3D textured model encryption via 3D Lu chaotic mapping
In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include po...
Gespeichert in:
Veröffentlicht in: | Science China. Information sciences 2017-12, Vol.60 (12), p.220-228, Article 122107 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 228 |
---|---|
container_issue | 12 |
container_start_page | 220 |
container_title | Science China. Information sciences |
container_volume | 60 |
creator | Jin, Xin Zhu, Shuyun Xiao, Chaoen Sun, Hongbo Li, Xiaodong Zhao, Geng Ge, Shiming |
description | In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include point clouds,meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3 D textured model. We propose a 3 D Lu chaotic mapping based encryption method for 3 D textured models. We encrypt the vertices, polygons, and textures of3 D models separately using the 3 D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3 D textured model. The experimental results reveal that our method can encrypt and decrypt 3 D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method. |
doi_str_mv | 10.1007/s11432-017-9266-1 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2918595936</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>673840366</cqvip_id><sourcerecordid>2918595936</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-c8fe7a7055aea96fb456fea770ec46990b05eaf5177bb4c06b157bbcc74cbf6a3</originalsourceid><addsrcrecordid>eNp9kM1OwzAQhC0EElXpA3CL4GzwxvY6PqLyK1XiAhI3y3GdNlWbpHaC4O1xlQpu7GXn8M2MNIRcArsBxtRtBBA8pwwU1TkihRMygQI1BQ36NGlUgirOP87JLMYNS8c5y1UxIcjvs95_9UPwy2zXLv02840L311ft032WdssAYshc2vb9rXLdrbr6mZ1Qc4qu41-dvxT8v748DZ_povXp5f53YI6XmBPXVF5ZRWT0nqrsSqFxMpbpZh3ArVmJZPeVhKUKkvhGJYgk3JOCVdWaPmUXI-5XWj3g4-92bRDaFKlyTUUUkvNMVEwUi60MQZfmS7UOxu-DTBzWMiMC5m0kDksZCB58tETE9usfPhL_s90dSxat81qn3y_Tah4IRhH5D-L43MW</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2918595936</pqid></control><display><type>article</type><title>3D textured model encryption via 3D Lu chaotic mapping</title><source>ProQuest Central UK/Ireland</source><source>Alma/SFX Local Collection</source><source>SpringerLink Journals - AutoHoldings</source><source>ProQuest Central</source><creator>Jin, Xin ; Zhu, Shuyun ; Xiao, Chaoen ; Sun, Hongbo ; Li, Xiaodong ; Zhao, Geng ; Ge, Shiming</creator><creatorcontrib>Jin, Xin ; Zhu, Shuyun ; Xiao, Chaoen ; Sun, Hongbo ; Li, Xiaodong ; Zhao, Geng ; Ge, Shiming</creatorcontrib><description>In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include point clouds,meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3 D textured model. We propose a 3 D Lu chaotic mapping based encryption method for 3 D textured models. We encrypt the vertices, polygons, and textures of3 D models separately using the 3 D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3 D textured model. The experimental results reveal that our method can encrypt and decrypt 3 D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.</description><identifier>ISSN: 1674-733X</identifier><identifier>EISSN: 1869-1919</identifier><identifier>DOI: 10.1007/s11432-017-9266-1</identifier><language>eng</language><publisher>Beijing: Science China Press</publisher><subject>Apexes ; Augmented reality ; Computer Science ; Data encryption ; Encryption ; Information Systems and Communication Service ; Mapping ; Polygons ; Research Paper ; Three dimensional models ; Virtual reality ; 三维模型 ; 加密方法 ; 多边形 ; 实体模型 ; 混沌映射 ; 纹理模型 ; 表面模型</subject><ispartof>Science China. Information sciences, 2017-12, Vol.60 (12), p.220-228, Article 122107</ispartof><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017</rights><rights>Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2017.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-c8fe7a7055aea96fb456fea770ec46990b05eaf5177bb4c06b157bbcc74cbf6a3</citedby><cites>FETCH-LOGICAL-c386t-c8fe7a7055aea96fb456fea770ec46990b05eaf5177bb4c06b157bbcc74cbf6a3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/84009A/84009A.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11432-017-9266-1$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2918595936?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,780,784,21388,27924,27925,33744,41488,42557,43805,51319,64385,64389,72469</link.rule.ids></links><search><creatorcontrib>Jin, Xin</creatorcontrib><creatorcontrib>Zhu, Shuyun</creatorcontrib><creatorcontrib>Xiao, Chaoen</creatorcontrib><creatorcontrib>Sun, Hongbo</creatorcontrib><creatorcontrib>Li, Xiaodong</creatorcontrib><creatorcontrib>Zhao, Geng</creatorcontrib><creatorcontrib>Ge, Shiming</creatorcontrib><title>3D textured model encryption via 3D Lu chaotic mapping</title><title>Science China. Information sciences</title><addtitle>Sci. China Inf. Sci</addtitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><description>In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include point clouds,meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3 D textured model. We propose a 3 D Lu chaotic mapping based encryption method for 3 D textured models. We encrypt the vertices, polygons, and textures of3 D models separately using the 3 D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3 D textured model. The experimental results reveal that our method can encrypt and decrypt 3 D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.</description><subject>Apexes</subject><subject>Augmented reality</subject><subject>Computer Science</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Information Systems and Communication Service</subject><subject>Mapping</subject><subject>Polygons</subject><subject>Research Paper</subject><subject>Three dimensional models</subject><subject>Virtual reality</subject><subject>三维模型</subject><subject>加密方法</subject><subject>多边形</subject><subject>实体模型</subject><subject>混沌映射</subject><subject>纹理模型</subject><subject>表面模型</subject><issn>1674-733X</issn><issn>1869-1919</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9kM1OwzAQhC0EElXpA3CL4GzwxvY6PqLyK1XiAhI3y3GdNlWbpHaC4O1xlQpu7GXn8M2MNIRcArsBxtRtBBA8pwwU1TkihRMygQI1BQ36NGlUgirOP87JLMYNS8c5y1UxIcjvs95_9UPwy2zXLv02840L311ft032WdssAYshc2vb9rXLdrbr6mZ1Qc4qu41-dvxT8v748DZ_povXp5f53YI6XmBPXVF5ZRWT0nqrsSqFxMpbpZh3ArVmJZPeVhKUKkvhGJYgk3JOCVdWaPmUXI-5XWj3g4-92bRDaFKlyTUUUkvNMVEwUi60MQZfmS7UOxu-DTBzWMiMC5m0kDksZCB58tETE9usfPhL_s90dSxat81qn3y_Tah4IRhH5D-L43MW</recordid><startdate>20171201</startdate><enddate>20171201</enddate><creator>Jin, Xin</creator><creator>Zhu, Shuyun</creator><creator>Xiao, Chaoen</creator><creator>Sun, Hongbo</creator><creator>Li, Xiaodong</creator><creator>Zhao, Geng</creator><creator>Ge, Shiming</creator><general>Science China Press</general><general>Springer Nature B.V</general><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>W92</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20171201</creationdate><title>3D textured model encryption via 3D Lu chaotic mapping</title><author>Jin, Xin ; Zhu, Shuyun ; Xiao, Chaoen ; Sun, Hongbo ; Li, Xiaodong ; Zhao, Geng ; Ge, Shiming</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-c8fe7a7055aea96fb456fea770ec46990b05eaf5177bb4c06b157bbcc74cbf6a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Apexes</topic><topic>Augmented reality</topic><topic>Computer Science</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Information Systems and Communication Service</topic><topic>Mapping</topic><topic>Polygons</topic><topic>Research Paper</topic><topic>Three dimensional models</topic><topic>Virtual reality</topic><topic>三维模型</topic><topic>加密方法</topic><topic>多边形</topic><topic>实体模型</topic><topic>混沌映射</topic><topic>纹理模型</topic><topic>表面模型</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Jin, Xin</creatorcontrib><creatorcontrib>Zhu, Shuyun</creatorcontrib><creatorcontrib>Xiao, Chaoen</creatorcontrib><creatorcontrib>Sun, Hongbo</creatorcontrib><creatorcontrib>Li, Xiaodong</creatorcontrib><creatorcontrib>Zhao, Geng</creatorcontrib><creatorcontrib>Ge, Shiming</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库-工程技术</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Science China. Information sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Jin, Xin</au><au>Zhu, Shuyun</au><au>Xiao, Chaoen</au><au>Sun, Hongbo</au><au>Li, Xiaodong</au><au>Zhao, Geng</au><au>Ge, Shiming</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>3D textured model encryption via 3D Lu chaotic mapping</atitle><jtitle>Science China. Information sciences</jtitle><stitle>Sci. China Inf. Sci</stitle><addtitle>SCIENCE CHINA Information Sciences</addtitle><date>2017-12-01</date><risdate>2017</risdate><volume>60</volume><issue>12</issue><spage>220</spage><epage>228</epage><pages>220-228</pages><artnum>122107</artnum><issn>1674-733X</issn><eissn>1869-1919</eissn><abstract>In the emerging Virtual/Augmented Reality(VR/AR) era, three dimensional(3 D) content will be popularized just as images and videos today. The security and privacy of these 3 D contents should be taken into consideration. 3 D contents contain surface models and solid models. Surface models include point clouds,meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3 D textured model. We propose a 3 D Lu chaotic mapping based encryption method for 3 D textured models. We encrypt the vertices, polygons, and textures of3 D models separately using the 3 D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3 D textured model. The experimental results reveal that our method can encrypt and decrypt 3 D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.</abstract><cop>Beijing</cop><pub>Science China Press</pub><doi>10.1007/s11432-017-9266-1</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1674-733X |
ispartof | Science China. Information sciences, 2017-12, Vol.60 (12), p.220-228, Article 122107 |
issn | 1674-733X 1869-1919 |
language | eng |
recordid | cdi_proquest_journals_2918595936 |
source | ProQuest Central UK/Ireland; Alma/SFX Local Collection; SpringerLink Journals - AutoHoldings; ProQuest Central |
subjects | Apexes Augmented reality Computer Science Data encryption Encryption Information Systems and Communication Service Mapping Polygons Research Paper Three dimensional models Virtual reality 三维模型 加密方法 多边形 实体模型 混沌映射 纹理模型 表面模型 |
title | 3D textured model encryption via 3D Lu chaotic mapping |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T03%3A16%3A07IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=3D%20textured%20model%20encryption%20via%203D%20Lu%20chaotic%20mapping&rft.jtitle=Science%20China.%20Information%20sciences&rft.au=Jin,%20Xin&rft.date=2017-12-01&rft.volume=60&rft.issue=12&rft.spage=220&rft.epage=228&rft.pages=220-228&rft.artnum=122107&rft.issn=1674-733X&rft.eissn=1869-1919&rft_id=info:doi/10.1007/s11432-017-9266-1&rft_dat=%3Cproquest_cross%3E2918595936%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2918595936&rft_id=info:pmid/&rft_cqvip_id=673840366&rfr_iscdi=true |