Two-Dimensional (2D) Slices Encryption-Based Security Solution for Three-Dimensional (3D) Printing Industry
Abstract
:1. Introduction
2. Related Works
2.1. Data Encryption
2.2. 3D Model Encryption
2.3. 2D Slices-Based Encryption
3. The Proposed Solution
3.1. Overview
3.2. Encryption Method in Frequency Domain
3.3. Encryption Method in Spatial Domain
3.4. Decryption Process
4. Experimental Results and Analysis
4.1. Visualization Experiments
4.2. Security Analysis
4.3. Performance Evaluation
5. Conclusions
Author Contributions
Acknowledgments
Conflicts of Interest
References
- How 3D Printing Works: The Vision, Innovation and Technologies Behind Inkjet 3D Printing. 3D Systems: Rock Hill, CA, USA, 2012. Available online: http://www.officeproductnews.net/sites/default/files/3dWP_0.pdf (accessed on 14 April 2018).
- How Paper-Based 3D Printing Works: The Technology and Advantages. Mcor Technologies Ltd., 2013. Available online: http://rapid3dparts.co.za/how-paper-based-3d-printing-works.pdf (accessed on 14 March 2018).
- Lidia, H.A.; Paul, A.J.; Jose, R.J.; Will, H.; Vincent, C.A. White Paper: 3D Printing. Atos: Irving, TX, USA, 2014. Available online: https://atos.net/wp-content/uploads/2016/06/01052014-AscentWhitePaper-3dPrinting-1.pdf (accessed on 30 April 2018).
- What Is 3D Printing & How Do 3D Printers Work? Available online: https://3dprint.com/82272/what-3d-printing-works/ (accessed on 30 April 2018).
- Ramya, A.; Vanapalli, S. 3D Printing Technology in Various Applications. Int. J. Mech. Eng. Technol. 2016, 7, 396–409. [Google Scholar]
- Rulania, T. Impact and Applications of 3D Printing Technology. SSRG Int. J. Comput. Sci. Eng. 2016, 3, 79–82. [Google Scholar]
- Helena, D. Applications of 3D printing in healthcare. Kardiochir. i Torakochirurgia Polska 2016, 13, 283–293. [Google Scholar]
- Centralized Command & Control IP, 3D Printers and Users. Available online: http://secured3d.com/how-it-works (accessed on 30 April 2018).
- Security Attack to 3D Printing. Available online: https://www.claudxiao.net/Attack3DPrinting-Claud-en.pdf (accessed on 30 April 2018).
- Ben, B.; Eric, W.; Alex, J.H. Replication Prohibited: Attacking Restricted Keyways with 3D Printing. Available online: https://www.usenix.org/system/files/conference/woot15/woot15-paper-burgess.pdf (accessed on 30 April 2018).
- Pham, G.N.; Lee, S.-H.; Kwon, K.-R. Interpolating Spline Curve-Based Perceptual Encryption for 3D Printing Models. Appl. Sci. 2018, 8, 242. [Google Scholar] [CrossRef]
- Pham, G.N.; Lee, S.-H.; Lee, E.J.; Kwon, K.-R. Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain. J. Comput. Sci. Eng. 2017, 11, 152–159. [Google Scholar] [CrossRef]
- Paar, C.; Pelzl, J. Chapter 2 Stream Ciphers. In Understanding Cryptography; Springer: Berlin, Germany, 2010; pp. 29–54. [Google Scholar]
- Majid, B.; Maarof, M.A. An Efficient Stream Cipher Algorithm for Data Encryption. Int. J. Comput. Sci. Issues 2011, 8. Available online: http://www.ijcsi.org/papers/IJCSI-8-3-1-247-253.pdf (accessed on 30 April 2018).
- Bhukya, S.; Malathi, N.; Rao, D.S. Welch–Gong 128 Bit Stream Cipher for Encryption and Decryption Algorithm. Int. J. Emerg. Eng. Res. Technol. 2015, 3, 137–144. [Google Scholar]
- Kumari, S. A research Paper on Cryptography Encryption and Compression Techniques. Int. J. Eng. Comput. Sci. 2017, 6, 20915–20919. [Google Scholar] [CrossRef]
- Marc, E.; Maetz, Y.; Gwenael, D. Geometry-Preserving Encryption for 3D Meshes. In Proceedings of the Conference on Compression at Representation Signal Audio, Le Creusot, France, 28–29 November 2013; pp. 7–12. [Google Scholar]
- Cai, X.T.; He, F.Z.; Li, W.D.; Li, X.X.; Wu, Y.Q. Parametric and Adaptive Encryption of Feature-Based Computer-Aided Design Models for Cloud-based Collaboration. Integr. Comput. Aided Eng. 2017, 24, 129–142. [Google Scholar] [CrossRef]
- STL Format in 3D Printing. Available online: https://all3dp.com/what-is-stl-file-format-extension-3d-printing/ (accessed on 14 April 2018).
- The Virtual Reality Modeling Language. Available online: http://www.cacr.caltech.edu/~slombey/asci/vrml/ (accessed on 14 April 2018).
- 3D Slicer. Available online: https://www.slicer.org/ (accessed on 14 April 2018).
- KIS Slicer. Available online: http://www.kisslicer.com/ (accessed on 14 April 2018).
- G-Code Tutorial. Available online: https://www.simplify3d.com/support/articles/3d-printing-gcode-tutorial/ (accessed on 14 April 2018).
- 2D Geometric Transformations. Available online: https://www.cs.tau.ac.il/~dcor/Graphics/cg-slides/geom2d.pdf (accessed on 30 April 2018).
- XYZ Pro 3 in 1 Printer. Available online: https://www.xyzprinting.com/en-US/product/da-vinci-1-0-pro-3-in-1 (accessed on 14 April 2018).
- RSA Lab. Password-Based Cryptography Standard; RSA Lab: Bedford, MA, USA, 2006. [Google Scholar]
Name | Number of Slices | Entropy (dB) | Computation Time (ms) | |||
---|---|---|---|---|---|---|
Conventional Work | Method in DCT Domain | Method in Spatial Domain | Method in DCT Domain | Method in Spatial Domain | ||
End-Cap | 6 | 4608 | 4623.5 | 4639.0 | 43 | 18 |
Pit-co | 19 | 4608 | 4688.7 | 4769.4 | 68 | 35 |
Holder | 23 | 4608 | 4712.0 | 4816.0 | 72 | 37 |
Lion | 45 | 4608 | 4855.0 | 5102.0 | 136 | 59 |
Impeller | 119 | 4608 | 5428.5 | 6249.0 | 240 | 147 |
Mouse | 129 | 4608 | 5512.5 | 6417.0 | 253 | 151 |
Yoda | 630 | 4608 | 10,466.5 | 16,325.0 | 594 | 322 |
Batman | 730 | 4608 | 11,551.5 | 18,495.1 | 671 | 381 |
Bunny | 830 | 4608 | 12,656.5 | 20,705.0 | 729 | 425 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pham, G.N.; Lee, S.-H.; Kwon, O.-H.; Kwon, K.-R. Two-Dimensional (2D) Slices Encryption-Based Security Solution for Three-Dimensional (3D) Printing Industry. Electronics 2018, 7, 64. https://doi.org/10.3390/electronics7050064
Pham GN, Lee S-H, Kwon O-H, Kwon K-R. Two-Dimensional (2D) Slices Encryption-Based Security Solution for Three-Dimensional (3D) Printing Industry. Electronics. 2018; 7(5):64. https://doi.org/10.3390/electronics7050064
Chicago/Turabian StylePham, Giao N., Suk-Hwan Lee, Oh-Heum Kwon, and Ki-Ryong Kwon. 2018. "Two-Dimensional (2D) Slices Encryption-Based Security Solution for Three-Dimensional (3D) Printing Industry" Electronics 7, no. 5: 64. https://doi.org/10.3390/electronics7050064
APA StylePham, G. N., Lee, S. -H., Kwon, O. -H., & Kwon, K. -R. (2018). Two-Dimensional (2D) Slices Encryption-Based Security Solution for Three-Dimensional (3D) Printing Industry. Electronics, 7(5), 64. https://doi.org/10.3390/electronics7050064