Back to Search Start Over

An improved simple flexible cryptosystem for 3D objects with texture maps and 2D images.

Authors :
Mizher, Manal A.
Sulaiman, Riza
Abdalla, Ayman M.
Mizher, Manar A.
Source :
Journal of Information Security & Applications. Aug2019, Vol. 47, p390-409. 20p.
Publication Year :
2019

Abstract

With the continued evolution of three dimensional (3D) object presentation and usage, the security of such objects has become an increasingly desirable research area. Previous efforts mostly concentrated on the encryption of point clouds, solid models, meshes, and 3D textured models. The (texture map) part of meshed 3D objects was overlooked by previous encryption techniques of 3D meshed objects in spite of its importance because they require preprocessing to be extracted. Therefore, this paper provides a system for the full encryption of 3D textured objects with their texture maps. It provides an improved system based on an existing flexible cryptosystem named Flexible cryptosystem based on Cellular Automata (FcCA). The FcCA system has two drawbacks. One drawback is shuffling plain data without changing their values, which yields the same histogram and nonstandard encryption ratios. The other drawback is the need for many generations to make the keyspace very large, which is unsuitable for the large size of textured object data. This work overcomes these drawbacks of FcCA and fully encrypts 3D textured objects with their texture maps. The improvements to FcCA include making intersect start points change with every generation and encrypting the values of plain data while shuffling them using cellular automata. At first, the plain 3D object is extracted to vertices, faces, and texture, in addition to its texture map. After that, extracted data are encrypted using the proposed improved FcCA (iFcCA) cryptosystem. Implementation and analysis of this new system showed its preponderance as it can encrypt and decrypt 3D textured objects better than FcCA and other existing methods. Moreover, it reduces the need for many generations of cellular automata, and consequently, reduces execution time. In addition, iFcCA has a very robust key, and it can resist different types of attacks. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
22142126
Volume :
47
Database :
Academic Search Index
Journal :
Journal of Information Security & Applications
Publication Type :
Academic Journal
Accession number :
162173383
Full Text :
https://doi.org/10.1016/j.jisa.2019.06.005