2018
DOI: 10.3390/electronics7050064
|View full text |Cite
|
Sign up to set email alerts
|

Two-Dimensional (2D) Slices Encryption-Based Security Solution for Three-Dimensional (3D) Printing Industry

Abstract: Nowadays, three-dimensional (3D) printing technology is applied to many areas of life and changes the world based on the creation of complex structures and shapes that were not feasible in the past. But, the data of 3D printing is often attacked in the storage and transmission processes. Therefore, 3D printing must be ensured security in the manufacturing process, especially the data of 3D printing to prevent attacks from hackers. This paper presents a security solution for 3D printing based on two-dimensional… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…In 2020, an innovative encryption algorithm for 3D image files was presented by Xu et al [13] leveraging a novel discrete chaotic system [15]. The chaotic characteristics of this system were scrutinized through phase diagrams, Lyapunov exponents, and bifurcation diagrams.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2020, an innovative encryption algorithm for 3D image files was presented by Xu et al [13] leveraging a novel discrete chaotic system [15]. The chaotic characteristics of this system were scrutinized through phase diagrams, Lyapunov exponents, and bifurcation diagrams.…”
Section: Related Workmentioning
confidence: 99%
“…๐‘ ๐‘ } โˆˆ (0,1) . The proposed S-box generates 16 distinct output values: [7,11,10,5,3,4,0,8,12,2,14,6,13,1,9,15]. Here Bijectivity criteria are fulfilled as each value has appeared once only.…”
Section: ) Bijectivitymentioning
confidence: 99%
“…This 3D model is then manufactured one layer at a time. This process can be represented mathematically [42] as…”
Section: Cad Model Security Gapsmentioning
confidence: 99%