CN109039577A - Encryption method of 3D texture model based on multistage chaotic mapping - Google Patents
Encryption method of 3D texture model based on multistage chaotic mapping Download PDFInfo
- Publication number
- CN109039577A CN109039577A CN201810966364.3A CN201810966364A CN109039577A CN 109039577 A CN109039577 A CN 109039577A CN 201810966364 A CN201810966364 A CN 201810966364A CN 109039577 A CN109039577 A CN 109039577A
- Authority
- CN
- China
- Prior art keywords
- texture
- model
- vertex
- encrypted
- mapping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Image Generation (AREA)
Abstract
The invention provides an encryption method of a 3D texture model based on multi-stage chaotic mapping. According to the contribution degree of the vertex (point cloud), polygon and texture of the 3D model to the 3D model identification, the vertex which has the largest contribution to the 3D model is encrypted by using the advanced 3D Lu mapping, and the polygon and texture which have relatively small contribution to the 3D model are encrypted by using the 2D Arnold mapping and the 1D logistic mapping. The method is easy to realize through software, and can be widely applied and popularized to the fields of 3D printing, 3D modeling, 3D model confidentiality and the like.
Description
Technical field
The invention proposes a kind of encryption methods of 3D texture model based on Multistage Chaotic mapping, according to the top of 3D model
The percentage contribution that point (point cloud), polygon and texture identify 3D model contributes maximum vertex to use on identification 3D model high
Grade 3DLu mapping is encrypted, and to the polygon and texture for making relatively small contribution for identification 3D model, uses 2D Arnold
Mapping and 1D logistic mapping encrypt them.This method is easy to through software realization, and the present invention can be widely applied
It is generalized in the fields such as 3D printing, 3D modeling, 3D model secrecy.
Background technique
In the past, three-dimensional modeling was widely used in terms of vision-based detection and robot navigation, and in recent years, visual simulation,
That applies in terms of game, film and virtual reality is also more and more.Moreover, History of conservancy cultural heritage, building and life
Object medicine etc. is all applied.Three-dimensional modeling is applied at the aspect that protects cultural heritage, and text can be effectively recorded and saved
Change legacy, and can analyze its achievement and status in history.Related software can also be utilized Model Digitization, such as
3DStudioMax;Dimensional Modeling Technology can also be applied to the design and manufacture in components, at low cost in this way, competitiveness is strong.
3D modeling technology is to establish the basis of virtual three-dimensional scene, and the accuracy of model and the authenticity of simulated scenario can all influence very
The application in the real world.The development of optics and digital technology has pushed the development of 3D modeling technology, and application field is more and more wider,
This has also pushed the development of 3D printing technique.
3D printing is a kind of technology using the method successively printed building object, which has the property changed, it will be pushed away
The development of dynamic three-dimensional digital.In today that information technology is advanced by leaps and bounds, 3D digitlization, intelligence also become more and more popular, 3D examination
The appearance of clothing mirror has fully demonstrated this point, and 3D virtual fitting is worked as the 3D mode input machine of people using body-sensing camera
In, then by program by clothes through on the body of experiencer, and reflect in real time in the display, 3D fitting mirror is true
Real, intuitive, efficient advantage leaks.Virtual 3D form, which is arranged in pairs or groups and cut out, experiences all very true to nature, industry at present, manufacture
The prevailing model of industry is namely based on the design and manufacture of the 3D model of CAD, meshlab.With increasingly mature 3D printing and 3D
Modeling technique, 3D model have gradually been come into the public visual field, have been also resulted in extensively to the analysis and management of digitized 3D model
Concern.There is a large amount of 3D model to generate and propagate, the city 3D at present with the presence of countless 3D models, and all the time
Big data is scanned also in rapid growth, Homeland Security privacy is also gradually exposed under the public visual field.This there is to 3D mould
The urgent need of type encryption, has become extremely important to the research of 3D model Encryption Algorithm.
It is currently the epoch of network information technology high speed development, and is the epoch of big data electronic information, because of information
The it is proposed of highway, global information have gradually formed an Information Network by computer, thus information security also by
The attention of countries in the world says that information security is directly related to state secret toward big, it is past it is small say, be directly related to us
Life, such as credit card, swindle on the net etc., so the safety of information must be paid attention to.It can according to the development trend of science and technology
To find out that conventional cipher and modern password algorithm are directed to text invention typically come what is designed, usually the file of secret is utilized
Encryption Algorithm is transformed into the irregular messy code of milli seemingly, and here it is the ciphertexts described in the present invention, are then transmitted to reception by network
End, receiving end can use corresponding decryption method and reappear original text.However for having huge data volume and high redundancy
For image, this method is not to protect the ideal solution of image, and in general, the size of image and model file is wanted
It is bigger than plain text content, therefore the present invention very expends the time to image and model file encryption using conventional encryption algorithm,
Efficiency is very low, is not appropriate for encrypted image and model.So the present invention studies adding specifically for graphic file on this question
Decryption method.
Summary of the invention
The technical problem to be solved in the present invention are as follows: overcome the deficiencies in the prior art proposes a kind of based on Multistage Chaotic mapping
3D texture model encryption method, the hybrid chaotic system that higher-dimension and low-dimensional chaos algorithm form carries out 3D texture model
Encryption, hides the information such as position, the texture of three dimensional object effectively, obtains three dimensional object effectively in transmission and use
Protection.
The technical solution adopted by the present invention are as follows: a kind of encryption method of the 3D texture model based on Multistage Chaotic mapping, it is real
Existing step:
Step (1) vertex gone out with 3D Lu chaotic maps to 3D model decomposition encrypts, and obtains encrypted top
The method of point data takes following steps:
(11) it generates key: 3D Lu mapping being used to generate three-dimensional random vector as key, the kinetics equation of 3D LuA, b, c are that the kinetics equation parameter of 3D Lu according to the kinetics equation property of 3D Lu works as a=
When 36, b=3, c=20, the behavior of the kinetics equation of 3D Lu is chaos, according to primary condition (x0,y0,z0) obtain three-dimensional
Chaos sequence (xi,yi,zi), the kinetics equation system variable initial value (x of initial parameter a=36, b=3, c=20 and 3D Lu0,
y0,z0) it is used as key;
(12) vertex encrypts: according to 3D model file, the vertex in 3D texture model uses the form of ternary Groups List: V
={ (X1,Y1,Z1),...,(XN,YN,ZN) wherein (Xi,Yi,Zi) (1≤i≤N) be vertex 3D coordinate, N is the number on vertex
Amount;
Key (the kinetics equation system of initial parameter a=36, b=3, c=20 and 3D Lu generated according to previous step
Initial guess (x0,y0,z0)) use 3D Lu kinetics equation generation three-dimensional random vector LV={ (LV1,LV2,LV3),...,
(LV3N-2,LV3N-1,LV3N), V is multiplied with each element of LV correspondence: VLV={ (X1LV1,Y1LV2,Z1LV3),...,
(XNLV3N-2,YNLV3N-1,ZNLV3N), this obtained new vector VLV indicates the new coordinate (X on original 3D texture model vertexi,
Yi,Zi)→(XiLV3(i-1),YiLV3(i-1)+1,ZiLV3(i-1)+2), 1≤i≤N, this coordinate is encrypted 3D texture model vertex
Encrypted coordinate.
The polygon that step (2) the 2DArnold mapping goes out 3D model decomposition encrypts, and obtains encrypted more
Side shape method takes following steps:
(21) it generates random vector: being mapped using 2D Arnold and generate three-dimensional random vector as key, utilize Arnold
Transformation for mula:
A, b are real number, | C | ≠ 0, wherein n, N, m are key, xn,ynFor initial value, the transformation using in plain text as initial value,
It is iterated using initial value come to encrypting in plain text, (xn,yn) regarding the coordinate of matrix as, parameter n is the length of matrix, is produced
Raw random vector: LP={ (LP1,LP2,LP3),...,(LP3M-2,LP3M-1,LP3M)};
(22) polygon encrypts:
Polygon in 3D texture model uses the form of ternary Groups List: P={ (A1,B1,C1),...,(Ai,Bi,
Ci),...,(AM,BM,CM) wherein polygon (Ai,Bi,Ci) indicated in the form of vertex index, 1≤i≤M, 1≤Ai,Bi,
Ci≤ N, N are the quantity on vertex;The random vector generated using previous step 2D Arnold mapping: LP={ (LP1,LP2,
LP3),...,(LP3M-2,LP3M-1,LP3M), the element between P and LP is corresponding by following relationship:
Then LP is arranged by ascending order, the LP after sequence is represented as LPsort.According to LPsortThe new sequences of sequence, in use
The corresponding relationship for stating formula description is ranked up the element in P, and the vector of the new sequences of element is expressed as P', P'=in P
{(A′1,B′1,C′1),...,(A′i,B′i,C′i),...(A'M,B'M,C'M), wherein (A 'i,B′i,C′i) it is encrypted new
Polygon.
Step (3) texture maps gone out with 1D logistic mapping to 3D model decomposition encrypt, after obtaining encryption
Texture drawing method take following steps:
(31) texture image is converted: being separated each texture image and is converted it into RGB channel, rgb color mode is industry
A kind of color standard on boundary, be by red (R), green (G), blue (B) three Color Channels variation and they between each other
Superposition to obtain miscellaneous color, RGB is the color for representing three channels of red, green, blue, this standard is almost wrapped
The all colours that human eyesight can perceive have been included, have been current with most wide one of color system;
(32) color channel DNA encoding: the image encryption based on DNA is generally divided into two stages: firstly, being managed using DNA
Image pixel is reduced to DNA sequence dna by being encoded.Then gray-scale pixel values are decomposed into four DNA elements, Ke Yiti
The efficiency and diffusion of hi-vision confusion.Secondly, the original image pixels of coding generate the key image shape based on DNA operation rules
At password image.
DNA sequence dna contains four kinds of nucleic acid.A-T is a pair of of combination, and G-C is a pair of of combination.It is well known that in binary system,
1-0 is a pair of of combination.So 00-11 be it is corresponding, 10-01 is corresponding.The present invention uses A, G, C, and T substitutes 00,01, for
4 nucleic acid can be used to indicate it in each 8 bit image pixel.For example, the pixel value 123 in the decimal system can be expressed as two
System 01111011 can further be encoded to DNA sequence dna AGTG;
(33) 1Dlogistic mapping generates random matrix and encrypts: 1Dlogistic mapping is that a kind of structure is comparatively simple
And commonly used dynamic system is typical One Dimensional Chaotic Maps, is widely applied in secret communication field.Definition is such as
Under:
xn+1=μ xn(1-xn-1)
3.569945672…<μ≤4
0≤xn≤1
Wherein, xn∈ (0,1), belongs to chaos domain, and μ ∈ [0,4] is the parameter of logistic mapping.It is reflected using 1D logic
It penetrates to generate the random matrix of the texture image with same size, and be added in coding result using DNA addition, so
It is encrypted afterwards using each channel of this method to texture image.Finally encrypted RGB channel is combined will
Obtain encrypted texture image.
Step (4) the encrypted vertex data for generating above three step, polygon data, texture map data are written
3D texture model obtains encrypted 3D texture model and takes following steps:
(41) vertex data, polygon data, texture map data are written in 3D texture model file respectively, write-in with
Upper three kinds of data do not have sequencing.
The principle of the invention lies in:
According to the percentage contribution that the vertex of 3D model, polygon and texture identify 3D model, design base can be summed up
Some rules are encrypted in the 3D texture model of Multistage Chaotic mapping, as described below:
(1) it is the bulk encryption effect for improving 3D texture model, contributes maximum vertex to use identification 3D texture model
Advanced 3DLu mapping is encrypted.Compared with low-dimensional chaos mapping, there is the 3DLu of multiple parameters and variable mapping that can generate more
Complicated behavior, and time series more irregularities, more unpredictable, this greatly increases key space;
(2) in order to promote the encryption efficiency of 3D texture model, the polygon of relatively small contribution is made to for identification 3D model
Shape is encrypted using 2DArnold mapping, and 2DArnold mapping is a kind of chaotic maps method, is mainly rolled over repeatedly to information
It is folded, the Nonlinear Mapping of stretching conversion;
(3) it in order to promote the enciphering rate to texture, is selected as and identifies that 3D model is made relatively small contribution texture and adopted
It is encrypted with 1Dlogistic mapping and DNA encoding, 1Dlogistic mapping is typical One Dimensional Chaotic Maps, logical in secrecy
Letter field is widely applied, and the image encryption based on DNA is generally divided into two stages: firstly, carrying out coding using DNA theory will figure
As pixel is reduced to DNA sequence dna.Then gray-scale pixel values are decomposed into four DNA elements, and the effect of image confusion can be improved
Rate and diffusion;
According to above-mentioned rule, the present invention utilizes 3DLu mapping method, 2DArnold mapping, 1Dlogistic mapping and DNA
Coding, for the scheme for the 3D texture model encryption that 3D texture model document design is mapped based on Multistage Chaotic.In this scenario,
It contributes maximum vertex to use the highest 3DLu mapping method of safety using to 3D texture model, improves the scramble degree on vertex,
Promote safety.In order to promote the speed of encryption, relatively low polygon is contributed to reflect using 2DArnold 3D texture model
Capable encryption is injected, folding, stretching conversion is carried out to information, it can effective firm efficiency and safety.For texture maps, adopt
The one-dimension array that quantity identical as texture maps pixel is quickly generated with 1Dlogistic mapping, is then added using DNA encoding
Close, encryption efficiency is high.
The present invention compared with prior art, it is advantageous that:
(1) present invention has outstanding cipher round results, contributes high vertex using 3DLu mapping encrypting 3D texture model
Algorithm, there are three advantages for the pseudo-random sequence which generates: first is that it is more more complicated than the structure of low-dimensional chaos mapping, it gives birth to
At pseudo-random sequence be more difficult to predict;Second is that there are three parameters for the system, and there are three initial values.
(2) present invention can combine enciphering rate, and the polygon and texture relatively low to contribution are respectively adopted
2DArnold mapping and 1Dlogistic mapping.
(3) 3D texture model encryption method is simple, it is easy to accomplish.
(4) three kinds of chaotic maps using of the present invention are very sensitive to system parameter and initial value, it is slightly different cannot
Encrypted result is decrypted correctly out, is highly resistant to brute force attack.
(5) present invention can effectively resist statistical attack, and the statistical property of encryption front and back 3D texture model is verified using VFH,
The VFH of 3D texture model before and after encryption be it is entirely different, this causes statistical attack to be difficult to realize.
Detailed description of the invention
Fig. 1 is application scenario diagram of the present invention;
Fig. 2 is the present invention program flow chart.
Specific embodiment
The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.
Multistage 3D texture model ciphering process:
Vertex encryption:
By 3D model file it is found that the vertex in 3D texture model also uses the form of ternary Groups List:
V={ (X1,Y1,Z1),...,(XN,YN,ZN)} (1)
Wherein (Xi,Yi,Zi) be vertex 3D coordinate, N is the quantity on vertex.The present invention generates size using 3DLu mapping
For the random vector of 3N:
LV={ (LV1,LV2,LV3),...,(LV3N-2,LV3N-1,LV3N)} (2)
Then V is multiplied with each element of LV correspondence, as follows:
VLV={ (X1LV1,Y1LV2,Z1LV3),...,(XNLV3N-2,YNLV3N-1,ZNLV3N)} (3)
This obtained new vector VLV indicates the new coordinate on original 3D texture model vertex:
(Xi,Yi,Zi)→(XiLV3(i-1),YiLV3(i-1)+1,ZiLV3(i-1)+2),1≤i≤N (4)
Polygon encryption:
Polygon (by taking triangle as an example) in 3D texture model is using in the form of ternary Groups List:
P={ (A1,B1,C1),...,(Ai,Bi,Ci),...,(AM,BM,CM)} (5)
Wherein polygon (Ai,Bi,Ci) indicated in the form of vertex index, 1≤i≤M, 1≤Ai,Bi,Ci≤ N, N are tops
The quantity of point.The present invention generates size random vector using 2DArnold mapping:
LP={ (LP1,LP2,LP3),...,(LP3M-2,LP3M-1,LP3M)}(6)
The present invention is corresponding by following relationship by the element between P and LP:
Then the present invention arranges LP by ascending order.LP after sequence is represented as LPsort.According to LPsortThe new sequences of sequence,
The present invention is ranked up the element in P using the corresponding relationship that formula (7) describe.The vector of the new sequences of element indicates in P
For P'.
P'={ (A '1,B′1,C′1),...,(A′i,B′i,C′i),...(A'M,B'M,C'M)} (8)
Wherein (A 'i,B′i,C′i) be encryption after 3D model new triangle.
Texture encryption:
Using the 2D image with respective texture coordinate as the texture maps in 3D texture model.Image encryption based on DNA
It is generally divided into two stages: image pixel being reduced to DNA sequence dna firstly, being encoded using DNA theory.Then gray-scale pixels
Value is decomposed into four DNA elements, and the efficiency and diffusion of image confusion can be improved.Secondly, the original image pixels of coding
It generates the key image based on DNA operation rules and forms password image.
DNA sequence dna contains four kinds of nucleic acid.A-T is a pair of of combination, and G-C is a pair of of combination.It is well known that in binary system,
1-0 is a pair of of combination.So 00-11 be it is corresponding, 10-01 is corresponding.The present invention uses A, G, C, and T substitutes 00,01, for
4 nucleic acid can be used to indicate it in each 8 bit image pixel.For example, the pixel value 123 in the decimal system can be expressed as two
System 01111011 can further be encoded to DNA sequence dna AGTG.
The present invention carrys out encrypted textures image using existing image encryption method, and the present invention, which maps 1Dlogistic, to be replaced
It is mapped at 3DLu.The present invention separates each texture image first and converts it into RGB channel, then each channel of texture image
By DNA encoding.Then, the present invention generates the random matrix of the texture image with same size using 1D logical mappings, and
It is added in coding result using DNA addition, is then encrypted using each channel of this method to texture image.Most
The present invention, which combines encrypted RGB channel, afterwards will obtain encrypted texture image.
In short, the invention proposes a kind of encryption methods of 3D texture model based on Multistage Chaotic mapping, according to 3D mould
The percentage contribution that the vertex (point cloud) of type, polygon and texture identify 3D model, contributes maximum vertex to identification 3D model
It is encrypted using advanced 3DLu mapping, to the polygon and texture for making relatively small contribution for identification 3D model, is used
2DArnold mapping and 1Dlogistic mapping encrypt them.This method is easy to through software realization, and the present invention can
Extensive use is generalized in the fields such as 3D printing, 3D modeling, 3D model secrecy.
The foregoing is merely some basic explanations of the invention, any equivalent change that technical solution according to the present invention is done
It changes, is within the scope of protection of the invention.
Claims (5)
1. the encryption method of the 3D texture model based on Multistage Chaotic mapping, which comprises the following steps:
(1) 3D texture model is made of vertex, polygon, texture three parts, and the encryption to the above three parts is each other flat
Row relationship encrypts according to the vertex that 3D Lu chaotic maps go out 3D model decomposition first, is added without context
Vertex data after close;
(2) polygon for 3D model decomposition is mapped according to 2D Arnold to encrypt, obtain encrypted polygon figurate number
According to;
(3) texture maps for 3D model decomposition are mapped according to 1D logistic to encrypt, obtain encrypted texture
Figure;
(4) encrypted vertex data, polygon data, texture map data the write-in 3D texture model that above three step generates are obtained
To encrypted 3D texture model.
2. the encryption method of the 3D texture model according to claim 1 based on Multistage Chaotic mapping, it is characterised in that: step
Suddenly in (1), the vertex gone out with 3D Lu chaotic maps to 3D model decomposition is encrypted, and obtains encrypted vertex data
Method take following steps:
(11) it generates key: 3D Lu mapping being used to generate three-dimensional random vector as key, the kinetics equation of 3D LuA, b, c are that the kinetics equation parameter of 3D Lu according to the kinetics equation property of 3D Lu works as a=
When 36, b=3, c=20, the behavior of the kinetics equation of 3D Lu is chaos, according to primary condition (x0,y0,z0) obtain three-dimensional
Chaos sequence (xi,yi,zi), the kinetics equation system variable initial value (x of initial parameter a=36, b=3, c=20 and 3D Lu0,
y0,z0) it is used as key;
(12) vertex encrypts: according to 3D model file, the vertex in 3D texture model uses the form of ternary Groups List: V=
{(X1,Y1,Z1),...,(XN,YN,ZN) wherein (Xi,Yi,Zi) be vertex 3D coordinate, N is the quantity on vertex, 1≤i≤N;
According to the key that step (11) generate, i.e. initial parameter a=36, b=3, the kinetics equation system of c=20 and 3D Lu
Initial guess (x0,y0,z0), three-dimensional random vector LV={ (LV is generated using 3D Lu kinetics equation1,LV2,LV3),...,
(LV3N-2,LV3N-1,LV3N), V is multiplied with each element of LV correspondence: VLV={ (X1LV1,Y1LV2,Z1LV3),...,
(XNLV3N-2,YNLV3N-1,ZNLV3N), this obtained new vector VLV indicates the new coordinate (X on original 3D texture model vertexi,
Yi,Zi)→(XiLV3(i-1),YiLV3(i-1)+1,ZiLV3(i-1)+2), 1≤i≤N, this coordinate is encrypted 3D texture model vertex
Encrypted coordinate.
3. the encryption method of the 3D texture model according to claim 1 based on Multistage Chaotic mapping, it is characterised in that: step
Suddenly in (2), the polygon that the 2D Arnold mapping goes out 3D model decomposition is encrypted, and obtains encrypted polygon figurate number
According to method takes following steps:
(21) it generates random vector: being mapped using 2D Arnold and generate three-dimensional random vector as key, utilize Arnold conversion
Formula:
A, b are real number, | C | ≠ 0, wherein n, N, m are key, xn,ynFor initial value, the transformation is using in plain text as initial value, utilization
Initial value is iterated come to encrypting in plain text, (xn,yn) regard the coordinate of matrix as, parameter n is the length of matrix, generate with
Machine vector: LP={ (LP1,LP2,LP3),...,(LP3M-2,LP3M-1,LP3M)};
(22) polygon encrypts: the polygon in 3D texture model uses the form of ternary Groups List: P={ (A1,B1,
C1),...,(Ai,Bi,Ci),...,(AM,BM,CM) wherein polygon (Ai,Bi,Ci) indicated in the form of vertex index, 1≤
i≤M,1≤Ai,Bi,Ci≤ N, N are the quantity on vertex;Use the random vector that 2D Arnold mapping generates in step (21): LP
={ (LP1,LP2,LP3),...,(LP3M-2,LP3M-1,LP3M), the element between P and LP is corresponding by following relationship:
Then LP is arranged by ascending order, the LP after sequence is represented as LPsort, according to LPsortThe new sequences of sequence use above-mentioned public affairs
The corresponding relationship of formula description is ranked up the element in P, and the vector of the new sequences of element is expressed as P', P'={ (A ' in P1,
B′1,C′1),...,(A′i,B′i,C′i),...(A′M,B′M,C′M), wherein (A 'i,B′i,C′i) it is encrypted new polygon.
4. the encryption method of the 3D texture model according to claim 1 based on Multistage Chaotic mapping, it is characterised in that: step
Suddenly (3) described texture maps gone out with 1D logistic mapping to 3D model decomposition carry out encryption method and take following steps:
(31) texture image is converted: being separated each texture image and is converted it into RGB channel;
(32) color channel DNA encoding: being converted into the texture image of RGB channel using previous step, is encoded using DNA theory
Image pixel is reduced to DNA sequence dna, gray-scale pixel values are then decomposed into four DNA elements, the original image picture of coding
Element generates the key image based on DNA operation rules and forms password image, is added the random matrix of texture image using DNA addition
It is added in coding result, the texture image after obtaining DNA encoding;
(33) 1D logistic mapping generates random matrix and encrypts, is defined as:
xn+1=μ xn(1-xn-1)
3.569945672…<μ≤4
0≤xn≤1
xn∈ (0,1), μ ∈ [0,4] are mapped using 1D logistic to generate the random square of the texture image with same size
Battle array, the texture image after DNA encoding obtained using step (32) are mapped using 1D logistic and generate random matrix
Each channel of texture image is encrypted, finally encrypted RGB channel is combined to obtain encrypted texture
Image.
5. the encryption method of the 3D texture model according to claim 1 based on Multistage Chaotic mapping, it is characterised in that: step
Suddenly 3D texture model is written in (4) described encrypted vertex data for generating above three step, polygon data, texture map data
It obtains encrypted 3D texture model and takes following steps: being respectively written to vertex data, polygon data, texture map data
In 3D texture model file, write-in three of the above data do not have sequencing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810966364.3A CN109039577A (en) | 2018-08-23 | 2018-08-23 | Encryption method of 3D texture model based on multistage chaotic mapping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810966364.3A CN109039577A (en) | 2018-08-23 | 2018-08-23 | Encryption method of 3D texture model based on multistage chaotic mapping |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109039577A true CN109039577A (en) | 2018-12-18 |
Family
ID=64628103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810966364.3A Pending CN109039577A (en) | 2018-08-23 | 2018-08-23 | Encryption method of 3D texture model based on multistage chaotic mapping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109039577A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110139105A (en) * | 2019-04-10 | 2019-08-16 | 首都师范大学 | More stereo-picture encryption methods, decryption method, encryption device and decryption device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609893A (en) * | 2012-01-13 | 2012-07-25 | 航天科工深圳(集团)有限公司 | Digital image encrypting and decrypting method |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
CN106709854A (en) * | 2016-12-20 | 2017-05-24 | 西安电子科技大学 | Cat mapping and chaos based image information fusion and encryption method |
CN107734208A (en) * | 2017-10-11 | 2018-02-23 | 中共中央办公厅电子科技学院 | A kind of coloured image encipher-decipher method based on HSV space |
CN107896144A (en) * | 2017-11-08 | 2018-04-10 | 中共中央办公厅电子科技学院 | A kind of 3D texture model encryption methods based on chaotic maps |
-
2018
- 2018-08-23 CN CN201810966364.3A patent/CN109039577A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102609893A (en) * | 2012-01-13 | 2012-07-25 | 航天科工深圳(集团)有限公司 | Digital image encrypting and decrypting method |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
CN106709854A (en) * | 2016-12-20 | 2017-05-24 | 西安电子科技大学 | Cat mapping and chaos based image information fusion and encryption method |
CN107734208A (en) * | 2017-10-11 | 2018-02-23 | 中共中央办公厅电子科技学院 | A kind of coloured image encipher-decipher method based on HSV space |
CN107896144A (en) * | 2017-11-08 | 2018-04-10 | 中共中央办公厅电子科技学院 | A kind of 3D texture model encryption methods based on chaotic maps |
Non-Patent Citations (6)
Title |
---|
XIN JIN等: "3D Point Cloud Encryption Through Chaotic Mapping", 《SPRINGER》 * |
XIN JIN等: "3D textured model encryption via 3D Lu chaotic mapping", 《SPRINGER》 * |
XIN JIN等: "An Invertible and Anti-Chosen Plaintext Attack Image Encryption Method based on DNA Encoding and Chaotic Mapping", 《IEEE》 * |
XIN JIN等: "Color image encryption in non-RGB color spaces", 《SPRINGER》 * |
XIN JIN等: "Multi-Level Chaotic Maps for 3D Textured Model Encryption", 《SPRINGER》 * |
江六林: "基于混沌映射和DNA编码的图像加密技术的研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110139105A (en) * | 2019-04-10 | 2019-08-16 | 首都师范大学 | More stereo-picture encryption methods, decryption method, encryption device and decryption device |
CN110139105B (en) * | 2019-04-10 | 2021-08-13 | 首都师范大学 | Multi-stereo image encryption method, multi-stereo image decryption method, multi-stereo image encryption device and multi-stereo image decryption device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112084517B (en) | Image encryption method based on chaotic mapping and bit-level permutation | |
CN107896144B (en) | Chaos mapping-based 3D texture model encryption method | |
Liu et al. | Color image encryption algorithm based on DNA coding and double chaos system | |
Gao et al. | EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory | |
Pareek et al. | Image encryption using chaotic logistic map | |
CN105046636B (en) | Digital image encryption method based on chaotic system and nucleotide sequence database | |
CN103167213B (en) | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system | |
CN101739695B (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
Khan et al. | A new hybrid image encryption algorithm based on 2D-CA, FSM-DNA rule generator, and FSBI | |
CN104751401B (en) | A kind of novel Piecewise linear chaotic map image encryption and coding method | |
CN107239708A (en) | It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos | |
Jin et al. | 3D textured model encryption via 3D Lu chaotic mapping | |
CN109376540A (en) | A kind of image encryption method based on Duffing mapping and genetic manipulation | |
CN107220923A (en) | Digital picture feedback encryption method based on image network | |
CN110430036A (en) | A kind of RGB color image encryption method based on poor chaotic maps | |
CN107610191A (en) | A kind of color image encrypting method and device | |
Shakir et al. | A new four-dimensional hyper-chaotic system for image encryption | |
Chavan et al. | Design and implementation of hierarchical visual cryptography with expansion less shares | |
Wang et al. | Chaotic image encryption algorithm based on dynamic spiral scrambling transform and deoxyribonucleic acid encoding operation | |
CN115580687A (en) | Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion | |
CN104050625B (en) | A kind of plaintext builds the composite chaotic image encryption method of initial key | |
CN110225222B (en) | Image encryption method based on 3D orthogonal Latin square and chaotic system | |
Abd-El-Atty et al. | Double medical image cryptosystem based on quantum walk | |
Jin et al. | Multi-level chaotic maps for 3d textured model encryption | |
CN111131657B (en) | Chaos medical image tamper-proof encryption method based on self-verification matrix |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181218 |
|
WD01 | Invention patent application deemed withdrawn after publication |