2015
DOI: 10.1109/tifs.2014.2378146
|View full text |Cite
|
Sign up to set email alerts
|

A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability

Abstract: Due to widespread applications of threedimensional (3D) vision technology, the research into 3D object protection is primarily important. To maintain confidentiality, encryption of 3D objects is essential. However, the requirements and limitations imposed by 3D objects indicate the impropriety of conventional cryptosystems for 3D object encryption. This suggests the necessity of designing new ciphers. In addition, the study of prior works indicates that the majority of problems encountered with encrypting 3D o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
49
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(49 citation statements)
references
References 23 publications
(45 reference statements)
0
49
0
Order By: Relevance
“…Some extended chaotic mapping algorithms [ 29 , 30 ] have been used to encrypt the point cloud. Furthermore, a series of random permutations and rotations have been employed to encrypt the point cloud by deforming the geometry [ 31 ]. The structure of the point cloud is three-dimensional, which is similar to that of NVS outputs.…”
Section: Related Workmentioning
confidence: 99%
“…Some extended chaotic mapping algorithms [ 29 , 30 ] have been used to encrypt the point cloud. Furthermore, a series of random permutations and rotations have been employed to encrypt the point cloud by deforming the geometry [ 31 ]. The structure of the point cloud is three-dimensional, which is similar to that of NVS outputs.…”
Section: Related Workmentioning
confidence: 99%
“…Current methods in this direction only consider the solid models [3], the point clouds models [9,8], the meshes [?] and the textures [10].…”
Section: Previous Workmentioning
confidence: 99%
“…On the other side, existing encryption algorithm of 3D image has weakness. In Ref [32], the encryption algorithm is adapted the double round encryption flow. However, the randomness of the pseudo-random number generator algorithm is poor.…”
Section: Introductionmentioning
confidence: 99%