2019
DOI: 10.1007/978-3-030-12839-5_29
|View full text |Cite
|
Sign up to set email alerts
|

A New Transformation of 3D Models Using Chaotic Encryption Based on Arnold Cat Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…Benson Raj et al in 2020 [21], the authors proposed an encryption system that uses a 3D Arnold cat map to encrypting the 3D mesh model. The 3D mesh model encrypted using substitution and shuffling based on Arnold cat map where the vertices and faces are substituted and shuffled separately in the proposed cryptosystem.…”
Section: Insight Into Different 3d Encryption Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Benson Raj et al in 2020 [21], the authors proposed an encryption system that uses a 3D Arnold cat map to encrypting the 3D mesh model. The 3D mesh model encrypted using substitution and shuffling based on Arnold cat map where the vertices and faces are substituted and shuffled separately in the proposed cryptosystem.…”
Section: Insight Into Different 3d Encryption Techniquesmentioning
confidence: 99%
“…search have been proposed to develop robust 3D content encryption schemes. This survey focused on and interested in the schemes that encrypted 3D content using chaotic maps and found some papers [4,[18][19][20][21][22][23] are used chaotic maps in encrypting 3D content, and the remaining other papers [5,16,17] are used encryption schemes without chaotic maps.…”
Section: Introductionmentioning
confidence: 99%
“…Although, like another side of the coin, the 3D model file is holding the possibility of unauthorized access and it has a series of intellectual property issues. Therefore, the 3D model file protection has become a great deal of increasing interesting for information security research [7], [8]. Unlike the traditional text message, the 3D model file can be considered as a special image in the computeraided design software.…”
Section: Introductionmentioning
confidence: 99%
“…It cannot longer meet the encryption requirements. Ref [7], [8], [33], [34] using the chaotic system to encrypted the vertex information of 3D object. But these algorithms have drawbacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation