Share Email Print
cover

Proceedings Paper

Robust hashing for 3D models
Author(s): Waldemar Berchtold; Marcel Schäfer; Michael Rettig; Martin Steinebach
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

3D models and applications are of utmost interest in both science and industry. With the increment of their usage, their number and thereby the challenge to correctly identify them increases. Content identification is commonly done by cryptographic hashes. However, they fail as a solution in application scenarios such as computer aided design (CAD), scientific visualization or video games, because even the smallest alteration of the 3D model, e.g. conversion or compression operations, massively changes the cryptographic hash as well. Therefore, this work presents a robust hashing algorithm for 3D mesh data. The algorithm applies several different bit extraction methods. They are built to resist desired alterations of the model as well as malicious attacks intending to prevent correct allocation. The different bit extraction methods are tested against each other and, as far as possible, the hashing algorithm is compared to the state of the art. The parameters tested are robustness, security and runtime performance as well as False Acceptance Rate (FAR) and False Rejection Rate (FRR), also the probability calculation of hash collision is included. The introduced hashing algorithm is kept adaptive e.g. in hash length, to serve as a proper tool for all applications in practice.

Paper Details

Date Published: 19 February 2014
PDF: 14 pages
Proc. SPIE 9028, Media Watermarking, Security, and Forensics 2014, 90280R (19 February 2014); doi: 10.1117/12.2042497
Show Author Affiliations
Waldemar Berchtold, Fraunhofer-Institut für Sichere Informations-Technologie (Germany)
Marcel Schäfer, Fraunhofer-Institut für Sichere Informations-Technologie (Germany)
Michael Rettig, Hochschule Darmstadt (Germany)
Martin Steinebach, Fraunhofer-Institut für Sichere Informations-Technologie (Germany)


Published in SPIE Proceedings Vol. 9028:
Media Watermarking, Security, and Forensics 2014
Adnan M. Alattar; Nasir D. Memon; Chad D. Heitzenrater, Editor(s)

© SPIE. Terms of Use
Back to Top
PREMIUM CONTENT
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?
close_icon_gray