Encryption and Decryption of Marker Based 3-Dimensional Augmented Reality Image Using Modified Hill Cipher Technique for Secure Transfer

被引:1
作者
Sharma, Abhilasha [1 ]
Singh, Anshul [1 ]
Kumar, Appu [1 ]
机构
[1] Delhi Technol Univ, Dept Software Engn, Delhi, India
来源
2022 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND ARTIFICIAL INTELLIGENCE (CCAI 2022) | 2022年
关键词
augmented reality; cryptography; modified hill cipher; encryption; decryption; key; markers; security;
D O I
10.1109/CCAI55564.2022.9807727
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Mobility of digital data has increased over time, but securing them is a major task to do. Research has been conducted to help shield data from unauthorized intruders and attacks that includes disclosure of data, masquerade, content modification and repudiation, though safeguarding Augmented Reality media remains an unfulfilled issue. This research takes a step towards encrypting augmented reality content by implementing the modified Hill cipher encryption approach. This is acquired by offering marker-based mobility of immersive 3 Dimensional media, that is scanned by the user to extract it; furthermore, users first verify their identity by entering the passcode or key to the modified Hill cipher to decrypt the data. Coupling cryptography and augmented reality will lead to a safe and secured meaningful engagement of the digital media over the networks.
引用
收藏
页码:155 / 159
页数:5
相关论文
共 24 条
  • [1] Abood O.G., 2018, INT J SCI RES PUBL, DOI [10.29322/ijsrp.8.7.2018.p7978, DOI 10.29322/IJSRP.8.7.2018.P7978]
  • [2] Aggarwal R, 2019, 2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), P510, DOI [10.1109/CONFLUENCE.2019.8776989, 10.1109/confluence.2019.8776989]
  • [3] Akgun G., PERFORMANCE ANAL HIL
  • [4] [Anonymous], 2020, NEWSCAFE
  • [5] [Anonymous], 2022, NICOLOCARPIGNOLI ART
  • [6] Chandra Sourabh, 2014, STUDY ANAL SYMMETRIC, DOI [10.1109/ICSEMR.2014.7043664, DOI 10.1109/ICSEMR.2014.7043664]
  • [7] Cheng J., 2017, Comparison of marker-based AR and markerless AR: A case study on indoor decoration system, DOI [10.24928/JC3-2017/0231, DOI 10.24928/JC3-2017/0231]
  • [8] Enterprise data breach: causes, challenges, prevention, and future directions
    Cheng, Long
    Liu, Fang
    Yao, Danfeng
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2017, 7 (05)
  • [9] Delcev S, 2018, 2018 ZOOMING INNOVATION IN CONSUMER TECHNOLOGIES CONFERENCE (ZINC), P106, DOI 10.1109/ZINC.2018.8448444
  • [10] Guo C., 2014, HOTNETS 3