3D texture model encryption method based on chaotic mapping

A technology of texture model and encryption method, which is applied in the field of information security cryptography, can solve problems such as not suitable for 3D content, and achieve the effect of simple and reliable method, easy implementation, and simple structure

Active Publication Date: 2018-04-10
中共中央办公厅电子科技学院
View PDF1 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional image or video encryption methods are not suitable for 3D content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 3D texture model encryption method based on chaotic mapping
  • 3D texture model encryption method based on chaotic mapping
  • 3D texture model encryption method based on chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0040] The logistics chaotic map is described by formula (1):

[0041]

[0042] Among them, μ∈[0,4] is called the Logistic parameter. When the value of μ meets the condition of 3.56994560 The initial value obeys the formula (1), the chaotic map x n The output of will appear chaotic and suitable for generating random sequences.

[0043] refer to figure 1 Vertex encryption flow chart, the vertex encryption process of the present invention can be divided into the following three steps:

[0044] (1) Key generation

[0045] The initial value x of the Logistic chaotic map 0 And the parameter μ is used as the key to generate a pseudo-random number sequence corresponding to the midpoint of the texture model.

[0046] (2) Generation of reversible matrix

[0047] The 1st to 6th digits in the sequence generated by the previous step, nam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a 3D texture model encryption method based on chaotic mapping, belongs to the field of information security cryptology, and in particular relates to a 3D texture model encryption method. The complexity of the encryption scheme can be effectively improved by extreme sensitivity of a chaotic system, and meanwhile a 3D texture model can be divided into three parts: a peak, polygons and a texture map; the reliability of the encryption method can be effectively improved by separately encrypting the three parts. According to the method, a design thought of a random reversibletransformation matrix is used, a secret key sequence can be generated by using a system parameter and an initial value, and thus a series of transformation matrixes are further generated for encryption. Therefore, a decrypting result can be greatly changed due to tiny change of the initial value or the system parameter. Experimental analysis shows that the encryption scheme can well resist violentstacks and count the attacks, and is high in secret key sensitivity and quick in encryption and decryption speeds. Furthermore, the encryption method is extremely easy to implement via software, andcan be widely applied and popularized to secure storage and transmission encryption of the texture model.

Description

technical field [0001] The invention belongs to the field of information security cryptography, and in particular relates to a 3D texture model encryption method based on chaotic mapping. Background technique [0002] In today's world, 3D models such as 3D point cloud models, 3D wireframe models and 3D color texture models are more and more widely used in people's daily life and industrial production. Many people pass a large amount of visual information through social software and cloud storage. Information, including pictures, videos and 3D models, etc. With the development of 3D modeling and 3D printing technology, the number of 3D models is also increasing. However, little attention has been paid to the privacy protection issues in 3D models. Different from text encryption techniques, visualization data has some special characteristics, such as large data volume and high correlation between pixels or points. Traditional encryption algorithms, such as Data Encryption S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04N1/44
CPCH04L9/001H04L9/002H04N1/44
Inventor 金鑫祝淑云李晓东赵耿孙楠田朝辉
Owner 中共中央办公厅电子科技学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products