2019
DOI: 10.1007/978-3-030-17763-8_10
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Level Chaotic Maps for 3D Textured Model Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(9 citation statements)
references
References 9 publications
0
7
0
Order By: Relevance
“…A good 3D model encryption scheme should resist all kinds of known attacks, such as various brute-force attacks and statistical attacks [4,10].…”
Section: Security Analysis Of the Encryption Schemesmentioning
confidence: 99%
See 3 more Smart Citations
“…A good 3D model encryption scheme should resist all kinds of known attacks, such as various brute-force attacks and statistical attacks [4,10].…”
Section: Security Analysis Of the Encryption Schemesmentioning
confidence: 99%
“…When the VFH of the encryption process different from the VFH of the decryption process. So, the statistical attack will be impossible [4]. • Distribution of occupied positions: The 3D vertices occupied positions are analyses by computing the distribution occupied position 3D vertices for normal 3D vertices and encrypted 3D vertices.…”
Section: Resistant To the Statistical Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Various encryption algorithm types are proposed to convert data into unrecognized forms and prevent unauthorized user access [1][2][3][4][5]. The 3D model applications now days are developed and become more popular such as virtual reality, Computer-Aided Design (CAD), 3D printing, and digital visualization, so providing security for 3D model becomes an important matter and must provide a high level of confidentiality, integrity, and protection against unauthorized access for data, so the problem of the thread must be solved [6,7]. There are many proposed encryption schemes some of them have been adopted and standardized in the world; however, they are not suitable for a 3D model such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES) because the problem of 3D model encryption due to the application requirements and the data structure such as format compliance, content usability, complexity, security level and real-time performance [8], to overcome these problems, various encryption methods based on chaotic cryptography have been implemented.…”
Section: Introductionmentioning
confidence: 99%