Security Analysis based on Differential Entropy in 3D Model Hashing 


Vol. 35,  No. 12, pp. 995-1003, Dec.  2010


PDF
  Abstract

The content-based hashing for authentication and copy protection of image, video and 3D model has to satisfy the robustness and the security. For the security analysis of the hash value, the modelling method based on differential entropy had been presented. But this modelling can be only applied to the image hashing. This paper presents the modelling for the security analysis of the hash feature value in 3D model hashing based on differential entropy. The proposed security analysis modeling design the feature extracting methods of two types and then analyze the security of two feature values by using differential entropy modelling. In our experiment, we evaluated the security of feature extracting methods of two types and discussed about the trade-off relation of the security and the robustness of hash value.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

S. Lee and K. Kwon, "Security Analysis based on Differential Entropy in 3D Model Hashing," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 12, pp. 995-1003, 2010. DOI: .

[ACM Style]

Suk-Hwan Lee and Ki-Ryong Kwon. 2010. Security Analysis based on Differential Entropy in 3D Model Hashing. The Journal of Korean Institute of Communications and Information Sciences, 35, 12, (2010), 995-1003. DOI: .

[KICS Style]

Suk-Hwan Lee and Ki-Ryong Kwon, "Security Analysis based on Differential Entropy in 3D Model Hashing," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 12, pp. 995-1003, 12. 2010.