Home > Published Issues > 2020 > Volume 11, No. 2, May 2020 >

Edges of Interpolating Tetrahedron Based Encryption Algorithm for 3D Printing Model

Giao N. Pham 1,2, Son T. Ngo 1, Anh N. Bui 1, Ban Q. Tran 1, Dinh V. Tran 3, and Suk-Hwan Lee 4
1. Dept. of Computing Fundamentals, FPT University, Hanoi, Vietnam
2. Advanced Analytics Center, FPT Software Co., Ltd., Hanoi, Vietnam
3. Dept. of Computer, University of Freiburg, Freiburg, Germany
4. Dept. of Information Security, Tongmyong University, Busan, South Korea

Abstract—With the increase of 3D printing applications in many areas of life, a large amount of 3D printing models is attacked and stolen by hackers. Moreover, some special models and anti-weapon models in 3D printing must be secured from un-authorized users. Therefore, 3D printing models should be encrypted before being stored and transmitted in order to prevent illegal copying. This paper presents an encryption algorithm for 3D printing models based on the edges of the interpolating tetrahedron. The proposed algorithm is based on encrypting the normal vector of facet and the edges of the interpolating tetrahedron by a secret key after the tetrahedron interpolation process. Each facet of 3D printing model is extracted to interpolate a tetrahedron, and the edges of the interpolating tetrahedron are then encrypted by a secret key. The encrypted edges of the interpolating tetrahedron and the encrypted normal vector are then used to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The proposed algorithm also provide a better method and more security than previous methods.
 
Index Terms—3D printing security, 3D triangle mesh, tetrahedron, encryption and cryptography

Cite: Giao N. Pham, Son T. Ngo, Anh N. Bui, Ban Q. Tran, Dinh V. Tran, and Suk-Hwan Lee, "Edges of Interpolating Tetrahedron Based Encryption Algorithm for 3D Printing Model," Journal of Advances in Information Technology, Vol. 11, No. 2, pp. 84-90, May 2020. doi: 10.12720/jait.11.2.84-90

Copyright © 2020 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.