picture pixels are used in the watermarking procedure. Additionally, the extraction approach is fully blind and is dependent on the backward steps of the encoding procedure to get the hidden data. Correlation distance, Euclidean distance, Manhattan distance, and the Cosine distance are used to evaluate and test the performance of the proposed approach. The visibility and imperceptibility of the proposed method are assessed to show the efficiency of our work compared to previous corresponding methods.

Digital Rights Management in 3D Printing: A Proposed Reference Architecture for Design-to-Fabrication Security and Licensing

3D printing technology has matured over the years and is being seen as one of the emerging and promising technologies having impacts in a diversity of industries such as in automotive, aircraft, electronics, biomedical, toys, etc. Not only are they capable of producing parts of systems, but also fully functional components. This technology has also generated a paradigm shift in the way companies operate in this domain – companies would invest in the design and offer the 3D designs as 'products' for sale or for licensing, without being actually engaged in their manufacture. This has necessitated the distribution of 3D designs from design centers to paying/subscribing end users and manufacturers. It has thus become crucial to protect the designs from unauthorized uses. This paper explores the use of Digital Rights Management for ensuring proper and authorized use of 3D designs in a Trusted Computing based 3D printer, supporting the licensing and protection of intellectual property of the 3D designs, as well as in attesting to the authenticity of the printed products via embedded cryptographic signatures.

Copyright protection of 3D images using watermarks of specific spatial structure

Proceedings. IEEE International Conference on Multimedia and Expo, 2000

A novel blind method for 3D image watermarking robust against geometric distortions is proposed. A ternary watermark is embedded in a grayscale or a color 3D volume. Construction of watermarks having appropriate structure enables fast and robust watermark detection even after several geometric distortions of the watermarked volume. Simulation results indicate the ability of the proposed method to deal with the aforementioned attacks. The proposed method is also robust against lossy compression up to a certain compression ratio.

Blind Watermarking for 3D Printed Objects by Locally Modifying Layer Thickness

IEEE Transactions on Multimedia

We propose a new blind watermarking algorithm for three-dimensional (3D) printed objects that has applications in metadata embedding, robotic grasping, counterfeit prevention, and crime investigation. Our method can be used on fused deposition modeling (FDM) 3D printers and works by modifying the printed layer thickness on small patches of the surface of an object. These patches can be applied to multiple regions of the object, thereby making it resistant to various attacks such as cropping, local deformation, local surface degradation, or printing errors. The novelties of our method are the use of the thickness of printed layers as a one-dimensional carrier signal to embed data, the minimization of distortion by only modifying the layers locally, and one-shot detection using a common paper scanner. To correct encoding or decoding errors, our method combines multiple patches and uses a two-dimensional (2D) parity check to estimate the error probability of each bit to obtain a higher correction rate than a naive majority vote. The parity bits included in the patches have a double purpose because, in addition to error detection, they are also used to identify the orientation of the patches. In our experiments, we successfully embedded a watermark into flat surfaces of 3D objects with various filament colors using a standard FDM 3D printer, extracted it using a common 2D paper scanner and evaluated the sensitivity to surface degradation and signal amplitude.

Digital Audio Signature for 3D Printing Integrity

IEEE Transactions on Information Forensics and Security

Additive manufacturing (AM, or 3D printing) is a novel manufacturing technology that has been adopted in industrial and consumer settings. However, the reliance of this technology on computerization has raised various security concerns. In this paper, we address issues associated with sabotage via tampering during the 3D printing process by presenting an approach that can verify the integrity of a 3D printed object. Our approach operates on acoustic side-channel emanations generated by the 3D printer's stepper motors, which results in a non-intrusive and real-time validation process that is difficult to compromise. The proposed approach constitutes two algorithms. The first algorithm is used to generate a master audio fingerprint for the verifiable unaltered printing process. The second algorithm is applied when the same 3D object is printed again, and this algorithm validates the monitored 3D printing process by assessing the similarity of its audio signature with the master audio fingerprint. To evaluate the quality of the proposed thresholds, we identify the detectability thresholds for the following minimal tampering primitives: insertion, deletion, replacement, and modification of a single tool path command. By detecting the deviation at the time of occurrence, we can stop the printing process for compromised objects, thus saving time and preventing material waste. We discuss various factors that impact the method, such as background noise, audio device changes, and different audio recorder positions.

Information Embedding in Additive Manufacturing through Printing Speed Control

Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, 2021

Additive manufacturing (AM) is rapidly developing, and new applications are continuously emerging. While AM is increasingly becoming integral to many industries, including aerospace, automotive, and biomedical, it has opened a host of unique security concerns, from theft of technical data to process sabotage and counterfeiting. In this work, we present a method to address the counterfeiting problem by embedding information in additively manufactured parts through controlling printing process parameters. Variations in printing speed, the encoding parameter in this work, introduce subtle localized height differences on parts' surfaces, which are readable using an optical profilometer. The profilometry data is captured after printing, and this data is processed to predict the intended bit response for each embedding region on the surface of the part. We experimentally demonstrate the feasibility of the proposed scheme for embedding and reading the information in 3D printed parts and show that it achieves 80% accuracy for a 53 mm/s difference in printing speed between the encoded bits. Finally, we characterize the performance of the proposed scheme, measured as the accuracy in decoded messages, as a function of the difference in printing speed used to perform the embedding. CCS CONCEPTS • Security and privacy → Security in hardware.

Blind Watermarking for Copyright Protection of 3D CAD Drawing

2006 8th International Conference Advanced Communication Technology, 2006

As of late, interest in digital image web and web 3D applicable, the necessity of copyright protection is on the rise. techniques is growing; in consequence a watermarking research Watermark embedding technologies that use the latest 3D that protect to copyright of 3D graphic model has been polygon model to solve these problems have begun to be processing. Currently there is much research being done in studied. developing a watermarking technique for graphic data; however, Ohbuchi et al. presented watermarking three-dimensional watermarking technique based on CAD drawing leaves. m something to be desired. This paper proposes a digita polygonal model through geometric and topological watermarking technique for 3D design drawing using Line and modification [3]. Mao et al. presented watermarking 3D 3DFACE based on vertex in CAD system to prevent geometric modelthroughtriangle subdivision [4]. Beneden et infringement of copyright from unlawfulness reproductions and al. also presented an algorithm that adds a watermark by distribution. By experimental result, we confirmed robustness modifying the normal distribution of the model geometry [5]. and invisibility of embedded watermarks in several conversions Kanai et al. presented watermarking for 3D polygons using of 3D CAD drawing. multiresolution wavelet decomposition [6]. Ohbuchi et al. [7] presented a method to insert watermark at each vertex after Keywords-3D CAD, design drawing, digital watermarking, dividing rectangles that have vertices of fixed quantity using geometrical attack, copyright protection. quadtree way in Vector Digital Map. Jang et al. [8] presented watermarking about 2D CAD architectural drawing. This

Technologies for 3D Model Watermarking: A Survey

2007

Due to the explosive growth of Internet and the development of digital content designing and processing techniques, many valuable materials can be represented in digital forms for exhibition and access via Internet. Due to the characteristics of easy duplication and modification of digital contents, it is necessary to develop a variety of watermarking techniques for various protection purposes such as ownership claiming and authentication. In this survey paper, we examine 3D model watermarking technologies developed over the last decade. We classify various algorithms into two classes: robust watermarking and fragile watermarking. We describe main ideas behind each class, and compare the advantages and disadvantages of the algorithms in each class. Finally, we address some trends in the 3D model watermarking technology development.