{"id":"https://openalex.org/W2886837009","doi":"https://doi.org/10.1109/icufn.2018.8437038","title":"Selective Encryption for 3D Printing Model in DCT Domain","display_name":"Selective Encryption for 3D Printing Model in DCT Domain","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2886837009","doi":"https://doi.org/10.1109/icufn.2018.8437038","mag":"2886837009"},"language":"en","primary_location":{"id":"doi:10.1109/icufn.2018.8437038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icufn.2018.8437038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006671863","display_name":"Giao N. Pham","orcid":"https://orcid.org/0000-0001-8064-5594"},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Giao N. Pham","raw_affiliation_strings":["Dept. of IT Convergence & Application Engineering, Pukyong National University, Pusan, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence & Application Engineering, Pukyong National University, Pusan, South Korea","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102722702","display_name":"Jin\u2010Hyeok Park","orcid":"https://orcid.org/0000-0002-6839-4814"},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jin-Hyeok Park","raw_affiliation_strings":["Dept. of IT Convergence & Application Engineering, Pukyong National University, Pusan, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence & Application Engineering, Pukyong National University, Pusan, South Korea","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101806108","display_name":"Oh\u2010Heum Kwon","orcid":"https://orcid.org/0000-0002-4302-7727"},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Oh-Heum Kwon","raw_affiliation_strings":["Dept. of IT Convergence & Application Engineering, Pukyong National University, Pusan, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence & Application Engineering, Pukyong National University, Pusan, South Korea","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023075283","display_name":"Ha-Joo Song","orcid":"https://orcid.org/0000-0003-1003-8013"},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ha-Joo Song","raw_affiliation_strings":["Dept. of IT Convergence & Application Engineering, Pukyong National University, Pusan, South Korea"],"affiliations":[{"raw_affiliation_string":"Dept. of IT Convergence & Application Engineering, Pukyong National University, Pusan, South Korea","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041246106","display_name":"Suk\u2010Hwan Lee","orcid":"https://orcid.org/0000-0003-4779-2888"},"institutions":[{"id":"https://openalex.org/I4210104306","display_name":"Tongmyong University","ror":"https://ror.org/01asa8g02","country_code":"KR","type":"education","lineage":["https://openalex.org/I4210104306"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Suk-Hwan Lee","raw_affiliation_strings":["Dept. of Information Security, Tongmyong University"],"affiliations":[{"raw_affiliation_string":"Dept. of Information Security, Tongmyong University","institution_ids":["https://openalex.org/I4210104306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035014045","display_name":"Kwang-Seok Moon","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kwang-Seok Moon","raw_affiliation_strings":["Dept. of Electronics Engineering"],"affiliations":[{"raw_affiliation_string":"Dept. of Electronics Engineering","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060884050","display_name":"Seok-Tae Kim","orcid":"https://orcid.org/0000-0002-0028-3560"},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seok-Tae Kim","raw_affiliation_strings":["Dept. of Information and Communications, Pukyong National University"],"affiliations":[{"raw_affiliation_string":"Dept. of Information and Communications, Pukyong National University","institution_ids":["https://openalex.org/I8991828"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030952908","display_name":"Yeong-Rak Cho","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yeong-Rak Cho","raw_affiliation_strings":["Social Network Communication"],"affiliations":[{"raw_affiliation_string":"Social Network Communication","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037514322","display_name":"Ki\u2010Ryong Kwon","orcid":"https://orcid.org/0000-0002-1879-748X"},"institutions":[{"id":"https://openalex.org/I8991828","display_name":"Pukyong National University","ror":"https://ror.org/0433kqc49","country_code":"KR","type":"education","lineage":["https://openalex.org/I8991828"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ki-Ryong Kwon","raw_affiliation_strings":["Pukyong National University, Pusan, South Korea"],"affiliations":[{"raw_affiliation_string":"Pukyong National University, Pusan, South Korea","institution_ids":["https://openalex.org/I8991828"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5006671863"],"corresponding_institution_ids":["https://openalex.org/I8991828"],"apc_list":null,"apc_paid":null,"fwci":0.2089,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.54682763,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"398","last_page":"400"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9847999811172485,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10719","display_name":"3D Shape Modeling and Analysis","score":0.953000009059906,"subfield":{"id":"https://openalex.org/subfields/2206","display_name":"Computational Mechanics"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-cosine-transform","display_name":"Discrete cosine transform","score":0.8800592422485352},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7876100540161133},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.643298864364624},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5647369027137756},{"id":"https://openalex.org/keywords/frequency-domain","display_name":"Frequency domain","score":0.5337000489234924},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5030967593193054},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.48537957668304443},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.42285534739494324},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.325859010219574},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2960510849952698},{"id":"https://openalex.org/keywords/computer-vision","display_name":"Computer vision","score":0.2818982005119324},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2106069028377533},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.20337960124015808},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.0979871153831482}],"concepts":[{"id":"https://openalex.org/C2221639","wikidata":"https://www.wikidata.org/wiki/Q2877","display_name":"Discrete cosine transform","level":3,"score":0.8800592422485352},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7876100540161133},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.643298864364624},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5647369027137756},{"id":"https://openalex.org/C19118579","wikidata":"https://www.wikidata.org/wiki/Q786423","display_name":"Frequency domain","level":2,"score":0.5337000489234924},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5030967593193054},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.48537957668304443},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.42285534739494324},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.325859010219574},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2960510849952698},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.2818982005119324},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2106069028377533},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.20337960124015808},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0979871153831482},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icufn.2018.8437038","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icufn.2018.8437038","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7300000190734863}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2018342351","https://openalex.org/W2552862233","https://openalex.org/W2577851392"],"related_works":["https://openalex.org/W1916685473","https://openalex.org/W2055682261","https://openalex.org/W1993363272","https://openalex.org/W2186390138","https://openalex.org/W2060035984","https://openalex.org/W2790129917","https://openalex.org/W2992856432","https://openalex.org/W2100638064","https://openalex.org/W2127787376","https://openalex.org/W2212883587"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3],"present":[4],"a":[5,41,119],"selective":[6],"encryption":[7,112],"algorithm":[8,60,95,116],"for":[9,99],"3D":[10,34,86,100,105],"printing":[11,35,87,101,106],"models":[12],"in":[13,26,72,80],"the":[14,27,51,65,73,84,93,111],"frequency":[15,52,74],"domain":[16,53,75],"of":[17,33,54,68,70,76],"discrete":[18,55,77],"cosine":[19,56,78],"transform":[20,79],"to":[21,39,50,82],"prevent":[22],"illegal":[23],"copying,":[24],"access":[25],"secured":[28],"storage.":[29],"The":[30,58,103,114],"facet":[31],"data":[32],"model":[36,107],"is":[37,47,61,96,108],"extracted":[38],"construct":[40],"three":[42,44],"by":[43],"matrix":[45],"that":[46,92],"then":[48],"transformed":[49],"transform.":[57],"proposed":[59,94,115],"based":[62],"on":[63],"encrypting":[64],"DC":[66],"coefficients":[67],"matrixes":[69],"facets":[71],"order":[81],"obtain":[83],"encrypted":[85],"model.":[88],"Experimental":[89],"results":[90],"verified":[91],"very":[97],"effective":[98],"models.":[102],"entire":[104],"altered":[109],"after":[110],"process.":[113],"also":[117],"provide":[118],"better":[120],"method":[121],"and":[122],"more":[123],"security":[124],"than":[125],"previous":[126],"methods.":[127]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
