In this paper, we explore a new road for format-compatible 3d object encryption by proposing a novel mechanism of leveraging 2d image encryption methods. It alleviates the difficulty of designing 3d object encryption ...
详细信息
In this paper, we explore a new road for format-compatible 3d object encryption by proposing a novel mechanism of leveraging 2d image encryption methods. It alleviates the difficulty of designing 3d object encryption schemes coming from the intrinsic intricacy of the data structure, and implements the flexible anddiverse 3d object encryptiondesigns. First, turning complexity into simplicity, the vertex values, real numbers with continuous values, are converted into integers ranging from 0 to 255. The simplification result for a 3dobject is a 2d numerical matrix. Second, six prototypes for three encryption patterns (permutation, diffusion, and permutation-diffusion) are designed as exemplifications to encrypt the 2d matrix. Third, the integer-valued elements in the encrypted numeric matrix are converted into real numbers complying with the syntax of the 3dobject. In addition, some experiments are conducted to verify the effectiveness of the proposed mechanism.
due to widespread applications of 3d vision technology, the research into 3dobject protection is primarily important. To maintain confidentiality, encryption of 3dobjects is essential. However, the requirements and ...
详细信息
due to widespread applications of 3d vision technology, the research into 3dobject protection is primarily important. To maintain confidentiality, encryption of 3dobjects is essential. However, the requirements and limitations imposed by 3dobjects indicate the impropriety of conventional cryptosystems for 3d object encryption. This suggests the necessity of designing new ciphers. In addition, the study of prior works indicates that the majority of problems encountered with encrypting 3dobjects are about point cloud protection, dimensional and spatial stability, and robustness against surface reconstruction attacks. To address these problems, this paper proposes a 3d object encryption scheme, based on a series of random permutations and rotations, which deform the geometry of the point cloud. Since the inverse of a permutation and a rotation matrix is its transpose, the decryption implementation is very efficient. Our statistical analyses show that within the cipher point cloud, points are randomly distributed. Furthermore, the proposed cipher leaks no information regarding the geometric structure of the plain point cloud, and is also highly sensitive to the changes of the plaintext and secret key. The theoretical and experimental analyses demonstrate the security, effectiveness, and robustness of the proposed cipher against surface reconstruction attacks.
With the continued evolution of three dimensional (3d) object presentation and usage, the security of such objects has become an increasingly desirable research area. Previous efforts mostly concentrated on the encryp...
详细信息
With the continued evolution of three dimensional (3d) object presentation and usage, the security of such objects has become an increasingly desirable research area. Previous efforts mostly concentrated on the encryption of point clouds, solid models, meshes, and3d textured models. The (texture map) part of meshed3dobjects was overlooked by previous encryption techniques of 3d meshedobjects in spite of its importance because they require preprocessing to be extracted. Therefore, this paper provides a system for the full encryption of 3d texturedobjects with their texture maps. It provides an improved system based on an existing flexible cryptosystem named Flexible cryptosystem based on Cellular Automata (FcCA). The FcCA system has two drawbacks. One drawback is shuffling plain data without changing their values, which yields the same histogram and nonstandardencryption ratios. The other drawback is the need for many generations to make the keyspace very large, which is unsuitable for the large size of texturedobjectdata. This work overcomes these drawbacks of FcCA and fully encrypts 3d texturedobjects with their texture maps. The improvements to FcCA include making intersect start points change with every generation and encrypting the values of plain data while shuffling them using cellular automata. At first, the plain 3dobject is extracted to vertices, faces, and texture, in addition to its texture map. After that, extracteddata are encrypted using the proposed improved FcCA (iFcCA) cryptosystem. Implementation and analysis of this new system showed its preponderance as it can encrypt anddecrypt 3d texturedobjects better than FcCA and other existing methods. Moreover, it reduces the need for many generations of cellular automata, and consequently, reduces execution time. In addition, iFcCA has a very robust key, and it can resist different types of attacks. (C) 2019 Elsevier Ltd. All rights reserved.
暂无评论