3D textured model encryption via 3D Lu chaotic mapping

被引:25
作者
Jin, Xin [1 ]
Zhu, Shuyun [1 ,3 ]
Xiao, Chaoen [2 ]
Sun, Hongbo [1 ]
Li, Xiaodong [1 ]
Zhao, Geng [1 ]
Ge, Shiming [4 ]
机构
[1] Beijing Elect Sci & Technol Inst, Dept Comp Sci & Technol, Beijing 100070, Peoples R China
[2] Beijing Elect Sci & Technol Inst, Dept Elect Informat Engn, Beijing 100070, Peoples R China
[3] Xidian Univ, Sch Telecommun Engn, Xian 710071, Shaanxi, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
3D model; surface model; textured model; 3D model encryption; 3D Lu chaotic mapping;
D O I
10.1007/s11432-017-9266-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the emerging Virtual/Augmented Reality (VR/AR) era, three dimensional (3D) content will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration. 3D contents contain surface models and solid models. Surface models include point clouds, meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3D textured model. We propose a 3D Lu chaotic mapping based encryption method for 3D textured models. We encrypt the vertices, polygons, and textures of 3D models separately using the 3D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3D textured model. The experimental results reveal that our method can encrypt and decrypt 3D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.
引用
收藏
页数:9
相关论文
共 25 条
  • [1] Bogdanov A, 2011, LECT NOTES COMPUT SC, V7073, P344, DOI 10.1007/978-3-642-25385-0_19
  • [2] New trends of information security-how to change people's life style?
    Cao, Zhenfu
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (05)
  • [3] CodeHop: physical layer error correction and encryption with LDPC-based code hopping
    Chen, Zhao
    Yin, Liuguo
    Pei, Yukui
    Lu, Jianhua
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (10)
  • [4] Eluard M., 2013, Actes de COmpression et REprsent. des Signaux Audiov., P7, DOI [10.13140/RG.2.1.3925.6165, DOI 10.13140/RG.2.1.3925.6165]
  • [5] Privacy beyond sensitive values
    Huang XueZhen
    Liu JiQiang
    Han Zhen
    Yang Jun
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (07) : 1 - 15
  • [6] Theory and methodology of research on cloud security
    Jin, Hai
    Dai, Weiqi
    Zou, Deqing
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (05)
  • [7] Jin X, 2016, P 8 INT C WIR COMM S
  • [8] Color Image Encryption in CIE L*a*b* Space
    Jin, Xin
    Chen, Yingya
    Ge, Shiming
    Zhang, Kejun
    Li, Xiaodong
    Li, Yuzhen
    Liu, Yan
    Guo, Kui
    Tian, Yulu
    Zhao, Geng
    Zhang, Xiaokun
    Wang, Ziyi
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 74 - 85
  • [9] Jin X, 2015, CHIN AUTOM CONGR, P1159, DOI 10.1109/CAC.2015.7382673
  • [10] Jolfaei A, 2015, P IM VID TECHN, P344