3D textured model encryption via 3D Lu chaotic mapping

In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include po...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2017-12, Vol.60 (12), p.220-228, Article 122107
Hauptverfasser: Jin, Xin, Zhu, Shuyun, Xiao, Chaoen, Sun, Hongbo, Li, Xiaodong, Zhao, Geng, Ge, Shiming
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 228
container_issue 12
container_start_page 220
container_title Science China. Information sciences
container_volume 60
creator Jin, Xin
Zhu, Shuyun
Xiao, Chaoen
Sun, Hongbo
Li, Xiaodong
Zhao, Geng
Ge, Shiming
description In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include point clouds,meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3 D textured model. We propose a 3 D Lu chaotic mapping based encryption method for 3 D textured models. We encrypt the vertices, polygons, and textures of3 D models separately using the 3 D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3 D textured model. The experimental results reveal that our method can encrypt and decrypt 3 D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.
doi_str_mv 10.1007/s11432-017-9266-1
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918595936</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>673840366</cqvip_id><sourcerecordid>2918595936</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-c8fe7a7055aea96fb456fea770ec46990b05eaf5177bb4c06b157bbcc74cbf6a3</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EElXpA3CL4GzwxvY6PqLyK1XiAhI3y3GdNlWbpHaC4O1xlQpu7GXn8M2MNIRcArsBxtRtBBA8pwwU1TkihRMygQI1BQ36NGlUgirOP87JLMYNS8c5y1UxIcjvs95_9UPwy2zXLv02840L311ft032WdssAYshc2vb9rXLdrbr6mZ1Qc4qu41-dvxT8v748DZ_povXp5f53YI6XmBPXVF5ZRWT0nqrsSqFxMpbpZh3ArVmJZPeVhKUKkvhGJYgk3JOCVdWaPmUXI-5XWj3g4-92bRDaFKlyTUUUkvNMVEwUi60MQZfmS7UOxu-DTBzWMiMC5m0kDksZCB58tETE9usfPhL_s90dSxat81qn3y_Tah4IRhH5D-L43MW</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918595936</pqid></control><display><type>article</type><title>3D textured model encryption via 3D Lu chaotic mapping</title><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Jin, Xin ; Zhu, Shuyun ; Xiao, Chaoen ; Sun, Hongbo ; Li, Xiaodong ; Zhao, Geng ; Ge, Shiming</creator><creatorcontrib>Jin, Xin ; Zhu, Shuyun ; Xiao, Chaoen ; Sun, Hongbo ; Li, Xiaodong ; Zhao, Geng ; Ge, Shiming</creatorcontrib><description>In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include point clouds,meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3 D textured model. We propose a 3 D Lu chaotic mapping based encryption method for 3 D textured models. We encrypt the vertices, polygons, and textures of3 D models separately using the 3 D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3 D textured model. The experimental results reveal that our method can encrypt and decrypt 3 D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-017-9266-1</identifier><language>eng</language><publisher>Beijing: Science China Press</publisher><subject>Apexes ; Augmented reality ; Computer Science ; Data encryption ; Encryption ; Information Systems and Communication Service ; Mapping ; Polygons ; Research Paper ; Three dimensional models ; Virtual reality ; 三维模型 ; 加密方法 ; 多边形 ; 实体模型 ; 混沌映射 ; 纹理模型 ; 表面模型</subject><ispartof>Science China. Information sciences, 2017-12, Vol.60 (12), p.220-228, Article 122107</ispartof><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017</rights><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-c8fe7a7055aea96fb456fea770ec46990b05eaf5177bb4c06b157bbcc74cbf6a3</citedby><cites>FETCH-LOGICAL-c386t-c8fe7a7055aea96fb456fea770ec46990b05eaf5177bb4c06b157bbcc74cbf6a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-017-9266-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918595936?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Jin, Xin</creatorcontrib><creatorcontrib>Zhu, Shuyun</creatorcontrib><creatorcontrib>Xiao, Chaoen</creatorcontrib><creatorcontrib>Sun, Hongbo</creatorcontrib><creatorcontrib>Li, Xiaodong</creatorcontrib><creatorcontrib>Zhao, Geng</creatorcontrib><creatorcontrib>Ge, Shiming</creatorcontrib><title>3D textured model encryption via 3D Lu chaotic mapping</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include point clouds,meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3 D textured model. We propose a 3 D Lu chaotic mapping based encryption method for 3 D textured models. We encrypt the vertices, polygons, and textures of3 D models separately using the 3 D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3 D textured model. The experimental results reveal that our method can encrypt and decrypt 3 D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.</description><subject>Apexes</subject><subject>Augmented reality</subject><subject>Computer Science</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Information Systems and Communication Service</subject><subject>Mapping</subject><subject>Polygons</subject><subject>Research Paper</subject><subject>Three dimensional models</subject><subject>Virtual reality</subject><subject>三维模型</subject><subject>加密方法</subject><subject>多边形</subject><subject>实体模型</subject><subject>混沌映射</subject><subject>纹理模型</subject><subject>表面模型</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kM1OwzAQhC0EElXpA3CL4GzwxvY6PqLyK1XiAhI3y3GdNlWbpHaC4O1xlQpu7GXn8M2MNIRcArsBxtRtBBA8pwwU1TkihRMygQI1BQ36NGlUgirOP87JLMYNS8c5y1UxIcjvs95_9UPwy2zXLv02840L311ft032WdssAYshc2vb9rXLdrbr6mZ1Qc4qu41-dvxT8v748DZ_povXp5f53YI6XmBPXVF5ZRWT0nqrsSqFxMpbpZh3ArVmJZPeVhKUKkvhGJYgk3JOCVdWaPmUXI-5XWj3g4-92bRDaFKlyTUUUkvNMVEwUi60MQZfmS7UOxu-DTBzWMiMC5m0kDksZCB58tETE9usfPhL_s90dSxat81qn3y_Tah4IRhH5D-L43MW</recordid><startdate>20171201</startdate><enddate>20171201</enddate><creator>Jin, Xin</creator><creator>Zhu, Shuyun</creator><creator>Xiao, Chaoen</creator><creator>Sun, Hongbo</creator><creator>Li, Xiaodong</creator><creator>Zhao, Geng</creator><creator>Ge, Shiming</creator><general>Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20171201</creationdate><title>3D textured model encryption via 3D Lu chaotic mapping</title><author>Jin, Xin ; Zhu, Shuyun ; Xiao, Chaoen ; Sun, Hongbo ; Li, Xiaodong ; Zhao, Geng ; Ge, Shiming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-c8fe7a7055aea96fb456fea770ec46990b05eaf5177bb4c06b157bbcc74cbf6a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Apexes</topic><topic>Augmented reality</topic><topic>Computer Science</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Information Systems and Communication Service</topic><topic>Mapping</topic><topic>Polygons</topic><topic>Research Paper</topic><topic>Three dimensional models</topic><topic>Virtual reality</topic><topic>三维模型</topic><topic>加密方法</topic><topic>多边形</topic><topic>实体模型</topic><topic>混沌映射</topic><topic>纹理模型</topic><topic>表面模型</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jin, Xin</creatorcontrib><creatorcontrib>Zhu, Shuyun</creatorcontrib><creatorcontrib>Xiao, Chaoen</creatorcontrib><creatorcontrib>Sun, Hongbo</creatorcontrib><creatorcontrib>Li, Xiaodong</creatorcontrib><creatorcontrib>Zhao, Geng</creatorcontrib><creatorcontrib>Ge, Shiming</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jin, Xin</au><au>Zhu, Shuyun</au><au>Xiao, Chaoen</au><au>Sun, Hongbo</au><au>Li, Xiaodong</au><au>Zhao, Geng</au><au>Ge, Shiming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>3D textured model encryption via 3D Lu chaotic mapping</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2017-12-01</date><risdate>2017</risdate><volume>60</volume><issue>12</issue><spage>220</spage><epage>228</epage><pages>220-228</pages><artnum>122107</artnum><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include point clouds,meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3 D textured model. We propose a 3 D Lu chaotic mapping based encryption method for 3 D textured models. We encrypt the vertices, polygons, and textures of3 D models separately using the 3 D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3 D textured model. The experimental results reveal that our method can encrypt and decrypt 3 D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.</abstract><cop>Beijing</cop><pub>Science China Press</pub><doi>10.1007/s11432-017-9266-1</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1674-733X
ispartof Science China. Information sciences, 2017-12, Vol.60 (12), p.220-228, Article 122107
issn 1674-733X
1869-1919
language eng
recordid cdi_proquest_journals_2918595936
source ProQuest Central UK/Ireland; Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings; ProQuest Central
subjects Apexes
Augmented reality
Computer Science
Data encryption
Encryption
Information Systems and Communication Service
Mapping
Polygons
Research Paper
Three dimensional models
Virtual reality
三维模型
加密方法
多边形
实体模型
混沌映射
纹理模型
表面模型
title 3D textured model encryption via 3D Lu chaotic mapping
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T03%3A16%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=3D%20textured%20model%20encryption%20via%203D%20Lu%20chaotic%20mapping&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Jin,%20Xin&rft.date=2017-12-01&rft.volume=60&rft.issue=12&rft.spage=220&rft.epage=228&rft.pages=220-228&rft.artnum=122107&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-017-9266-1&rft_dat=%3Cproquest_cross%3E2918595936%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918595936&rft_id=info:pmid/&rft_cqvip_id=673840366&rfr_iscdi=true