CN109039577A - Encryption method of 3D texture model based on multistage chaotic mapping - Google Patents

Encryption method of 3D texture model based on multistage chaotic mapping Download PDF

Info

Publication number
CN109039577A
CN109039577A CN201810966364.3A CN201810966364A CN109039577A CN 109039577 A CN109039577 A CN 109039577A CN 201810966364 A CN201810966364 A CN 201810966364A CN 109039577 A CN109039577 A CN 109039577A
Authority
CN
China
Prior art keywords
texture
model
vertex
encrypted
mapping
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810966364.3A
Other languages
Chinese (zh)
Inventor
金鑫
于浩洋
祝淑云
李晓东
赵耿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
School Of Electronic Technology Central Office Of Communist Party Of China
Original Assignee
School Of Electronic Technology Central Office Of Communist Party Of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by School Of Electronic Technology Central Office Of Communist Party Of China filed Critical School Of Electronic Technology Central Office Of Communist Party Of China
Priority to CN201810966364.3A priority Critical patent/CN109039577A/en
Publication of CN109039577A publication Critical patent/CN109039577A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Image Generation (AREA)

Abstract

The invention provides an encryption method of a 3D texture model based on multi-stage chaotic mapping. According to the contribution degree of the vertex (point cloud), polygon and texture of the 3D model to the 3D model identification, the vertex which has the largest contribution to the 3D model is encrypted by using the advanced 3D Lu mapping, and the polygon and texture which have relatively small contribution to the 3D model are encrypted by using the 2D Arnold mapping and the 1D logistic mapping. The method is easy to realize through software, and can be widely applied and popularized to the fields of 3D printing, 3D modeling, 3D model confidentiality and the like.

Description

The encryption method of 3D texture model based on Multistage Chaotic mapping
Technical field
The invention proposes a kind of encryption methods of 3D texture model based on Multistage Chaotic mapping, according to the top of 3D model The percentage contribution that point (point cloud), polygon and texture identify 3D model contributes maximum vertex to use on identification 3D model high Grade 3DLu mapping is encrypted, and to the polygon and texture for making relatively small contribution for identification 3D model, uses 2D Arnold Mapping and 1D logistic mapping encrypt them.This method is easy to through software realization, and the present invention can be widely applied It is generalized in the fields such as 3D printing, 3D modeling, 3D model secrecy.
Background technique
In the past, three-dimensional modeling was widely used in terms of vision-based detection and robot navigation, and in recent years, visual simulation, That applies in terms of game, film and virtual reality is also more and more.Moreover, History of conservancy cultural heritage, building and life Object medicine etc. is all applied.Three-dimensional modeling is applied at the aspect that protects cultural heritage, and text can be effectively recorded and saved Change legacy, and can analyze its achievement and status in history.Related software can also be utilized Model Digitization, such as 3DStudioMax;Dimensional Modeling Technology can also be applied to the design and manufacture in components, at low cost in this way, competitiveness is strong. 3D modeling technology is to establish the basis of virtual three-dimensional scene, and the accuracy of model and the authenticity of simulated scenario can all influence very The application in the real world.The development of optics and digital technology has pushed the development of 3D modeling technology, and application field is more and more wider, This has also pushed the development of 3D printing technique.
3D printing is a kind of technology using the method successively printed building object, which has the property changed, it will be pushed away The development of dynamic three-dimensional digital.In today that information technology is advanced by leaps and bounds, 3D digitlization, intelligence also become more and more popular, 3D examination The appearance of clothing mirror has fully demonstrated this point, and 3D virtual fitting is worked as the 3D mode input machine of people using body-sensing camera In, then by program by clothes through on the body of experiencer, and reflect in real time in the display, 3D fitting mirror is true Real, intuitive, efficient advantage leaks.Virtual 3D form, which is arranged in pairs or groups and cut out, experiences all very true to nature, industry at present, manufacture The prevailing model of industry is namely based on the design and manufacture of the 3D model of CAD, meshlab.With increasingly mature 3D printing and 3D Modeling technique, 3D model have gradually been come into the public visual field, have been also resulted in extensively to the analysis and management of digitized 3D model Concern.There is a large amount of 3D model to generate and propagate, the city 3D at present with the presence of countless 3D models, and all the time Big data is scanned also in rapid growth, Homeland Security privacy is also gradually exposed under the public visual field.This there is to 3D mould The urgent need of type encryption, has become extremely important to the research of 3D model Encryption Algorithm.
It is currently the epoch of network information technology high speed development, and is the epoch of big data electronic information, because of information The it is proposed of highway, global information have gradually formed an Information Network by computer, thus information security also by The attention of countries in the world says that information security is directly related to state secret toward big, it is past it is small say, be directly related to us Life, such as credit card, swindle on the net etc., so the safety of information must be paid attention to.It can according to the development trend of science and technology To find out that conventional cipher and modern password algorithm are directed to text invention typically come what is designed, usually the file of secret is utilized Encryption Algorithm is transformed into the irregular messy code of milli seemingly, and here it is the ciphertexts described in the present invention, are then transmitted to reception by network End, receiving end can use corresponding decryption method and reappear original text.However for having huge data volume and high redundancy For image, this method is not to protect the ideal solution of image, and in general, the size of image and model file is wanted It is bigger than plain text content, therefore the present invention very expends the time to image and model file encryption using conventional encryption algorithm, Efficiency is very low, is not appropriate for encrypted image and model.So the present invention studies adding specifically for graphic file on this question Decryption method.
Summary of the invention
The technical problem to be solved in the present invention are as follows: overcome the deficiencies in the prior art proposes a kind of based on Multistage Chaotic mapping 3D texture model encryption method, the hybrid chaotic system that higher-dimension and low-dimensional chaos algorithm form carries out 3D texture model Encryption, hides the information such as position, the texture of three dimensional object effectively, obtains three dimensional object effectively in transmission and use Protection.
The technical solution adopted by the present invention are as follows: a kind of encryption method of the 3D texture model based on Multistage Chaotic mapping, it is real Existing step:
Step (1) vertex gone out with 3D Lu chaotic maps to 3D model decomposition encrypts, and obtains encrypted top The method of point data takes following steps:
(11) it generates key: 3D Lu mapping being used to generate three-dimensional random vector as key, the kinetics equation of 3D LuA, b, c are that the kinetics equation parameter of 3D Lu according to the kinetics equation property of 3D Lu works as a= When 36, b=3, c=20, the behavior of the kinetics equation of 3D Lu is chaos, according to primary condition (x0,y0,z0) obtain three-dimensional Chaos sequence (xi,yi,zi), the kinetics equation system variable initial value (x of initial parameter a=36, b=3, c=20 and 3D Lu0, y0,z0) it is used as key;
(12) vertex encrypts: according to 3D model file, the vertex in 3D texture model uses the form of ternary Groups List: V ={ (X1,Y1,Z1),...,(XN,YN,ZN) wherein (Xi,Yi,Zi) (1≤i≤N) be vertex 3D coordinate, N is the number on vertex Amount;
Key (the kinetics equation system of initial parameter a=36, b=3, c=20 and 3D Lu generated according to previous step Initial guess (x0,y0,z0)) use 3D Lu kinetics equation generation three-dimensional random vector LV={ (LV1,LV2,LV3),..., (LV3N-2,LV3N-1,LV3N), V is multiplied with each element of LV correspondence: VLV={ (X1LV1,Y1LV2,Z1LV3),..., (XNLV3N-2,YNLV3N-1,ZNLV3N), this obtained new vector VLV indicates the new coordinate (X on original 3D texture model vertexi, Yi,Zi)→(XiLV3(i-1),YiLV3(i-1)+1,ZiLV3(i-1)+2), 1≤i≤N, this coordinate is encrypted 3D texture model vertex Encrypted coordinate.
The polygon that step (2) the 2DArnold mapping goes out 3D model decomposition encrypts, and obtains encrypted more Side shape method takes following steps:
(21) it generates random vector: being mapped using 2D Arnold and generate three-dimensional random vector as key, utilize Arnold Transformation for mula:
A, b are real number, | C | ≠ 0, wherein n, N, m are key, xn,ynFor initial value, the transformation using in plain text as initial value, It is iterated using initial value come to encrypting in plain text, (xn,yn) regarding the coordinate of matrix as, parameter n is the length of matrix, is produced Raw random vector: LP={ (LP1,LP2,LP3),...,(LP3M-2,LP3M-1,LP3M)};
(22) polygon encrypts:
Polygon in 3D texture model uses the form of ternary Groups List: P={ (A1,B1,C1),...,(Ai,Bi, Ci),...,(AM,BM,CM) wherein polygon (Ai,Bi,Ci) indicated in the form of vertex index, 1≤i≤M, 1≤Ai,Bi, Ci≤ N, N are the quantity on vertex;The random vector generated using previous step 2D Arnold mapping: LP={ (LP1,LP2, LP3),...,(LP3M-2,LP3M-1,LP3M), the element between P and LP is corresponding by following relationship:
Then LP is arranged by ascending order, the LP after sequence is represented as LPsort.According to LPsortThe new sequences of sequence, in use The corresponding relationship for stating formula description is ranked up the element in P, and the vector of the new sequences of element is expressed as P', P'=in P {(A′1,B′1,C′1),...,(A′i,B′i,C′i),...(A'M,B'M,C'M), wherein (A 'i,B′i,C′i) it is encrypted new Polygon.
Step (3) texture maps gone out with 1D logistic mapping to 3D model decomposition encrypt, after obtaining encryption Texture drawing method take following steps:
(31) texture image is converted: being separated each texture image and is converted it into RGB channel, rgb color mode is industry A kind of color standard on boundary, be by red (R), green (G), blue (B) three Color Channels variation and they between each other Superposition to obtain miscellaneous color, RGB is the color for representing three channels of red, green, blue, this standard is almost wrapped The all colours that human eyesight can perceive have been included, have been current with most wide one of color system;
(32) color channel DNA encoding: the image encryption based on DNA is generally divided into two stages: firstly, being managed using DNA Image pixel is reduced to DNA sequence dna by being encoded.Then gray-scale pixel values are decomposed into four DNA elements, Ke Yiti The efficiency and diffusion of hi-vision confusion.Secondly, the original image pixels of coding generate the key image shape based on DNA operation rules At password image.
DNA sequence dna contains four kinds of nucleic acid.A-T is a pair of of combination, and G-C is a pair of of combination.It is well known that in binary system, 1-0 is a pair of of combination.So 00-11 be it is corresponding, 10-01 is corresponding.The present invention uses A, G, C, and T substitutes 00,01, for 4 nucleic acid can be used to indicate it in each 8 bit image pixel.For example, the pixel value 123 in the decimal system can be expressed as two System 01111011 can further be encoded to DNA sequence dna AGTG;
(33) 1Dlogistic mapping generates random matrix and encrypts: 1Dlogistic mapping is that a kind of structure is comparatively simple And commonly used dynamic system is typical One Dimensional Chaotic Maps, is widely applied in secret communication field.Definition is such as Under:
xn+1=μ xn(1-xn-1)
3.569945672…<μ≤4
0≤xn≤1
Wherein, xn∈ (0,1), belongs to chaos domain, and μ ∈ [0,4] is the parameter of logistic mapping.It is reflected using 1D logic It penetrates to generate the random matrix of the texture image with same size, and be added in coding result using DNA addition, so It is encrypted afterwards using each channel of this method to texture image.Finally encrypted RGB channel is combined will Obtain encrypted texture image.
Step (4) the encrypted vertex data for generating above three step, polygon data, texture map data are written 3D texture model obtains encrypted 3D texture model and takes following steps:
(41) vertex data, polygon data, texture map data are written in 3D texture model file respectively, write-in with Upper three kinds of data do not have sequencing.
The principle of the invention lies in:
According to the percentage contribution that the vertex of 3D model, polygon and texture identify 3D model, design base can be summed up Some rules are encrypted in the 3D texture model of Multistage Chaotic mapping, as described below:
(1) it is the bulk encryption effect for improving 3D texture model, contributes maximum vertex to use identification 3D texture model Advanced 3DLu mapping is encrypted.Compared with low-dimensional chaos mapping, there is the 3DLu of multiple parameters and variable mapping that can generate more Complicated behavior, and time series more irregularities, more unpredictable, this greatly increases key space;
(2) in order to promote the encryption efficiency of 3D texture model, the polygon of relatively small contribution is made to for identification 3D model Shape is encrypted using 2DArnold mapping, and 2DArnold mapping is a kind of chaotic maps method, is mainly rolled over repeatedly to information It is folded, the Nonlinear Mapping of stretching conversion;
(3) it in order to promote the enciphering rate to texture, is selected as and identifies that 3D model is made relatively small contribution texture and adopted It is encrypted with 1Dlogistic mapping and DNA encoding, 1Dlogistic mapping is typical One Dimensional Chaotic Maps, logical in secrecy Letter field is widely applied, and the image encryption based on DNA is generally divided into two stages: firstly, carrying out coding using DNA theory will figure As pixel is reduced to DNA sequence dna.Then gray-scale pixel values are decomposed into four DNA elements, and the effect of image confusion can be improved Rate and diffusion;
According to above-mentioned rule, the present invention utilizes 3DLu mapping method, 2DArnold mapping, 1Dlogistic mapping and DNA Coding, for the scheme for the 3D texture model encryption that 3D texture model document design is mapped based on Multistage Chaotic.In this scenario, It contributes maximum vertex to use the highest 3DLu mapping method of safety using to 3D texture model, improves the scramble degree on vertex, Promote safety.In order to promote the speed of encryption, relatively low polygon is contributed to reflect using 2DArnold 3D texture model Capable encryption is injected, folding, stretching conversion is carried out to information, it can effective firm efficiency and safety.For texture maps, adopt The one-dimension array that quantity identical as texture maps pixel is quickly generated with 1Dlogistic mapping, is then added using DNA encoding Close, encryption efficiency is high.
The present invention compared with prior art, it is advantageous that:
(1) present invention has outstanding cipher round results, contributes high vertex using 3DLu mapping encrypting 3D texture model Algorithm, there are three advantages for the pseudo-random sequence which generates: first is that it is more more complicated than the structure of low-dimensional chaos mapping, it gives birth to At pseudo-random sequence be more difficult to predict;Second is that there are three parameters for the system, and there are three initial values.
(2) present invention can combine enciphering rate, and the polygon and texture relatively low to contribution are respectively adopted 2DArnold mapping and 1Dlogistic mapping.
(3) 3D texture model encryption method is simple, it is easy to accomplish.
(4) three kinds of chaotic maps using of the present invention are very sensitive to system parameter and initial value, it is slightly different cannot Encrypted result is decrypted correctly out, is highly resistant to brute force attack.
(5) present invention can effectively resist statistical attack, and the statistical property of encryption front and back 3D texture model is verified using VFH, The VFH of 3D texture model before and after encryption be it is entirely different, this causes statistical attack to be difficult to realize.
Detailed description of the invention
Fig. 1 is application scenario diagram of the present invention;
Fig. 2 is the present invention program flow chart.
Specific embodiment
The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.
Multistage 3D texture model ciphering process:
Vertex encryption:
By 3D model file it is found that the vertex in 3D texture model also uses the form of ternary Groups List:
V={ (X1,Y1,Z1),...,(XN,YN,ZN)} (1)
Wherein (Xi,Yi,Zi) be vertex 3D coordinate, N is the quantity on vertex.The present invention generates size using 3DLu mapping For the random vector of 3N:
LV={ (LV1,LV2,LV3),...,(LV3N-2,LV3N-1,LV3N)} (2)
Then V is multiplied with each element of LV correspondence, as follows:
VLV={ (X1LV1,Y1LV2,Z1LV3),...,(XNLV3N-2,YNLV3N-1,ZNLV3N)} (3)
This obtained new vector VLV indicates the new coordinate on original 3D texture model vertex:
(Xi,Yi,Zi)→(XiLV3(i-1),YiLV3(i-1)+1,ZiLV3(i-1)+2),1≤i≤N (4)
Polygon encryption:
Polygon (by taking triangle as an example) in 3D texture model is using in the form of ternary Groups List:
P={ (A1,B1,C1),...,(Ai,Bi,Ci),...,(AM,BM,CM)} (5)
Wherein polygon (Ai,Bi,Ci) indicated in the form of vertex index, 1≤i≤M, 1≤Ai,Bi,Ci≤ N, N are tops The quantity of point.The present invention generates size random vector using 2DArnold mapping:
LP={ (LP1,LP2,LP3),...,(LP3M-2,LP3M-1,LP3M)}(6)
The present invention is corresponding by following relationship by the element between P and LP:
Then the present invention arranges LP by ascending order.LP after sequence is represented as LPsort.According to LPsortThe new sequences of sequence, The present invention is ranked up the element in P using the corresponding relationship that formula (7) describe.The vector of the new sequences of element indicates in P For P'.
P'={ (A '1,B′1,C′1),...,(A′i,B′i,C′i),...(A'M,B'M,C'M)} (8)
Wherein (A 'i,B′i,C′i) be encryption after 3D model new triangle.
Texture encryption:
Using the 2D image with respective texture coordinate as the texture maps in 3D texture model.Image encryption based on DNA It is generally divided into two stages: image pixel being reduced to DNA sequence dna firstly, being encoded using DNA theory.Then gray-scale pixels Value is decomposed into four DNA elements, and the efficiency and diffusion of image confusion can be improved.Secondly, the original image pixels of coding It generates the key image based on DNA operation rules and forms password image.
DNA sequence dna contains four kinds of nucleic acid.A-T is a pair of of combination, and G-C is a pair of of combination.It is well known that in binary system, 1-0 is a pair of of combination.So 00-11 be it is corresponding, 10-01 is corresponding.The present invention uses A, G, C, and T substitutes 00,01, for 4 nucleic acid can be used to indicate it in each 8 bit image pixel.For example, the pixel value 123 in the decimal system can be expressed as two System 01111011 can further be encoded to DNA sequence dna AGTG.
The present invention carrys out encrypted textures image using existing image encryption method, and the present invention, which maps 1Dlogistic, to be replaced It is mapped at 3DLu.The present invention separates each texture image first and converts it into RGB channel, then each channel of texture image By DNA encoding.Then, the present invention generates the random matrix of the texture image with same size using 1D logical mappings, and It is added in coding result using DNA addition, is then encrypted using each channel of this method to texture image.Most The present invention, which combines encrypted RGB channel, afterwards will obtain encrypted texture image.
In short, the invention proposes a kind of encryption methods of 3D texture model based on Multistage Chaotic mapping, according to 3D mould The percentage contribution that the vertex (point cloud) of type, polygon and texture identify 3D model, contributes maximum vertex to identification 3D model It is encrypted using advanced 3DLu mapping, to the polygon and texture for making relatively small contribution for identification 3D model, is used 2DArnold mapping and 1Dlogistic mapping encrypt them.This method is easy to through software realization, and the present invention can Extensive use is generalized in the fields such as 3D printing, 3D modeling, 3D model secrecy.
The foregoing is merely some basic explanations of the invention, any equivalent change that technical solution according to the present invention is done It changes, is within the scope of protection of the invention.

Claims (5)

1. the encryption method of the 3D texture model based on Multistage Chaotic mapping, which comprises the following steps:
(1) 3D texture model is made of vertex, polygon, texture three parts, and the encryption to the above three parts is each other flat Row relationship encrypts according to the vertex that 3D Lu chaotic maps go out 3D model decomposition first, is added without context Vertex data after close;
(2) polygon for 3D model decomposition is mapped according to 2D Arnold to encrypt, obtain encrypted polygon figurate number According to;
(3) texture maps for 3D model decomposition are mapped according to 1D logistic to encrypt, obtain encrypted texture Figure;
(4) encrypted vertex data, polygon data, texture map data the write-in 3D texture model that above three step generates are obtained To encrypted 3D texture model.
2. the encryption method of the 3D texture model according to claim 1 based on Multistage Chaotic mapping, it is characterised in that: step Suddenly in (1), the vertex gone out with 3D Lu chaotic maps to 3D model decomposition is encrypted, and obtains encrypted vertex data Method take following steps:
(11) it generates key: 3D Lu mapping being used to generate three-dimensional random vector as key, the kinetics equation of 3D LuA, b, c are that the kinetics equation parameter of 3D Lu according to the kinetics equation property of 3D Lu works as a= When 36, b=3, c=20, the behavior of the kinetics equation of 3D Lu is chaos, according to primary condition (x0,y0,z0) obtain three-dimensional Chaos sequence (xi,yi,zi), the kinetics equation system variable initial value (x of initial parameter a=36, b=3, c=20 and 3D Lu0, y0,z0) it is used as key;
(12) vertex encrypts: according to 3D model file, the vertex in 3D texture model uses the form of ternary Groups List: V= {(X1,Y1,Z1),...,(XN,YN,ZN) wherein (Xi,Yi,Zi) be vertex 3D coordinate, N is the quantity on vertex, 1≤i≤N;
According to the key that step (11) generate, i.e. initial parameter a=36, b=3, the kinetics equation system of c=20 and 3D Lu Initial guess (x0,y0,z0), three-dimensional random vector LV={ (LV is generated using 3D Lu kinetics equation1,LV2,LV3),..., (LV3N-2,LV3N-1,LV3N), V is multiplied with each element of LV correspondence: VLV={ (X1LV1,Y1LV2,Z1LV3),..., (XNLV3N-2,YNLV3N-1,ZNLV3N), this obtained new vector VLV indicates the new coordinate (X on original 3D texture model vertexi, Yi,Zi)→(XiLV3(i-1),YiLV3(i-1)+1,ZiLV3(i-1)+2), 1≤i≤N, this coordinate is encrypted 3D texture model vertex Encrypted coordinate.
3. the encryption method of the 3D texture model according to claim 1 based on Multistage Chaotic mapping, it is characterised in that: step Suddenly in (2), the polygon that the 2D Arnold mapping goes out 3D model decomposition is encrypted, and obtains encrypted polygon figurate number According to method takes following steps:
(21) it generates random vector: being mapped using 2D Arnold and generate three-dimensional random vector as key, utilize Arnold conversion Formula:
A, b are real number, | C | ≠ 0, wherein n, N, m are key, xn,ynFor initial value, the transformation is using in plain text as initial value, utilization Initial value is iterated come to encrypting in plain text, (xn,yn) regard the coordinate of matrix as, parameter n is the length of matrix, generate with Machine vector: LP={ (LP1,LP2,LP3),...,(LP3M-2,LP3M-1,LP3M)};
(22) polygon encrypts: the polygon in 3D texture model uses the form of ternary Groups List: P={ (A1,B1, C1),...,(Ai,Bi,Ci),...,(AM,BM,CM) wherein polygon (Ai,Bi,Ci) indicated in the form of vertex index, 1≤ i≤M,1≤Ai,Bi,Ci≤ N, N are the quantity on vertex;Use the random vector that 2D Arnold mapping generates in step (21): LP ={ (LP1,LP2,LP3),...,(LP3M-2,LP3M-1,LP3M), the element between P and LP is corresponding by following relationship:
Then LP is arranged by ascending order, the LP after sequence is represented as LPsort, according to LPsortThe new sequences of sequence use above-mentioned public affairs The corresponding relationship of formula description is ranked up the element in P, and the vector of the new sequences of element is expressed as P', P'={ (A ' in P1, B′1,C′1),...,(A′i,B′i,C′i),...(A′M,B′M,C′M), wherein (A 'i,B′i,C′i) it is encrypted new polygon.
4. the encryption method of the 3D texture model according to claim 1 based on Multistage Chaotic mapping, it is characterised in that: step Suddenly (3) described texture maps gone out with 1D logistic mapping to 3D model decomposition carry out encryption method and take following steps:
(31) texture image is converted: being separated each texture image and is converted it into RGB channel;
(32) color channel DNA encoding: being converted into the texture image of RGB channel using previous step, is encoded using DNA theory Image pixel is reduced to DNA sequence dna, gray-scale pixel values are then decomposed into four DNA elements, the original image picture of coding Element generates the key image based on DNA operation rules and forms password image, is added the random matrix of texture image using DNA addition It is added in coding result, the texture image after obtaining DNA encoding;
(33) 1D logistic mapping generates random matrix and encrypts, is defined as:
xn+1=μ xn(1-xn-1)
3.569945672…<μ≤4
0≤xn≤1
xn∈ (0,1), μ ∈ [0,4] are mapped using 1D logistic to generate the random square of the texture image with same size Battle array, the texture image after DNA encoding obtained using step (32) are mapped using 1D logistic and generate random matrix Each channel of texture image is encrypted, finally encrypted RGB channel is combined to obtain encrypted texture Image.
5. the encryption method of the 3D texture model according to claim 1 based on Multistage Chaotic mapping, it is characterised in that: step Suddenly 3D texture model is written in (4) described encrypted vertex data for generating above three step, polygon data, texture map data It obtains encrypted 3D texture model and takes following steps: being respectively written to vertex data, polygon data, texture map data In 3D texture model file, write-in three of the above data do not have sequencing.
CN201810966364.3A 2018-08-23 2018-08-23 Encryption method of 3D texture model based on multistage chaotic mapping Pending CN109039577A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810966364.3A CN109039577A (en) 2018-08-23 2018-08-23 Encryption method of 3D texture model based on multistage chaotic mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810966364.3A CN109039577A (en) 2018-08-23 2018-08-23 Encryption method of 3D texture model based on multistage chaotic mapping

Publications (1)

Publication Number Publication Date
CN109039577A true CN109039577A (en) 2018-12-18

Family

ID=64628103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810966364.3A Pending CN109039577A (en) 2018-08-23 2018-08-23 Encryption method of 3D texture model based on multistage chaotic mapping

Country Status (1)

Country Link
CN (1) CN109039577A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110139105A (en) * 2019-04-10 2019-08-16 首都师范大学 More stereo-picture encryption methods, decryption method, encryption device and decryption device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609893A (en) * 2012-01-13 2012-07-25 航天科工深圳(集团)有限公司 Digital image encrypting and decrypting method
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN106709854A (en) * 2016-12-20 2017-05-24 西安电子科技大学 Cat mapping and chaos based image information fusion and encryption method
CN107734208A (en) * 2017-10-11 2018-02-23 中共中央办公厅电子科技学院 A kind of coloured image encipher-decipher method based on HSV space
CN107896144A (en) * 2017-11-08 2018-04-10 中共中央办公厅电子科技学院 A kind of 3D texture model encryption methods based on chaotic maps

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102609893A (en) * 2012-01-13 2012-07-25 航天科工深圳(集团)有限公司 Digital image encrypting and decrypting method
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN106709854A (en) * 2016-12-20 2017-05-24 西安电子科技大学 Cat mapping and chaos based image information fusion and encryption method
CN107734208A (en) * 2017-10-11 2018-02-23 中共中央办公厅电子科技学院 A kind of coloured image encipher-decipher method based on HSV space
CN107896144A (en) * 2017-11-08 2018-04-10 中共中央办公厅电子科技学院 A kind of 3D texture model encryption methods based on chaotic maps

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
XIN JIN等: "3D Point Cloud Encryption Through Chaotic Mapping", 《SPRINGER》 *
XIN JIN等: "3D textured model encryption via 3D Lu chaotic mapping", 《SPRINGER》 *
XIN JIN等: "An Invertible and Anti-Chosen Plaintext Attack Image Encryption Method based on DNA Encoding and Chaotic Mapping", 《IEEE》 *
XIN JIN等: "Color image encryption in non-RGB color spaces", 《SPRINGER》 *
XIN JIN等: "Multi-Level Chaotic Maps for 3D Textured Model Encryption", 《SPRINGER》 *
江六林: "基于混沌映射和DNA编码的图像加密技术的研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110139105A (en) * 2019-04-10 2019-08-16 首都师范大学 More stereo-picture encryption methods, decryption method, encryption device and decryption device
CN110139105B (en) * 2019-04-10 2021-08-13 首都师范大学 Multi-stereo image encryption method, multi-stereo image decryption method, multi-stereo image encryption device and multi-stereo image decryption device

Similar Documents

Publication Publication Date Title
CN107896144B (en) Chaos mapping-based 3D texture model encryption method
Liu et al. Color image encryption algorithm based on DNA coding and double chaos system
Gao et al. EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory
Pareek et al. Image encryption using chaotic logistic map
CN105046636B (en) Digital image encryption method based on chaotic system and nucleotide sequence database
CN103167213B (en) Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN104751401B (en) A kind of novel Piecewise linear chaotic map image encryption and coding method
Khan et al. A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
CN109376540A (en) A kind of image encryption method based on Duffing mapping and genetic manipulation
Jin et al. 3D textured model encryption via 3D Lu chaotic mapping
CN110430036A (en) A kind of RGB color image encryption method based on poor chaotic maps
CN107220923A (en) Digital picture feedback encryption method based on image network
CN107292802A (en) A kind of parallel image encryption method of quantum chaos
Wang et al. Chaotic image encryption algorithm based on dynamic spiral scrambling transform and deoxyribonucleic acid encoding operation
Wang et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion
Chavan et al. Design and implementation of hierarchical visual cryptography with expansion less shares
CN115580687A (en) Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion
CN110225222B (en) Image encryption method based on 3D orthogonal Latin square and chaotic system
Shakir et al. A new four-dimensional hyper-chaotic system for image encryption
CN104050625B (en) A kind of plaintext builds the composite chaotic image encryption method of initial key
Jin et al. Multi-level chaotic maps for 3d textured model encryption
Abd-El-Atty et al. Double medical image cryptosystem based on quantum walk
CN111131657B (en) Chaos medical image tamper-proof encryption method based on self-verification matrix

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181218

WD01 Invention patent application deemed withdrawn after publication