Font Size: a A A

Research On Verifying3D Object Authenticity And Its Application

Posted on:2013-04-04Degree:MasterType:Thesis
Country:ChinaCandidate:Q Z ZhangFull Text:PDF
GTID:2298330467478186Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Combination of computer3D graphics model and CNC manufacturing, making the designing, visualization, simulation, and automated manufacturing of complex3D items as possible. But at the same time, as manufacturing technology continues to evolve, the simulation of the counterfeit goods are also continuously improved. Through high-quality3D reconstruction and CNC manufacturing, capable of producing almost identical to the original articles of textiles, which also led to some of the traditional anti-counterfeiting technology security greatly reduced. In recent years, foreign scholars have put forward a new idea, is that the error among all the manufacturing process can not be avoided in the real physical world, and use it as a standard of identification of counterfeit. This paper draws on this idea, designed a method of authentication for the3D object’authenticity, through the use of smooth noise function to generate a signature that contains a large number of manmade error, and embed them into a visible surface of the object. Authenticity, check these errors to determine whether the item imitations.This method include:signature generation,signature embeded, signature acquisition, authenticity test. Signature generation and embedding refer to use a key to genetate a set of random number which change smoothly. The signature is embedded on a surface of the object. Acquisition of the signature is using3D reconstruction method to establish the3D model of the object. Acquired signature’s data and the original signature data will be calibrate first, and then use statistical test to determine the authenticity of the object by checking difference of the error data contained on the two signatures. This paper designs a prototype system, the prototype system consists of a signature generation module, constitute the signature acquisition module, matching module, test module.In this paper, the security methods of the prototype system with3ds max and other image processing software on the proposed experiment simulation, test and analysis of various processes, and obtained the law and the scope of application of the various steps of variable parameters. According to the analysis of results, when the parameters of each stages are appropriate, This method can effectively detect the forgery, and this proved that the proposed method’s feasibility.
Keywords/Search Tags:Anti-counterfeiting, signature, error, 3D graphics models
PDF Full Text Request
Related items