Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Encryption method of 3D texture model based on multi-level chaotic map

A technology of texture model and chaotic mapping, which is applied in the direction of secure communication through chaotic signals, countermeasures against encryption mechanism, digital transmission system, etc. It can solve problems such as low efficiency, unsuitable for encrypting images and models, and time-consuming encryption.

Inactive Publication Date: 2018-12-18
中共中央办公厅电子科技学院
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for images with a huge amount of data and high redundancy, this method is not an ideal solution for protecting images. Generally speaking, the size of image and model files is larger than ordinary text content, so the present invention utilizes traditional The encryption algorithm is very time-consuming and inefficient for encrypting images and model files, and is not suitable for encrypting images and models

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method of 3D texture model based on multi-level chaotic map
  • Encryption method of 3D texture model based on multi-level chaotic map
  • Encryption method of 3D texture model based on multi-level chaotic map

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0045] Multi-level 3D texture model encryption process:

[0046] Vertex Encryption:

[0047] As can be seen from the 3D model file, the vertices in the 3D texture model are also in the form of triplet lists:

[0048] V={(X 1 ,Y 1 ,Z 1 ),...,(X N ,Y N ,Z N )} (1)

[0049] where (X i ,Y i ,Z i ) is the 3D coordinate of the vertex and N is the number of vertices. The present invention uses 3DLu mapping to generate a random vector of size 3N:

[0050] LV={(LV 1 ,LV 2 ,LV 3 ),...,(LV 3N-2 ,LV 3N-1 ,LV 3N )} (2)

[0051] Then the elements of V and LV are multiplied accordingly, as follows:

[0052] VLV={(X 1 LV 1 ,Y 1 LV 2 ,Z 1 LV 3 ),...,(X N LV 3N-2 ,Y N LV 3N-1 ,Z N LV 3N )} (3)

[0053] The resulting new vector VLV represents the new coordinates of the vertices of the original 3D texture model:

[0054]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption method of 3D texture model based on multi-level chaotic map. Based on the contribution of the vertices (point clouds) of the 3D model, polygons and textures to 3Dmodel recognition, vertices that contribute most to identifying 3D models are encrypted using advanced 3D Lu mappings, and polygons and textures that contribute relatively little to identifying 3D models are encrypted using 2D Arnold mappings and 1D logistic mappings. The method is easily realized by software, and the invention can be widely applied to the fields of 3D printing, 3D modeling, 3D model secrecy and the like.

Description

technical field [0001] The present invention proposes an encryption method for a 3D texture model based on a multi-level chaotic map. According to the contribution degree of the vertices (point clouds), polygons and textures of the 3D model to the recognition of the 3D model, the vertex that contributes the most to the recognition of the 3D model uses a high-level The 3DLu map is encrypted, and the polygons and textures that make a relatively small contribution to the recognition of the 3D model are encrypted using a 2D Arnold map and a 1D logistic map. The method is easily realized by software, and the present invention can be widely applied to the fields of 3D printing, 3D modeling, 3D model security and the like. Background technique [0002] In the past, 3D modeling was widely used in visual inspection and robot navigation, but in recent years, it has been applied more and more in visual simulation, games, movies and virtual reality. Not only that, but also in the prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCH04L9/001H04L9/002
Inventor 金鑫于浩洋祝淑云李晓东赵耿
Owner 中共中央办公厅电子科技学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products