Genuinity Signatures: Designing Signatures for Verifying 3D Object Genuinity
نویسندگان
چکیده
3D computer graphics models and digitally-controlled manufacturing have come together to enable the design, visualization, simulation, and automated creation of complex 3D objects. In our work, we propose and implement a framework for designing computer graphics objects and digitally manufacturing them such that no adversary can make imitations or counterfeit copies of the physical object, even if the adversary has a large number of original copies of the object, knowledge of the original object design, and has manufacturing precision that is comparable to or superior to that of the legitimate creator of the object. Our approach is to design and embed a signature on the surface of the object which acts as a certificate of genuinity of the object. The signature is detectable by a signature-reading device, based on methods in computer graphics and computer vision, which contains some of the secret information that was used when marking the physical object. Further, the compromise of a signature-reading device by an adversary who is able to extract all its secrets, does not enable the adversary to create counterfeit objects that fool other readers, thereby still enabling reliable copy detection. We implemented a prototype of our scheme end-to-end, including the production of the physical object and the genuinity-testing device.
منابع مشابه
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on machine-specific computations, incorporating side effects that cannot be simulated quickly. The system is vulnerable to a novel attack, which we call a substitution attack. We implement a successful attack on Genuinity, ...
متن کاملAn analysis of proposed attacks against genuinity tests
A number of attacks have been proposed against the idea of a genuinity test. The rationale for these attacks is based on misinterpretation of published details about this system. We correct these misunderstandings by providing a detailed analysis and contradictory evidence for each claim.
متن کاملPharmacognostic and Phytochemical analysis of different market samples of Ashoka (Saraca indica Linn)
Different market samples of Ashoka (Saraca indica Linn) were analyzed to screen the genuinity of the samples available in the market in the name of Ashoka. All the samples were subjected for Pharmacognostic and Phytochemical analysis and found that all the samples were derived from the different botanical sources.
متن کاملEstablishing the Genuinity of Remote Computer Systems
A fundamental problem in distributed computing environments involves determining whether a remote computer system can be trusted to autonomously access secure resources via a network. In this paper, we describe a means by which a remote computer system can be challenged to demonstrate that it is genuine and trustworthy. Upon passing a test, it can be granted access to distributed resources and ...
متن کاملParametrization of Pedestrian Injuries and its Utilisation in Proving Traffic Accidents Course Using Injury Signatures and Contact Signatures
Background: The paper points out the present limited possibility of using the verbal description of injuries for the needs of experts from the field of road transportation as relevant criminalistics traces, as well as the options of the FORTIS system that creates a new area for a deeper interdisciplinary approach in the field of expert evidence. Further a description of how to create injury si...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Comput. Graph. Forum
دوره 28 شماره
صفحات -
تاریخ انتشار 2009