REVIEW OF APPROACHES TO PROTECTING 3D MODELS FROM UNAUTHORIZED DISTRIBUTION

Authors

  • O. Galitska
  • N. Bolohova
  • D. Kibirev
  • O. Skiba

DOI:

https://doi.org/10.26906/SUNZ.2024.3.101

Keywords:

3D models, intellectual property protection, cryptography, digital watermarking, steganography, machine learning, unauthorized distribution

Abstract

The article is devoted to a review of modern approaches to protecting three-dimensional (3D) models from unauthorized distribution. In connection with the development of three-dimensional modeling technologies and the widespread use of 3D models in various industries, the issue of intellectual property protection is of particular relevance. Basic security methods are covered, including cryptographic techniques, digital watermarks, steganography and machine learning methods. The advantages and disadvantages of each approach, as well as their effectiveness in different application contexts, are analyzed. Particular attention is paid to the latest developments in the field of protecting 3D models and prospects for further development. Based on the analysis, recommendations are proposed for choosing the most optimal protection methods depending on the specific use of three-dimensional models.

Downloads

References

3D Materials | 3D Textures | Photoreal Textures. URL: https://www.a23d.co/textures

TurboSquid: 3D Models for Professionals [Електронний ресурс]. – Режим доступу: https://www.turbosquid.com/

Thingiverse [Електронний ресурс]. – Режим доступу: https://www.thingiverse.com/

Create massive worlds and high-quality designs. URL: https://www.autodesk.com/products/3dmax/overview?term=1-YEAR

Kuchuk, H., Kovalenko, A., Ibrahim, B.F. and Ruban, I. (2019), “Adaptive compression method for video information”, International Journal of Advanced Trends in Computer Science and Engineering, vol. 8(1), pp. 66–69, doi: http://dx.doi.org/10.30534/ijatcse/2019/1181.22019

ZBrush [Електронний ресурс]. – Режим доступу: https://www.maxon.net/en/zbrush

FairPlay DRM – 5 Things to Know About DRM Technology [Електронний ресурс]. – Режим доступу: https://pallycon.com/blog/5-things-you-need-to-know-about-multi-drm-technology-part-3/

Reading Between the Lines: Lessons from the SDMI Challenge. S.A. Craver, M. Wu, B. Liu, A. Stubblefield, and E. W. Felten. Proc. of 10th USENIX Security Symposium, 2001. URL: https://www.usenix.org/legacy/events/sec01/craver.pdf

FBI makes arrest in 'Wolverine' uploading case. URL: https://www.cnet.com/culture/fbi-makes-arrest-in-wolverine-uploading-case/

Beugnon, S., Itier, V., & Puech, W. (2022). 3D Watermarking. Multimedia Security 1: Authentication and Data Hiding, 219.

Semenov, S., Mozhaiev, O., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Yu., Yevstrat, D., Chyrva, Yu. & Kuchuk, H. (2022), “Devising a procedure for defining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples”, Eastern-European Journal of Enterprise Technologies, 2022, 6 (4(120)), pp. 40–49, doi: https://doi.org/10.15587/1729-4061.2022.269128

A. G. Bors, "Watermarking mesh-based representations of 3-D objects using local moments," in IEEE Transactions on Image Processing, vol. 15, no. 3, pp. 687-701, March 2006, doi: 10.1109/TIP.2005.863116

Wang, K., Lavoué, G., Denis, F., Baskurt, A. (2007). Three-Dimensional Meshes Watermarking: Review and Attack-Centric Investigation. Lecture Notes in Computer Science, vol 4567. Springer, Berlin, https://doi.org/10.1007/978-3-540-77370-2_4

Narendra, M., Valarmathi, M.L. & Anbarasi, L.J. Watermarking techniques for three-dimensional (3D) mesh models: a survey. Multimedia Systems 28, 623–641 (2022). https://doi.org/10.1007/s00530-021-00860-z

Published

2024-09-06