Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

3D point cloud model encryption method based on chaotic mapping

A point cloud model and encryption method technology, applied in the field of information security cryptography, can solve problems such as being unsuitable for 3D content, and achieve the effects of simple structure, increased confusion and diffusion capabilities, and easy implementation.

Active Publication Date: 2017-01-04
韶鼎人工智能科技有限公司
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional image or video encryption methods are not suitable for 3D content

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 3D point cloud model encryption method based on chaotic mapping
  • 3D point cloud model encryption method based on chaotic mapping
  • 3D point cloud model encryption method based on chaotic mapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] The logistics chaotic map is described by formula (1):

[0036] x n + 1 = μx n ( 1 - x n ) 3.569945672... μ ≤ 4 0 ≤ x n ≤ 1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a 3D point cloud model encryption method based on chaotic mapping, belongs to the information safety cryptography field, in particular relates to a method aiming at 3D model encryption, wherein the extreme sensitivity of a chaotic system can improve the complexity of an encryption scheme effectively, at the same time, the huge 3D point cloud data quantity can effectively improve the reliability of an encryption algorithm. The algorithm adopts the design thinking of a random inverse transformation matrix, a key sequence can be generated by utilizing the system parameters and an initial value, and further, a series of transformation matrixes are generated to encrypt, so that the tiny change of the initial value or the system parameters can cause the great change of a decryption result. The experiment analysis shows that the encryption scheme can resist the violence attacks very well, can gather the attacks and the differential attacks, and is high in secret key sensitivity and rapid in encryption / decryption speed. Moreover, the encryption method can be realized very easily via softwares. The encryption method of the present invention can be widely applied to and popularized in the point cloud model safety storage and transmission encryption.

Description

technical field [0001] The invention belongs to the field of information security cryptography, and is particularly aimed at a method for encrypting a 3D model, specifically a 3D point cloud model encryption based on a chaotic map. Background technique [0002] In today's world, 3D models such as 3D point cloud models, 3D wireframe models and 3D color texture models are more and more widely used in people's daily life and industrial production. Many people pass a large amount of visual information through social software and cloud storage. Information, including pictures, videos and 3D models, etc. With the development of 3D modeling and 3D printing technology, the number of 3D models is also increasing. However, little attention has been paid to the privacy protection issues in 3D models. Different from text encryption techniques, visualization data has some special characteristics, such as large data volume and high correlation between pixels or points. Traditional encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/00
CPCH04L9/001H04L9/0668
Inventor 金鑫吴肇星宋承根张春伟李晓东
Owner 韶鼎人工智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products