2017
DOI: 10.1007/s11432-017-9266-1
|View full text |Cite
|
Sign up to set email alerts
|

3D textured model encryption via 3D Lu chaotic mapping

Abstract: In the coming Virtual/Augmented Reality (VR/AR) era, 3D contents will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration. 3D contents contain surface models and solid models. The surface models include point clouds, meshes and textured models. Previous work mainly focus on encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3D textured model. We propose a 3D Lu chaotic mapping based encrypti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
18
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 22 publications
0
18
0
Order By: Relevance
“…Although, like another side of the coin, the 3D model file is holding the possibility of unauthorized access and it has a series of intellectual property issues. Therefore, the 3D model file protection has become a great deal of increasing interesting for information security research [7], [8]. Unlike the traditional text message, the 3D model file can be considered as a special image in the computeraided design software.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Although, like another side of the coin, the 3D model file is holding the possibility of unauthorized access and it has a series of intellectual property issues. Therefore, the 3D model file protection has become a great deal of increasing interesting for information security research [7], [8]. Unlike the traditional text message, the 3D model file can be considered as a special image in the computeraided design software.…”
Section: Introductionmentioning
confidence: 99%
“…It cannot longer meet the encryption requirements. Ref [7], [8], [33], [34] using the chaotic system to encrypted the vertex information of 3D object. But these algorithms have drawbacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The adaptive convergence threshold proposed in this paper will reduce the manual participation, thus automate the registration algorithm. The reconstructed 3D models can be applied to the applications of 3D model retrieval, 3D textured model encryption [5], 3D point cloud encryption [6], etc.…”
Section: Introductionmentioning
confidence: 99%
“…Before recognition, images are usually represented by features (e.g., texture [1], sparse coding [2], deep learning [3]) to resist some adverse factors (e.g., illumination changes, deformations, noise). In re-identification field, the view-point variation is a key challenge.…”
mentioning
confidence: 99%