Wassim Alexan, H. Younis, Marwa Ibrahim, Sara Alajmy, Mohamed Gabr, Amr Aboshousha
{"title":"通过破坏性旋转对称变换的3D对象加密","authors":"Wassim Alexan, H. Younis, Marwa Ibrahim, Sara Alajmy, Mohamed Gabr, Amr Aboshousha","doi":"10.1109/ICCTA58027.2022.10206305","DOIUrl":null,"url":null,"abstract":"The need to secure 3D objects that are exchanged over unsecured channels is unprecedented. In this paper, we propose a simple 3D object encryption scheme. The scheme is based on a rotational symmetry transformation that disrupts the pixel locations. Each 3D object is first sliced into a number of 2D images, then the disruptive transformation is applied on sets of 3 pixels of each 2D image at a time. The proposed scheme is shown to exhibit good security properties, in terms of visual analysis, statistical analysis (MSE, PSNR and SSIM), as well as robustness to brute force attacks.","PeriodicalId":227797,"journal":{"name":"2022 32nd International Conference on Computer Theory and Applications (ICCTA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"3D Object Encryption Through a Disruptive Rotational Symmetry Transformation\",\"authors\":\"Wassim Alexan, H. Younis, Marwa Ibrahim, Sara Alajmy, Mohamed Gabr, Amr Aboshousha\",\"doi\":\"10.1109/ICCTA58027.2022.10206305\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need to secure 3D objects that are exchanged over unsecured channels is unprecedented. In this paper, we propose a simple 3D object encryption scheme. The scheme is based on a rotational symmetry transformation that disrupts the pixel locations. Each 3D object is first sliced into a number of 2D images, then the disruptive transformation is applied on sets of 3 pixels of each 2D image at a time. The proposed scheme is shown to exhibit good security properties, in terms of visual analysis, statistical analysis (MSE, PSNR and SSIM), as well as robustness to brute force attacks.\",\"PeriodicalId\":227797,\"journal\":{\"name\":\"2022 32nd International Conference on Computer Theory and Applications (ICCTA)\",\"volume\":\"50 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 32nd International Conference on Computer Theory and Applications (ICCTA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCTA58027.2022.10206305\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd International Conference on Computer Theory and Applications (ICCTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTA58027.2022.10206305","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
3D Object Encryption Through a Disruptive Rotational Symmetry Transformation
The need to secure 3D objects that are exchanged over unsecured channels is unprecedented. In this paper, we propose a simple 3D object encryption scheme. The scheme is based on a rotational symmetry transformation that disrupts the pixel locations. Each 3D object is first sliced into a number of 2D images, then the disruptive transformation is applied on sets of 3 pixels of each 2D image at a time. The proposed scheme is shown to exhibit good security properties, in terms of visual analysis, statistical analysis (MSE, PSNR and SSIM), as well as robustness to brute force attacks.