3D Textured Model Encryption via 3D Lu Chaotic Mapping

09/25/2017
by   Xin Jin, et al.
0

In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration. 3D contents contain surface models and solid models. The surface models include point clouds, meshes and textured models. Previous work mainly focus on encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3D textured model. We propose a 3D Lu chaotic mapping based encryption method of 3D textured model. We encrypt the vertexes, the polygons and the textures of 3D models separately using the 3D Lu chaotic mapping. Then the encrypted vertices, edges and texture maps are composited together to form the final encrypted 3D textured model. The experimental results reveal that our method can encrypt and decrypt 3D textured models correctly. In addition, our method can resistant several attacks such as brute-force attack and statistic attack.

READ FULL TEXT

page 4

page 7

page 8

page 9

research
03/12/2023

Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented Reality

As the key technology of augmented reality (AR), 3D recognition and trac...
research
12/09/2019

On the Security of Pixel-Based Image Encryption for Privacy-Preserving Deep Neural Networks

This paper aims to evaluate the safety of a pixel-based image encryption...
research
03/09/2023

Generative Model-Based Attack on Learnable Image Encryption for Privacy-Preserving Deep Learning

In this paper, we propose a novel generative model-based attack on learn...
research
01/19/2022

On the impact of VR assessment on the Quality of Experience of Highly Realistic Digital Humans

Fuelled by the increase in popularity of virtual and augmented reality a...
research
08/07/2019

Separable Reversible Data Hiding Based on MSB Prediction for Encrypted 3D Mesh Models

Reversible data hiding in encrypted domain (RDH-ED) has received tremend...
research
02/10/2020

Adversarial Data Encryption

In the big data era, many organizations face the dilemma of data sharing...

Please sign up or login with your details

Forgot password? Click here to reset