Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2775292.2775313acmconferencesArticle/Chapter ViewAbstractPublication Pagesweb3dConference Proceedingsconference-collections
research-article

Applicability of watermarking for intellectual property rights protection in a 3D printing scenario

Published: 18 June 2015 Publication History

Abstract

The potential of 3D printing to revolutionize manufacturing is becoming today a reality. Also referred to a class of Additive Manufacturing (AM) technologies, 3D printing enables mass customization and manufacturing of device components, parts of houses, human organs and even food. It reduces production costs, manufacturing time, and necessary storage space. Due to this success, the protection of Intellectual Property Rights (IPR) for 3D printed models raises increased concerns. Among technologies enabling copyright protection, traitor tracing and authentication, 3D watermarking has received a lot of interest from the research community in the context of 3D digital models.
In this paper we give an overview of the state of the art of 3D digital watermarking and we assess how it could be extended for ensuring the IPR protection of printed 3D models. By considering 3D printing and scanning as an attack, we evaluate the potential of state-of-the-art watermarking techniques to provide both robust protection and also high fidelity as the introduced shape perturbations should not impair the mechanical properties or functionalities of the printed 3D model.

References

[1]
Praun, E., Hoppe, H., & Finkelstein, A. (1999, July). Robust mesh watermarking. In Proceedings of the 26th annual conference on Computer graphics and interactive techniques (pp. 49--56). ACM Press/Addison-Wesley Publishing Co.
[2]
Zafeiriou, S., Tefas, A., & Pitas, I. (2005). Blind robust watermarking schemes for copyright protection of 3D mesh objects. Visualization and Computer Graphics, IEEE Transactions on, 11(5), 596--607.Xavier Rolland-Nevière, Gwenaël Doërr: Anti-Cropping Blind Resynchronization for 3D Watermarking; on Acoustic, Speech Signal Processing (ICASSP) (2015)
[3]
Rolland-Nevière X., Doërr G., Alliez P.: Robust diameterbased thickness estimation of 3D objects; in Graphical Models 75 (2013) 279--296
[4]
Rolland-Nevière X., Doërr G., Alliez P.: Spread Transform and Roughness-based Shaping to Improve 3D Watermarking based on Quadratic Programming; in IEEE International Conference in Image Processing (ICIP) (2014)
[5]
Rondao Alface P.; Macq B.; Cayre F., Blind and robust watermarking of 3D models: How to withstand the cropping attack?. In Image Processing, 2007. ICIP 2007. IEEE International Conference, 2007.
[6]
Mark Yampolskiy, Todd R. Andel, J. Todd McDonald, William B. Glisson, Alec Yasinsac. Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. Proceedings of the 4th Program Protection and Reverse Engineering Workshop (PPREW-4), New Orleans, LA, 9 December 2014
[7]
Fadhel, N. F.; ECS, Univ. of Southampton, Southampton, UK; Crowder, R. M.; Akeel, F.; Wills, G. B.: Component for 3D printing provenance framework: Security properties components for provenance framework. Internet Security (WorldCIS), 2014 World Congress on
[8]
Frederic Lefebvre, D. GuCluy, D. Delannay and B. Macq: A print and scan optimized watermarking scheme. IEEE Fourth Workshop on Multimedia Signal Processint, 2001.
[9]
Xavier Rolland-Nevière, Gwenaël Doërr, Pierre Alliez: Triangle Surface Mesh Watermarking Based on a Constrained Optimization Framework; in IEEE Transactions on Information Forensics and Security (2014)
[10]
J.-S. Tsai, M.-C. Liao, W.-B. Huang, and Y.-H. Kuo. Geodesic distance-based pose-invariant blind watermarking algorithm for three-dimensional triangular mesh model. In Image Processing (ICIP), 17th IEEE International Conference, 2010.
[11]
Ming Luo and Adrian G. Bors. Surface-preserving robust watermarking of 3-D shapes. IEEE Transactions on Image Processing, 2011.
[12]
Guillaume Lavoué, Elisa Drelie Gelasca, Florent Dupont, Atilla Baskurt, and Touradj Ebrahimi. Perceptually-driven 3D distance metrics with application to watermarking. In Applications of Digital Image Processing XXIX, Proceedings of SPIE, August 2006
[13]
Guillaume Lavoué. A multiscale metric for 3D mesh visual quality assessment. Computer Graphics Forum, 30(5):1427--1437, August 2011.
[14]
Fakhri Torkhani, Kai Wang, Jean-Marc Chassery. A curvature-tensor-based Perceptual Quality Metric for 3D Triangular Meshes; in Machine Graphics&Vision (2013)
[15]
Patrice Rondao Alface and Benoit Macq. Blind watermarking of 3d meshes using robust feature points detection. In IEEE International Conference on Image Processing, 2005.
[16]
Ming Luo, Kai Wang, Adrian G. Bors, and Guillaume Lavoué. Local patch blind spectral watermarking method for 3d graphics. In Proceedings of the 8th International Workshop on Digital Watermarking, 2009.
[17]
Daniel Trick, Waldemar Berchtold, Marcel Schäfer, and Martin Steinebach. 3d watermarking in the context of video games. In Proceedings of the IEEE 15th International Workshop on Multimedia Signal Processing, 2013, pages 418--423, September 2013.
[18]
Cayre, F., Rondao-Alface, P., Schmitt, F., Macq, B., & Maitre, H. (2003). Application of spectral decomposition to compression and watermarking of 3D triangle mesh geometry. Signal Processing: Image Communication, 18(4), 309--319.Ming Luo and Adrian G. Bors. Optimized 3D watermarking for minimal surface distortion. IEEE Transactions on Image Processing, 22:1822--1835, May 2013.
[19]
Francois Cayre and Benoit Macq. Data hiding on 3-d triangle meshes. IEEE Transactions on Signal Processing, 51:939--949, April 2003.
[20]
Kwangtaek Kim, Mauro Barni, and Hong Z. Tan. Roughness-adaptive 3-D watermarking based on masking effect of surface roughness. IEEE Transactions on Information Forensics and Security, December 2010.
[21]
Helmut Pottmann, J. Wallner, Q.-X. Huang, and Y.-L. Yang. Integral invariants for robust geometry processing. Computer Aided Geometric Design, 26:37--60, January 2009.
[22]
Roland Hu, Patrice Rondao-Alface, and Benoit Macq. Constrained optimisation of 3D polygonal mesh watermarking by quadratic programming. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing, pages, April 2009.
[23]
Longjiang Yu, Xiamu Niu, Shenghe Sun: Print-and-scan model and the watermarking countermeasure. Image and Vision Computing 23 (2005)
[24]
J. Bennour; J.-L. Dugelay. Protection of 3D object visual representations. ICME 2006, IEEE International Conference on Multimedia & Expo, 2006, Toronto, Canada.
[25]
E. Garcia; J.-L. Dugelay. Texture-based watermarking of 3D video objects. IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, Aug. 2003.
[26]
Yagiz Yasaroglu, A. Aydin Alatan: Optimal Data Embedding in 3D Models for Extraction from 2D Views Using Perspective Invariants, in Digital Forensics and Watermarking (2012)
[27]
I. Cox, J. Bloom, M. Miller: Digital Watermarking, Principles & Practice. Morgan Kaufmann, 2001.
[28]
M. Yampolskiy, T. R. Andel, J. T. McDonald, W. B. Glisson, A. Yasinsac: Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing
[29]
N. F. Fadhel, R. M. Crowder, F. Akeel, G. B. Wills: Component for 3D Printing Provenance framework. World Congress on Internet Security, 2014.
[30]
Wong, K. V., & Hernandez, A. (2012). A review of additive manufacturing. ISRN Mechanical Engineering, 2012.
[31]
Ahn, Daekeon, Hochan Kim, and Seokhee Lee. "Surface roughness prediction using measured data and interpolation in layered manufacturing." Journal of materials processing technology 209.2 (2009): 664--671.
[32]
Neamtu, C., Popescu, S., Popescu, D., & Mateescu, R. (2012). Using reverse engineering in archaeology: ceramic pottery reconstruction. Journal of Automation Mobile Robotics and Intelligent Systems, 6, 55--59.
[33]
Budzik, G., Markowski, T., & Sobola, M. (2008). Analysis of surface roughness of transmission gear teeth made by different rapid prototyping methods. Journal of KONES, 15, 29--34.
[34]
Izadi, S., Kim, D., Hilliges, O., Molyneaux, D., Newcombe, R., Kohli, P., ... & Fitzgibbon, A. (2011, October). KinectFusion: real-time 3D reconstruction and interaction using a moving depth camera. In Proceedings of the 24th annual ACM symposium on User interface software and technology (pp. 559--568). ACM.
[35]
Wang, K., Lavoué, G., Denis, F., Baskurt, A., & He, X. (2010, June). A benchmark for 3D mesh watermarking. In Shape Modeling International Conference (SMI), 2010 (pp. 231--235). IEEE.
[36]
Lipson, H., & Kurman, M. (2013). Fabricated: The new world of 3D printing. John Wiley & Sons.
[37]
Dubey, N. K., & Kumar, S. (2014, April). A Review of Watermarking Application in Digital Cinema for Piracy Deterrence. In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on (pp. 626--630). IEEE.
[38]
Rondao Alface, P., Macq, B. (2007). From 3D mesh data hiding to 3D shape blind and robust watermarking: a survey. In Transactions on data hiding and multimedia security II (pp. 91--115). Springer Berlin Heidelberg.

Cited By

View all
  • (2024)Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design FilesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653276(211-220)Online publication date: 19-Jun-2024
  • (2024)MitM Attacks on Intellectual Property and Integrity of Additive Manufacturing Systems: A Security AnalysisComputers & Security10.1016/j.cose.2024.103810(103810)Online publication date: Mar-2024
  • (2024)3DPS: 3D Printing Signature for Authentication Based on Equipment Distortion ModelDigital Forensics and Watermarking10.1007/978-981-97-2585-4_10(139-150)Online publication date: 25-Apr-2024
  • Show More Cited By

Index Terms

  1. Applicability of watermarking for intellectual property rights protection in a 3D printing scenario

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    Web3D '15: Proceedings of the 20th International Conference on 3D Web Technology
    June 2015
    274 pages
    ISBN:9781450336475
    DOI:10.1145/2775292
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 18 June 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. 3D mesh
    2. 3D printing
    3. watermarking

    Qualifiers

    • Research-article

    Conference

    Web3D '15
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 27 of 71 submissions, 38%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)31
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 15 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Stop Stealing My Data: Sanitizing Stego Channels in 3D Printing Design FilesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653276(211-220)Online publication date: 19-Jun-2024
    • (2024)MitM Attacks on Intellectual Property and Integrity of Additive Manufacturing Systems: A Security AnalysisComputers & Security10.1016/j.cose.2024.103810(103810)Online publication date: Mar-2024
    • (2024)3DPS: 3D Printing Signature for Authentication Based on Equipment Distortion ModelDigital Forensics and Watermarking10.1007/978-981-97-2585-4_10(139-150)Online publication date: 25-Apr-2024
    • (2023)Data Security in Additive ManufacturingAdditive Manufacturing Design and Applications10.31399/asm.hb.v24A.a0006962(203-209)Online publication date: 30-Jun-2023
    • (2023)SOK: Side Channel Monitoring for Additive Manufacturing - Bridging Cybersecurity and Quality Assurance Communities2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP57164.2023.00071(1160-1178)Online publication date: Jul-2023
    • (2023)Perovskite-Based Nanostructures for Fluorescence Afterglow AnticounterfeitingACS Applied Nano Materials10.1021/acsanm.3c016256:10(8990-8998)Online publication date: 4-May-2023
    • (2023)Security Threats in AMSpringer Handbook of Additive Manufacturing10.1007/978-3-031-20752-5_19(303-315)Online publication date: 18-Oct-2023
    • (2022)Embedding Information into or onto Additively Manufactured Parts: A Review of QR Codes, Steganography and Watermarking MethodsMaterials10.3390/ma1507259615:7(2596)Online publication date: 1-Apr-2022
    • (2022)Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design FilesInformation Security10.1007/978-3-031-22390-7_3(40-52)Online publication date: 9-Dec-2022
    • (2021)What Did You Add to My Additive Manufacturing Data?: Steganographic Attacks on 3D Printing FilesProceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3471621.3471843(266-281)Online publication date: 6-Oct-2021
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media