Compression and Cryptography Algorithms for 3D Remote Sensing Point Cloud Data Based on 3D-TCICM and ECC

This paper proposes an asymmetric encryption and compression method based on three-dimensional Tent-Cubic-ICMIC map (3D-TCICM) and elliptic curve encryption (ECC) for 3D remote sensing point cloud. Due to the large size, rich data and high security of remote sensing point cloud, an encryption and co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE photonics journal 2023-10, Vol.15 (5), p.1-23
Hauptverfasser: Yan, Pengfei, Nan, Shixian, Feng, Xiufang, Wu, Yongfei, Yang, Jie, Zhang, Hao
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper proposes an asymmetric encryption and compression method based on three-dimensional Tent-Cubic-ICMIC map (3D-TCICM) and elliptic curve encryption (ECC) for 3D remote sensing point cloud. Due to the large size, rich data and high security of remote sensing point cloud, an encryption and compression method with high computing efficiency and high security is required. The point cloud is first divided into blocks, then compressed by point cloud library (PCL) using octree, and then the resulting data stream is encrypted. During encryption, a chaotic system 3D-TCICM with excellent chaotic behavior is proposed. Its initial values are generated by point cloud data and ECC algorithm. The sender and receiver only hold the public key or private key respectively, which further improves the security of the algorithm. The encryption factors are also generated for subsequent encryption operations, which improves the plaintext correlation. The encryption algorithm includes innovative scrambling algorithm between multiple blocks (MBS), helix diffusion in GF(2^{8}) field and multiple S-boxes substitution, in which different S-boxes are provided for each data block. Simulation results indicate that the proposed scheme surpasses existing algorithms in terms of security, randomness, and plaintext correlation, all while maintaining a lower computational complexity. The algorithm exhibits robustness against various attacks such as differential, statistical, chosen-plaintext, known-plaintext, chosen-ciphertext, noise, and cropping attacks.
ISSN:1943-0655
1943-0647
DOI:10.1109/JPHOT.2023.3314840