REVIEW OF APPROACHES TO PROTECTING 3D MODELS FROM UNAUTHORIZED DISTRIBUTION
DOI:
https://doi.org/10.26906/SUNZ.2024.3.101Keywords:
3D models, intellectual property protection, cryptography, digital watermarking, steganography, machine learning, unauthorized distributionAbstract
The article is devoted to a review of modern approaches to protecting three-dimensional (3D) models from unauthorized distribution. In connection with the development of three-dimensional modeling technologies and the widespread use of 3D models in various industries, the issue of intellectual property protection is of particular relevance. Basic security methods are covered, including cryptographic techniques, digital watermarks, steganography and machine learning methods. The advantages and disadvantages of each approach, as well as their effectiveness in different application contexts, are analyzed. Particular attention is paid to the latest developments in the field of protecting 3D models and prospects for further development. Based on the analysis, recommendations are proposed for choosing the most optimal protection methods depending on the specific use of three-dimensional models.Downloads
References
3D Materials | 3D Textures | Photoreal Textures. URL: https://www.a23d.co/textures
TurboSquid: 3D Models for Professionals [Електронний ресурс]. – Режим доступу: https://www.turbosquid.com/
Thingiverse [Електронний ресурс]. – Режим доступу: https://www.thingiverse.com/
Create massive worlds and high-quality designs. URL: https://www.autodesk.com/products/3dmax/overview?term=1-YEAR
Kuchuk, H., Kovalenko, A., Ibrahim, B.F. and Ruban, I. (2019), “Adaptive compression method for video information”, International Journal of Advanced Trends in Computer Science and Engineering, vol. 8(1), pp. 66–69, doi: http://dx.doi.org/10.30534/ijatcse/2019/1181.22019
ZBrush [Електронний ресурс]. – Режим доступу: https://www.maxon.net/en/zbrush
FairPlay DRM – 5 Things to Know About DRM Technology [Електронний ресурс]. – Режим доступу: https://pallycon.com/blog/5-things-you-need-to-know-about-multi-drm-technology-part-3/
Reading Between the Lines: Lessons from the SDMI Challenge. S.A. Craver, M. Wu, B. Liu, A. Stubblefield, and E. W. Felten. Proc. of 10th USENIX Security Symposium, 2001. URL: https://www.usenix.org/legacy/events/sec01/craver.pdf
FBI makes arrest in 'Wolverine' uploading case. URL: https://www.cnet.com/culture/fbi-makes-arrest-in-wolverine-uploading-case/
Beugnon, S., Itier, V., & Puech, W. (2022). 3D Watermarking. Multimedia Security 1: Authentication and Data Hiding, 219.
Semenov, S., Mozhaiev, O., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Yu., Yevstrat, D., Chyrva, Yu. & Kuchuk, H. (2022), “Devising a procedure for defining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples”, Eastern-European Journal of Enterprise Technologies, 2022, 6 (4(120)), pp. 40–49, doi: https://doi.org/10.15587/1729-4061.2022.269128
A. G. Bors, "Watermarking mesh-based representations of 3-D objects using local moments," in IEEE Transactions on Image Processing, vol. 15, no. 3, pp. 687-701, March 2006, doi: 10.1109/TIP.2005.863116
Wang, K., Lavoué, G., Denis, F., Baskurt, A. (2007). Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. Lecture Notes in Computer Science, vol 4567. Springer, Berlin, https://doi.org/10.1007/978-3-540-77370-2_4
Narendra, M., Valarmathi, M.L. & Anbarasi, L.J. Watermarking techniques for three-dimensional (3D) mesh models: a survey. Multimedia Systems 28, 623–641 (2022). https://doi.org/10.1007/s00530-021-00860-z