Browse > Article

Security Analysis based on Differential Entropy m 3D Model Hashing  

Lee, Suk-Hwan (동명대학교 정보보호학과)
Kwon, Ki-Ryong (부경대학교 IT융합응용공학과)
Abstract
The content-based hashing for authentication and copy protection of image, video and 3D model has to satisfy the robustness and the security. For the security analysis of the hash value, the modelling method based on differential entropy had been presented. But this modelling can be only applied to the image hashing. This paper presents the modelling for the security analysis of the hash feature value in 3D model hashing based on differential entropy. The proposed security analysis modeling design the feature extracting methods of two types and then analyze the security of two feature values by using differential entropy modelling. In our experiment, we evaluated the security of feature extracting methods of two types and discussed about the trade-off relation of the security and the robustness of hash value.
Keywords
3D model hashing; Security analysis; Differential entropy; 3D feature value; 3D model authentication;
Citations & Related Records
Times Cited By KSCI : 5  (Citation Analysis)
연도 인용수 순위
1 이석환, 권기룡, "헬스케어 정보 관리 시스템의 3D 의료영상 데이터 다중 워터마킹 기법, 한국통신학회논문지, 제34권, 제11호, pp.870-881, 2009 년 11월.   과학기술학회마을
2 S.-H. Lee and K.-R. Kwon, "Mesh watermarking based projection onto two convex sets," Multimedia systems, Vol.13, No.5-6, pp. 323-330, 2008.   DOI
3 J.M. Konstantinides, A. Mademlis, P. Daras, P.A. Mitkas and M.G. Strintzis, "Blind robust 3-D mesh watermarking based on oblate spheroidal harmonics," IEEE Transactions on Multimedia, Vol.11, Issue1, pp.23-38, January 2009.   DOI
4 권성근, 이석환, 배성호, 박재범, 권기룡, "Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법," 한국통신학회논문지, 제32권, 제8호, pp.788-799, 2007년 8월.   과학기술학회마을
5 A. papoulis and S.U.Pillai, Probability, Random Variables and Stochastic Processes, New York:McGraw-Hill, 2002.
6 R. Ohbuchi, H. Masuda, and M. Aono, "Watermarking three-dimensional polygonal models through geometric and topological modification," IEEE Journal on Selected Areas in Communications, Vol.16, Issue4, pp.551-560, May 1998.   DOI   ScienceOn
7 S.-H. Lee and K.-R. Kwon, "A watermarking for 3D-mesh using the patch CEGIs," Digital Signal Processing, Vol.17, Issue2, pp.396-413, March 2007.   DOI   ScienceOn
8 Modified Bessel Function of the Second Kind, http://mathworld.wolfram.com/ModifiedBessel FunctionoftheSecondKind.html
9 ARCHIBASE NET, http://www.archibase.net
10 A. Swaminathan, Y. Mao, and M. Wu, "Security of feature extraction in image hashing," IEEE International Conference on Acoustic, Speech and Signal Processing, Vol.2, pp.1041-1044, March 2005.
11 최기철, "RP 시스템 적용을 위한 3차원 메쉬 모델의 블라인드 워터마킹," 한국통신학회논문지, 제32권 제12호, pp.1194-1202, 2007년 12월.   과학기술학회마을
12 Normal Product Distribution, http://mathworld. wolfram.com/NormalProductDistribution.html
13 이석환, 권기룡, "키 기반 블록 표면 계수를 이용한 강인한 3D 모델 해싱," 대한전자공학회논문지, 제47권 CI편 제1호, pp. 1-14, 2010년 1월.   과학기술학회마을
14 S.-H. Lee, E.-J. Lee and K.-R. Kwon, "Robust 3D Mesh Hashing Based on Shape Features," IEEE International Conference on Multimedia & Expo, July 2010.
15 이석환, 권기룡, "객체별 특징 벡터 기반 3D 콘텐츠 모델 해싱," 대한전자공학회논문지, 제47권 CI편 제6호, 2010년 11월.
16 A. Swaminathan, Y. Mao, and M. Wu, "Robust and secure image hashing," IEEE Trans. on Information Forensics and Security, Vol.1, Issue2, pp.215-230, June 2006.   DOI   ScienceOn