CN114882166A - Model transmission method, system, device and medium - Google Patents

Model transmission method, system, device and medium Download PDF

Info

Publication number
CN114882166A
CN114882166A CN202111612399.5A CN202111612399A CN114882166A CN 114882166 A CN114882166 A CN 114882166A CN 202111612399 A CN202111612399 A CN 202111612399A CN 114882166 A CN114882166 A CN 114882166A
Authority
CN
China
Prior art keywords
encrypted
dimensional model
data
key
transmitted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111612399.5A
Other languages
Chinese (zh)
Inventor
陈瑞良
张文伟
徐金生
崔少东
徐俊科
方广杰
寇明明
刘明
徐晓昕
袁顺新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China National Petroleum Corp
China Petroleum Pipeline Engineering Corp
Original Assignee
China National Petroleum Corp
China Petroleum Pipeline Engineering Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China National Petroleum Corp, China Petroleum Pipeline Engineering Corp filed Critical China National Petroleum Corp
Priority to CN202111612399.5A priority Critical patent/CN114882166A/en
Publication of CN114882166A publication Critical patent/CN114882166A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T17/00Three dimensional [3D] modelling, e.g. data description of 3D objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Abstract

The invention discloses a model transmission method, which comprises the following steps: acquiring a three-dimensional model to be transmitted and a key three-dimensional model; determining a plurality of kinds of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each kind of data to be encrypted; encrypting the data to be encrypted by using the data with the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted; and sending the encrypted three-dimensional model to be transmitted to a receiving end. The invention also discloses a system, a computer device and a readable storage medium. The scheme provided by the invention utilizes the key three-dimensional model to replace a key algorithm, and the data structure of each part of the key three-dimensional model is the same as that of each part of the encrypted three-dimensional model to be transmitted, so that a large amount of data in the key three-dimensional model can be used as keys, and different encrypted parts adopt different keys, so that the security is good and the confidentiality is high.

Description

Model transmission method, system, device and medium
Technical Field
The invention relates to the field of three-dimensional model encryption, in particular to a model transmission method, a system, equipment and a storage medium.
Background
In the field of the existing mapping geographic information and information security, the transmission problem of a confidential real-scene three-dimensional model is often encountered.
However, confidential transmission of the live-action three-dimensional model is a difficult problem, and the existing mainly adopted mode is manual acquisition and transmission, and the transmission mode has the defects of low transmission speed, high cost, incapability of realizing real-time transmission, easiness in file loss, damage, theft and disclosure and incapability of meeting the requirement of intelligent construction; the method also adopts modes of compression, fixed password addition, encryption algorithm and the like, belongs to the packaging of confidential documents, and is easy to crack to cause leakage of secrets and violate related regulations.
Disclosure of Invention
In view of the above, in order to overcome at least one aspect of the above problems, an embodiment of the present invention provides a model transmission method, including the following steps:
acquiring a three-dimensional model to be transmitted and a key three-dimensional model;
determining a plurality of kinds of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each kind of data to be encrypted;
encrypting the data to be encrypted by using the data with the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted;
and sending the encrypted three-dimensional model to be transmitted to a receiving end.
In some embodiments, obtaining a three-dimensional model of the key further comprises:
selecting a three-dimensional model with a preset size from the three-dimensional models to be transmitted as a key three-dimensional model; or the like, or a combination thereof,
and acquiring other three-dimensional models which do not need to be encrypted as the key three-dimensional models.
In some embodiments, determining a plurality of types of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each type of data to be encrypted further includes:
taking one or more of an insertion point coordinate, a surrounding sphere coordinate, a skeleton file vertex coordinate, a material file coordinate, a texture file coordinate, a pixel value of a texture and a text in the three-dimensional model to be transmitted as data to be encrypted;
an encryption algorithm is assigned to each type of data to be encrypted.
In some embodiments, an encryption algorithm is allocated to each kind of data to be encrypted, further comprising:
distributing the same encryption algorithm to each kind of data to be encrypted; or the like, or, alternatively,
distributing different encryption algorithms for each kind of data to be encrypted and recording the corresponding relation between each kind of data to be encrypted and the encryption algorithms;
the encryption algorithm comprises addition operation, subtraction operation, mean value operation and preset function operation.
In some embodiments, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the encrypted insertion point coordinates based on the insertion point coordinates in the key three-dimensional model, the insertion point coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the insertion point coordinates in the three-dimensional model to be transmitted with the encrypted insertion point coordinates.
In some embodiments, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the encrypted bounding sphere coordinates based on the bounding sphere coordinates in the key three-dimensional model, the bounding sphere coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the bounding sphere coordinates in the three-dimensional model to be transmitted with the encrypted bounding sphere coordinates.
In some embodiments, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the vertex coordinates of the encrypted framework file based on the vertex coordinates of the framework file in the key three-dimensional model, the vertex coordinates of the framework file in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the vertex coordinates of the framework file in the three-dimensional model to be transmitted with the vertex coordinates of the encrypted framework file.
In some embodiments, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the encrypted material file coordinates based on the material file coordinates in the key three-dimensional model, the material file coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the material file coordinates in the three-dimensional model to be transmitted with the encrypted material file coordinates.
In some embodiments, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the coordinates of the encrypted texture file based on the coordinates of the texture file in the key three-dimensional model, the coordinates of the texture file in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the coordinates of the texture file in the three-dimensional model to be transmitted with the coordinates of the encrypted texture file.
In some embodiments, further comprising:
and in response to the fact that the number of the corresponding types of coordinates in the key three-dimensional model is smaller than the number of the corresponding types of coordinates in the three-dimensional model to be transmitted, circularly using the corresponding types of coordinates in the key three-dimensional model.
In some embodiments, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
calculating the pixel value of the encrypted texture based on the pixel value of the texture in the key three-dimensional model, the pixel value of the texture in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and setting the pixel value of the texture in the three-dimensional model to be transmitted to zero;
and writing the obtained pixel value of the encrypted texture into a newly-built encrypted texture file.
In some embodiments, calculating the pixel value of the encrypted texture based on the pixel value of the texture in the key three-dimensional model, the pixel value of the texture in the three-dimensional model to be transmitted, and the corresponding encryption algorithm further comprises:
and responding to the pixel values of the textures in the key three-dimensional model to be 0 or 255, and sequentially encrypting with other pixel values which are not 0 or 255.
In some embodiments, further comprising:
and in response to the fact that the number of the pixel values of the textures in the key three-dimensional model is smaller than the number of the pixel values of the textures in the three-dimensional model to be transmitted, recycling the pixel values of the textures in the key three-dimensional model.
In some embodiments, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating an encrypted code based on the code of the text in the key three-dimensional model, the code of the text in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the text in the three-dimensional model to be transmitted with the encrypted code.
In some embodiments, further comprising:
and in response to the fact that the number of the codes of the texts in the key three-dimensional model is smaller than the number of the codes of the texts in the three-dimensional model to be transmitted, circularly using the codes of the texts in the key three-dimensional model.
In some embodiments, sending the encrypted three-dimensional model to be transmitted to the receiving end, further includes:
and decrypting the received encrypted three-dimensional model to be transmitted by using the key three-dimensional model and the corresponding relation between each data to be encrypted and the encryption algorithm at the receiving end.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a model transmission system, including:
the acquisition module is configured to acquire a three-dimensional model to be transmitted and a key three-dimensional model;
the determining module is configured to determine a plurality of kinds of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each kind of data to be encrypted;
the encryption module is configured to encrypt the data to be encrypted by using the data with the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted;
and the sending module is configured to send the encrypted three-dimensional model to be transmitted to a receiving end.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes the program to perform any of the steps of the model transmission method as described above.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of any of the model transmission methods described above.
The invention has one of the following beneficial technical effects: the scheme provided by the invention utilizes the key three-dimensional model to replace a key algorithm, and the data structure of each part of the key three-dimensional model is the same as that of each part of the encrypted three-dimensional model to be transmitted, so that a large amount of data in the key three-dimensional model can be used as keys, and different encrypted parts adopt different keys, so that the security is good and the confidentiality is high.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of a model transmission method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a model transmission system according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a computer device provided in an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are only used for convenience of description and should not be construed as a limitation to the embodiments of the present invention, and no description is provided in the following embodiments.
According to an aspect of the present invention, an embodiment of the present invention provides a model transmission method, as shown in fig. 1, which may include the steps of:
s1, acquiring a three-dimensional model to be transmitted and a three-dimensional model of a key;
s2, determining a plurality of kinds of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each kind of data to be encrypted;
s3, encrypting the data to be encrypted by using the data with the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted;
and S4, sending the encrypted three-dimensional model to be transmitted to a receiving end.
The scheme provided by the invention utilizes the key three-dimensional model to replace a key algorithm, the data structure of each part of the key three-dimensional model is the same as that of each part of the encrypted three-dimensional model to be transmitted, so that a large amount of data in the key three-dimensional model can be used as keys, different encrypted parts adopt different keys, and the key three-dimensional model has good safety and high confidentiality. And the three-dimensional model can be replaced at any time.
In some embodiments, step S1, obtaining a three-dimensional model of the key, further includes:
selecting a three-dimensional model with a preset size from the three-dimensional models to be transmitted as a key three-dimensional model; or the like, or, alternatively,
and acquiring other three-dimensional models which do not need to be encrypted as the key three-dimensional models.
Specifically, the selected three-dimensional model of the key may be a part of the three-dimensional model to be transmitted, or may be an independent three-dimensional model having no relation with the three-dimensional model to be transmitted, and the data size is not too large, so that the data is convenient to transmit, but the data file should be complete, and includes all data component files: description files, data files, index tree files, and attribute files. The key three-dimensional model can be transmitted by adopting an offline security approach, so that the possibility of network leakage is avoided.
For example, 8km for the transmission of the oil strategy reserves of a certain country 2 The real three-dimensional model of (2). 0.25km can be selected 2 The real scene three-dimensional model which is completed in the earlier stage is used as a key three-dimensional model, each data file of the model is complete, and the model comprises all data composition files: description files, data files, index tree files, and attribute files. Then 0.25km 2 And the key three-dimensional model is stored to a construction site of the sending end and a design headquarter of the receiving end through a safety way.
In some embodiments, in step S2, determining a plurality of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each data to be encrypted, further includes:
s21, taking one or more of the insertion point coordinates, the surrounding sphere coordinates, the skeleton file vertex coordinates, the material file coordinates, the texture file coordinates, the pixel values of the textures and the texts in the three-dimensional model to be transmitted as data to be encrypted;
s22, an encryption algorithm is assigned to each kind of data to be encrypted.
Specifically, since the data structure of each part of the three-dimensional model of the key is the same as the data structure of each part of the three-dimensional model to be transmitted, the data in the three-dimensional model of the key can be used as the key to encrypt the corresponding data in the three-dimensional model to be transmitted.
For example, the coordinates of the insertion point in the three-dimensional model to be transmitted may be encrypted by using the coordinates of the insertion point in the key three-dimensional model, and the specific encryption algorithm may be one randomly selected from several preset encryption algorithms or one preset encryption algorithm. Similarly, the enclosing sphere coordinate, the vertex coordinate of the skeleton file, the coordinate of the material file, the coordinate of the texture file, the pixel value of the texture and the text in the key three-dimensional model can be respectively used for encrypting the enclosing sphere coordinate, the vertex coordinate of the skeleton file, the coordinate of the material file, the coordinate of the texture file, the pixel value of the texture and/or the text in the three-dimensional model to be transmitted, and the encryption algorithm corresponding to each kind of data to be encrypted can also be randomly selected from several preset encryption algorithms or a preset encryption algorithm.
In some embodiments, S22, assigning an encryption algorithm to each type of data to be encrypted, further comprises:
s221, distributing the same encryption algorithm for each kind of data to be encrypted; or the like, or a combination thereof,
s222, distributing different encryption algorithms for each kind of data to be encrypted and recording the corresponding relation between each kind of data to be encrypted and the encryption algorithms;
the encryption algorithm comprises addition operation, subtraction operation, mean value operation and preset function operation.
Specifically, the addition operation refers to adding data to be encrypted in the three-dimensional model to be transmitted and corresponding data in the key three-dimensional model to obtain encrypted data. The subtraction operation refers to subtracting the data to be encrypted in the three-dimensional model to be transmitted from the corresponding data in the key three-dimensional model to obtain the encrypted data. The mean value operation refers to that the data to be encrypted in the three-dimensional model to be transmitted and the corresponding data in the key three-dimensional model are averaged to obtain the encrypted data. The preset function operation refers to bringing data to be encrypted in the three-dimensional model to be transmitted and corresponding data in the key three-dimensional model into a preset function to obtain encrypted data, for example, the preset function is a binary linear function, and the function value is obtained by using the data to be encrypted in the three-dimensional model to be transmitted and the corresponding data in the key three-dimensional model to obtain encrypted data. And the corresponding encryption algorithm of each kind of data to be encrypted may be the same or different, and a fixed encryption algorithm may be assigned to each kind of data to be encrypted, or an encryption algorithm may be randomly assigned and a corresponding relationship may be recorded.
In some embodiments, step S3, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the encrypted insertion point coordinate based on the insertion point coordinate in the key three-dimensional model, the insertion point coordinate in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the insertion point coordinate in the three-dimensional model to be transmitted with the encrypted insertion point coordinate.
In some embodiments, step S3, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the encrypted bounding sphere coordinates based on the bounding sphere coordinates in the key three-dimensional model, the bounding sphere coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the bounding sphere coordinates in the three-dimensional model to be transmitted with the encrypted bounding sphere coordinates.
Specifically, the coordinates of the model insertion point can be extracted from the key model file and recorded as X1, Y1 and Z1, then the coordinates of the model insertion point can be extracted from the three-dimensional model file to be transmitted and recorded as X1, Y1 and Z1, and then the two are encrypted by using an encryption algorithm. For example, when the encryption algorithm is subtraction, difference encryption can be performed by using the two algorithms, that is, Δ X is X1-X1, Δ Y is Y1-Y1, and Δ Z is Z1-Z1, and finally Δ X, Δ Y, and Δ Z are written into the three-dimensional model file to be transmitted, so as to replace X1, Y1, and Z1 of the three-dimensional model file to be transmitted, that is, the encryption of the coordinates of the model insertion point in the three-dimensional model file to be transmitted is completed.
And similarly, the surrounding spherical coordinates in the three-dimensional model to be transmitted can be encrypted.
In some embodiments, step S3, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the vertex coordinates of the encrypted framework file based on the vertex coordinates of the framework file in the key three-dimensional model, the vertex coordinates of the framework file in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the vertex coordinates of the framework file in the three-dimensional model to be transmitted with the vertex coordinates of the encrypted framework file.
In some embodiments, step S3, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the encrypted material file coordinates based on the material file coordinates in the key three-dimensional model, the material file coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the material file coordinates in the three-dimensional model to be transmitted with the encrypted material file coordinates.
In some embodiments, step S3, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating the coordinates of the encrypted texture file based on the coordinates of the texture file in the key three-dimensional model, the coordinates of the texture file in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the coordinates of the texture file in the three-dimensional model to be transmitted with the coordinates of the encrypted texture file.
Specifically, the first array of the vertex coordinate value array of the skeleton file in the key three-dimensional model file may be recorded as X1, Y1, Z1, the first array of the vertex coordinate value array of the skeleton file in the three-dimensional model file to be transmitted may be recorded as X1, Y1, Z1, and then the two are encrypted by using an encryption algorithm. For example, when the encryption algorithm is subtraction, difference encryption can be performed by using the two, that is, Δ X is X1-X1, Δ Y is Y1-Y1, and Δ Z is Z1-Z1, then Δ X, Δ Y, and Δ Z are written into the first array of the vertex coordinate value array of the skeleton file in the three-dimensional model file to be transmitted, and the first array of the vertex coordinate value array of the original skeleton file in the three-dimensional model file to be transmitted, that is, X1, Y1, and Z1, that is, encryption of the first array of the vertex coordinate value array of the skeleton file in the three-dimensional model file to be transmitted is completed. Similarly, the second array, the third array, … … and all arrays of the array of the vertex coordinate values of the skeleton file in the three-dimensional model file to be transmitted can be encrypted.
Similarly, the coordinate value groups of the material file and the texture file in the three-dimensional model file to be transmitted can be encrypted.
In some embodiments, further comprising:
and in response to the fact that the number of the corresponding types of coordinates in the key three-dimensional model is smaller than the number of the corresponding types of coordinates in the three-dimensional model to be transmitted, circularly using the corresponding types of coordinates in the key three-dimensional model.
Specifically, when the number of coordinate arrays in the key three-dimensional model file is greater than or equal to the number of coordinate value arrays in the three-dimensional model file to be transmitted, encryption operation is performed on the corresponding arrays one by one; and when the number of the coordinate value arrays in the key three-dimensional model file is less than that of the coordinate value arrays in the three-dimensional model file to be transmitted, the coordinate value arrays in the key three-dimensional model file are reused, namely the first array is used for encryption after the last array is used.
In some embodiments, step S3, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
calculating the pixel value of the encrypted texture based on the pixel value of the texture in the key three-dimensional model, the pixel value of the texture in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and setting the pixel value of the texture in the three-dimensional model to be transmitted to zero;
and writing the obtained pixel value of the encrypted texture into a newly-built encrypted texture file.
In some embodiments, calculating the pixel value of the encrypted texture based on the pixel value of the texture in the key three-dimensional model, the pixel value of the texture in the three-dimensional model to be transmitted, and the corresponding encryption algorithm further comprises:
and responding to the pixel values of the textures in the key three-dimensional model to be 0 or 255, and sequentially encrypting with other pixel values which are not 0 or 255.
Specifically, r (red component) g (green component) b (blue component) of each pixel of the texture in the three-dimensional model to be transmitted may be encrypted, and a (transparency component) may not be encrypted. Specifically, the value of the first pixel of the key three-dimensional model texture is recorded as r, g and b, the value of the first pixel of the three-dimensional model texture to be transmitted is recorded as R, G, B, and then an encryption algorithm is utilized to perform encryption operation on the two pixels. For example, when the encryption algorithm is an addition operation, the two algorithms may be used to perform summation encryption, that is, Σ R + R, Σ G + G, Σ B + B, write Σ R, Σ G, Σ B into the newly created encrypted texture file in the three-dimensional model to be transmitted, set R, G, B of the first pixel of the texture in the original three-dimensional model to be transmitted to zero, that is, complete the encryption of the first pixel of the texture of the security model, and encrypt all pixels in the same manner.
If all the r, g, b values of one pixel of the key three-dimensional model texture are 0 (black) or 255 (white), the r, g, b values of the pixel cannot be used as the encryption key, and only the r, g, b values of not all zero or not all 255 can be sequentially searched for and used as the encryption key.
In some embodiments, further comprising:
and in response to the fact that the number of the pixel values of the textures in the key three-dimensional model is smaller than the number of the pixel values of the textures in the three-dimensional model to be transmitted, recycling the pixel values of the textures in the key three-dimensional model.
Specifically, when the number of the pixel values of the textures in the key three-dimensional model file is greater than or equal to the number of the pixel values of the textures in the three-dimensional model file to be transmitted, encryption operation is performed on the corresponding pixel values one by one; and when the number of the pixel values of the textures in the key three-dimensional model file is smaller than that of the textures in the three-dimensional model file to be transmitted, the pixel values of the textures in the key three-dimensional model file are repeatedly used, namely, the first pixel value is used for encryption after the last pixel value is used.
In some embodiments, step S3, encrypting the data to be encrypted by using the data in the three-dimensional key model, which is of the same type as the data to be encrypted, and an encryption algorithm corresponding to the data to be encrypted, further includes:
and calculating an encrypted code based on the code of the text in the key three-dimensional model, the code of the text in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the text in the three-dimensional model to be transmitted with the encrypted code.
Specifically, the text of the three-dimensional model of the key, including letters, numbers and Chinese characters, can be converted into corresponding ASC codes or zone bit codes to form a cipher group, which is marked as y1, y2, y3 and … …, wherein single-byte characters are converted into ASC codes, and double-byte characters or Chinese characters are converted into zone bit codes; and then converting the text including letters, numbers and Chinese characters in the three-dimensional model to be transmitted into corresponding ASC codes or zone bit codes, marking as m1, m2, m3 and … …, and then carrying out encryption operation on the text and the ASC codes or zone bit codes by using an encryption algorithm. For example, when the encryption algorithm is addition, the sum encryption may be performed using both, i.e., h 1-m 1+ y1, h 2-m 2+ y2, h 3-m 3+ y3, … …; and writing h1, h2, h3 and h … … into the security model, covering the original security attribute, and completing encryption of the security attribute in the security model.
For example, the text of the three-dimensional model of the key is: "crude oil storage tank … …", converts to the corresponding zoned code: "52135145200217242562 … …";
the text in the three-dimensional model to be transmitted is: "reserve 5 ten thousand squares … …" is converted into corresponding ASC code or zone code: 200233315345822329 … …, wherein 53 is ASC code of single byte character 5, and the rest is region code of double byte Chinese character;
carrying out summation encryption, wherein h1 is 7215, h2 is 8476, h3 is 2055, h4 is 6306, h5 is 4891, and … …;
and writing the number '72158476205563064891 … …' into the three-dimensional model to be transmitted, covering the original secret attribute 'reserve volume 5 ten thousand parties … …', and completing encryption of the text in the three-dimensional model to be transmitted.
In some embodiments, further comprising:
and in response to the fact that the number of the codes of the texts in the key three-dimensional model is smaller than the number of the codes of the texts in the three-dimensional model to be transmitted, circularly using the codes of the texts in the key three-dimensional model.
Specifically, when the number of codes of the text in the key three-dimensional model file is greater than or equal to the number of codes of the text in the three-dimensional model file to be transmitted, encryption operation is performed on the codes of the corresponding texts one by one; and when the number of the codes of the texts in the key three-dimensional model file is less than that of the texts in the three-dimensional model file to be transmitted, the codes of the texts in the key three-dimensional model file are repeatedly used, namely, the codes of the first text are used for encryption after the codes of the last text are finished.
In some embodiments, step S4, sending the encrypted three-dimensional model to be transmitted to the receiving end, further includes:
and decrypting the received encrypted three-dimensional model to be transmitted by using the key three-dimensional model and the corresponding relation between each data to be encrypted and the encryption algorithm at the receiving end.
Specifically, after the encrypted three-dimensional model to be transmitted is transmitted to the receiving end through the network, the encrypted three-dimensional model to be transmitted comprises a file directly generated by the three-dimensional model to be transmitted and a newly-built encryption texture file, and the received encrypted three-dimensional model to be transmitted can be decrypted at the receiving end by using a secret key model and a corresponding encryption algorithm.
For example, model insertion point coordinates can be extracted from the key three-dimensional model file as x1, y1, z 1; extracting coordinate differences delta X, delta Y and delta Z of model insertion points from the encrypted three-dimensional model file to be transmitted, summing and decrypting the coordinate differences delta X, delta Y and delta Z, namely X1-delta X + X1, Y1-delta Y + Y1 and Z1-delta Z + Z1, writing the X1, Y1 and Z1 into the encrypted three-dimensional model to be transmitted, and replacing the delta X, delta Y and delta Z in the received encrypted three-dimensional model file to be transmitted, namely completing decryption of the coordinates of the model insertion points in the received encrypted three-dimensional model to be transmitted.
Similarly, the encrypted surrounding sphere coordinate difference value, the skeleton file vertex coordinate, the material file coordinate, the texture file coordinate, the pixel value of the texture and/or the text in the received encrypted three-dimensional model file to be transmitted can be decrypted.
Compared with the common encryption method, most of the encryption methods are encryption methods by using fixed keys or various algorithms to form keys, and the encryption can be decrypted theoretically no matter how complex the algorithm is. The scheme provided by the invention does not generate a key algorithm, but encrypts by adopting a key three-dimensional model. Because the data structure of each part of the three-dimensional model of the key is the same as that of each part of the three-dimensional model to be transmitted, a large amount of data in the three-dimensional model of the key can be used as the key, different encrypted parts adopt different keys, and the key model is transmitted by adopting an offline security way, so that the possibility of network leakage is avoided. The secret key model can be replaced at any time, and the encryption method has good safety and high confidentiality.
The encryption method adopted by the invention does not need to specially develop a key generation program, does not need to design a complex key algorithm, can directly select part of the three-dimensional model to be transmitted as the key model, and can also be used for preparing an independent three-dimensional model which has no relation with the three-dimensional model to be transmitted.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a model transmission system 400, as shown in fig. 2, including:
an obtaining module 401 configured to obtain a three-dimensional model to be transmitted and a three-dimensional model of a key;
a determining module 402, configured to determine a plurality of types of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each type of data to be encrypted;
an encryption module 403 configured to encrypt the data to be encrypted by using the same type of data as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted;
and a sending module 404 configured to send the encrypted three-dimensional model to be transmitted to a receiving end.
In some embodiments, the acquisition module 401 is further configured to:
selecting a three-dimensional model with a preset size from the three-dimensional models to be transmitted as a key three-dimensional model; or the like, or, alternatively,
and acquiring other three-dimensional models which do not need to be encrypted as the key three-dimensional models.
In some embodiments, the determining module 402 is further configured to:
taking one or more of an insertion point coordinate, a surrounding sphere coordinate, a skeleton file vertex coordinate, a material file coordinate, a texture file coordinate, a pixel value of a texture and a text in the three-dimensional model to be transmitted as data to be encrypted;
an encryption algorithm is assigned to each type of data to be encrypted.
In some embodiments, the determining module 402 is further configured to:
distributing the same encryption algorithm to each kind of data to be encrypted; or the like, or, alternatively,
distributing different encryption algorithms for each kind of data to be encrypted and recording the corresponding relation between each kind of data to be encrypted and the encryption algorithms;
the encryption algorithm comprises addition operation, subtraction operation, mean value operation and preset function operation.
In some embodiments, the encryption module 40 is further configured to:
and calculating the encrypted insertion point coordinates based on the insertion point coordinates in the key three-dimensional model, the insertion point coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the insertion point coordinates in the three-dimensional model to be transmitted with the encrypted insertion point coordinates.
In some embodiments, the encryption module 40 is further configured to:
and calculating the encrypted bounding sphere coordinates based on the bounding sphere coordinates in the key three-dimensional model, the bounding sphere coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the bounding sphere coordinates in the three-dimensional model to be transmitted with the encrypted bounding sphere coordinates.
In some embodiments, the encryption module 40 is further configured to:
and calculating the vertex coordinates of the encrypted framework file based on the vertex coordinates of the framework file in the key three-dimensional model, the vertex coordinates of the framework file in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the vertex coordinates of the framework file in the three-dimensional model to be transmitted with the vertex coordinates of the encrypted framework file.
In some embodiments, the encryption module 40 is further configured to:
and calculating the encrypted material file coordinates based on the material file coordinates in the key three-dimensional model, the material file coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the material file coordinates in the three-dimensional model to be transmitted with the encrypted material file coordinates.
In some embodiments, the encryption module 40 is further configured to:
and calculating the coordinates of the encrypted texture file based on the coordinates of the texture file in the key three-dimensional model, the coordinates of the texture file in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the coordinates of the texture file in the three-dimensional model to be transmitted with the coordinates of the encrypted texture file.
In some embodiments, the encryption module 40 is further configured to:
and in response to the fact that the number of the corresponding types of coordinates in the key three-dimensional model is smaller than the number of the corresponding types of coordinates in the three-dimensional model to be transmitted, circularly using the corresponding types of coordinates in the key three-dimensional model.
In some embodiments, the encryption module 40 is further configured to:
calculating the pixel value of the encrypted texture based on the pixel value of the texture in the key three-dimensional model, the pixel value of the texture in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and setting the pixel value of the texture in the three-dimensional model to be transmitted to zero;
and writing the obtained pixel value of the encrypted texture into a newly-built encrypted texture file.
In some embodiments, the encryption module 40 is further configured to:
and responding to the pixel values of the textures in the key three-dimensional model to be 0 or 255, and sequentially encrypting with other pixel values which are not 0 or 255.
In some embodiments, the encryption module 40 is further configured to:
and in response to the fact that the number of the pixel values of the textures in the key three-dimensional model is smaller than the number of the pixel values of the textures in the three-dimensional model to be transmitted, recycling the pixel values of the textures in the key three-dimensional model.
In some embodiments, the encryption module 40 is further configured to:
and calculating an encrypted code based on the code of the text in the key three-dimensional model, the code of the text in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the text in the three-dimensional model to be transmitted with the encrypted code.
In some embodiments, the encryption module 40 is further configured to:
and in response to the fact that the number of the codes of the texts in the key three-dimensional model is smaller than the number of the codes of the texts in the three-dimensional model to be transmitted, circularly using the codes of the texts in the key three-dimensional model.
In some embodiments, further comprising a decryption module configured to:
and decrypting the received encrypted three-dimensional model to be transmitted by using the key three-dimensional model and the corresponding relation between each data to be encrypted and the encryption algorithm at the receiving end.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 3, an embodiment of the present invention further provides a computer apparatus 501, comprising:
at least one processor 520; and
the memory 510, the memory 510 storing a computer program 511 executable on the processor, the processor 520 executing the program to perform the steps of any of the above-described model transmission methods.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 4, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610, when executed by a processor, perform the steps of any of the above model transmission methods.
Finally, it should be noted that, as will be understood by those skilled in the art, all or part of the processes of the methods of the above embodiments may be implemented by a computer program, which is stored in a computer-readable storage medium, and the computer program may include the processes of the embodiments of the methods when executed.
Further, it should be understood that the computer-readable storage medium herein (e.g., memory) can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the advantages or disadvantages of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (19)

1. A method of model transmission, comprising the steps of:
acquiring a three-dimensional model to be transmitted and a key three-dimensional model;
determining a plurality of kinds of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each kind of data to be encrypted;
encrypting the data to be encrypted by using the data with the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted;
and sending the encrypted three-dimensional model to be transmitted to a receiving end.
2. The method of claim 1, wherein obtaining a three-dimensional model of a key further comprises:
selecting a three-dimensional model with a preset size from the three-dimensional models to be transmitted as a key three-dimensional model; or the like, or, alternatively,
and acquiring other three-dimensional models which do not need to be encrypted as the key three-dimensional models.
3. The method of claim 1, wherein determining a plurality of types of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each type of data to be encrypted further comprises:
taking one or more of an insertion point coordinate, a surrounding sphere coordinate, a skeleton file vertex coordinate, a material file coordinate, a texture file coordinate, a pixel value of a texture and a text in the three-dimensional model to be transmitted as data to be encrypted;
an encryption algorithm is assigned to each type of data to be encrypted.
4. The method of claim 3, wherein an encryption algorithm is assigned to each type of data to be encrypted, further comprising:
distributing the same encryption algorithm to each kind of data to be encrypted; or the like, or a combination thereof,
distributing different encryption algorithms for each kind of data to be encrypted and recording the corresponding relation between each kind of data to be encrypted and the encryption algorithms;
the encryption algorithm at least comprises an addition operation, a subtraction operation, a mean value operation and a preset function operation.
5. The method of claim 4, wherein the data to be encrypted is encrypted by using data of the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted, further comprising:
and calculating the encrypted insertion point coordinates based on the insertion point coordinates in the key three-dimensional model, the insertion point coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the insertion point coordinates in the three-dimensional model to be transmitted with the encrypted insertion point coordinates.
6. The method of claim 4, wherein the data to be encrypted is encrypted by using data of the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted, further comprising:
and calculating the encrypted surrounding ball coordinates based on the surrounding ball coordinates in the key three-dimensional model, the surrounding ball coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the surrounding ball coordinates in the three-dimensional model to be transmitted with the encrypted surrounding ball coordinates.
7. The method of claim 4, wherein the data to be encrypted is encrypted by using data of the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted, further comprising:
and calculating the vertex coordinates of the encrypted framework file based on the vertex coordinates of the framework file in the key three-dimensional model, the vertex coordinates of the framework file in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the vertex coordinates of the framework file in the three-dimensional model to be transmitted with the vertex coordinates of the encrypted framework file.
8. The method of claim 4, wherein the data to be encrypted is encrypted by using data of the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted, further comprising:
and calculating the encrypted material file coordinates based on the material file coordinates in the key three-dimensional model, the material file coordinates in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the material file coordinates in the three-dimensional model to be transmitted with the encrypted material file coordinates.
9. The method of claim 4, wherein the data to be encrypted is encrypted by using data of the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted, further comprising:
and calculating the coordinates of the encrypted texture file based on the coordinates of the texture file in the key three-dimensional model, the coordinates of the texture file in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the coordinates of the texture file in the three-dimensional model to be transmitted with the coordinates of the encrypted texture file.
10. The method of any one of claims 5-9, further comprising:
and in response to the fact that the number of the corresponding types of coordinates in the key three-dimensional model is smaller than the number of the corresponding types of coordinates in the three-dimensional model to be transmitted, circularly using the corresponding types of coordinates in the key three-dimensional model.
11. The method of claim 4, wherein the data to be encrypted is encrypted by using data of the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted, further comprising:
calculating the pixel value of the encrypted texture based on the pixel value of the texture in the key three-dimensional model, the pixel value of the texture in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and setting the pixel value of the texture in the three-dimensional model to be transmitted to zero;
and writing the obtained pixel value of the encrypted texture into a newly-built encrypted texture file.
12. The method of claim 11, wherein calculating pixel values of the encrypted texture based on pixel values of the texture in the keyed three-dimensional model, pixel values of the texture in the three-dimensional model to be transmitted, and a corresponding encryption algorithm, further comprises:
and responding to the pixel values of the textures in the key three-dimensional model to be 0 or 255, and sequentially encrypting with other pixel values which are not 0 or 255.
13. The method of claim 11, further comprising:
and in response to the fact that the number of the pixel values of the textures in the key three-dimensional model is smaller than the number of the pixel values of the textures in the three-dimensional model to be transmitted, recycling the pixel values of the textures in the key three-dimensional model.
14. The method of claim 4, wherein the data to be encrypted is encrypted by using data of the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted, further comprising:
and calculating an encrypted code based on the code of the text in the key three-dimensional model, the code of the text in the three-dimensional model to be transmitted and a corresponding encryption algorithm, and replacing the text in the three-dimensional model to be transmitted with the encrypted code.
15. The method of claim 14, further comprising:
and in response to the fact that the number of the codes of the text in the key three-dimensional model is smaller than the number of the codes of the text in the three-dimensional model to be transmitted, recycling the codes of the text in the key three-dimensional model.
16. The method of claim 4, wherein the encrypted three-dimensional model to be transmitted is sent to a receiving end, further comprising:
and decrypting the received encrypted three-dimensional model to be transmitted by using the key three-dimensional model and the corresponding relation between each data to be encrypted and the encryption algorithm at the receiving end.
17. A model transmission system, comprising:
the acquisition module is configured to acquire a three-dimensional model to be transmitted and a key three-dimensional model;
the determining module is configured to determine a plurality of kinds of data to be encrypted in the three-dimensional model to be transmitted and an encryption algorithm corresponding to each kind of data to be encrypted;
the encryption module is configured to encrypt the data to be encrypted by using the data with the same type as the data to be encrypted in the key three-dimensional model and an encryption algorithm corresponding to the data to be encrypted;
and the sending module is configured to send the encrypted three-dimensional model to be transmitted to a receiving end.
18. A computer device, comprising:
at least one processor; and
memory storing a computer program operable on the processor, characterized in that the processor executes the program to perform the steps of the method according to any of claims 1-16.
19. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1-16.
CN202111612399.5A 2021-12-27 2021-12-27 Model transmission method, system, device and medium Pending CN114882166A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111612399.5A CN114882166A (en) 2021-12-27 2021-12-27 Model transmission method, system, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111612399.5A CN114882166A (en) 2021-12-27 2021-12-27 Model transmission method, system, device and medium

Publications (1)

Publication Number Publication Date
CN114882166A true CN114882166A (en) 2022-08-09

Family

ID=82666502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111612399.5A Pending CN114882166A (en) 2021-12-27 2021-12-27 Model transmission method, system, device and medium

Country Status (1)

Country Link
CN (1) CN114882166A (en)

Similar Documents

Publication Publication Date Title
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
CN109767375A (en) The method and system of image watermark insertion and retrospect
Abdullah et al. New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm
EP3410685B1 (en) Image processing device, image processing method, and program
CN113194213B (en) PNG image information hiding and recovering method based on secret sharing and chaotic mapping
CN1846396B (en) Key information processing method, device thereof
CN108416223B (en) Information label encryption method and system based on chaos theory
CN112529586B (en) Transaction information management method, device, equipment and storage medium
CN115841413A (en) Image processing method and device
Wang et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion
CN103220455A (en) Apparatus and method for hiding secret information, and secret information restoring device and method
CN113055153B (en) Data encryption method, system and medium based on fully homomorphic encryption algorithm
CN112134687B (en) Information encryption and decryption method based on two-dimensional code
CN111030810B (en) Anti-counterfeiting encryption method based on image local random transformation technology
CN106228503B (en) The digital watermark embedding and extracting method of satellite remote-sensing image SHP dot files
CN111881444A (en) Identity verification system based on encrypted tag algorithm and working method thereof
CN114882166A (en) Model transmission method, system, device and medium
Choche et al. A methodology to conceal QR codes for security applications
CN114286131A (en) Transmission method and device for anchor image model file in live broadcast wheat
CN108712424B (en) Method for encrypting text based on mapping control point result table
CN109448821B (en) Network transmission method of digital orthophoto map
CN102495991B (en) Method for carrying out secret communication by using word document
CN109286607B (en) Method for encrypting digital elevation model based on surveying and mapping control point achievement table
CN111563238A (en) Anti-counterfeiting PDF automatic generation system and method for contract text
Zhao et al. 3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination