4.7 Article

An asymmetric and optimized encryption method to protect the confidentiality of 3D mesh model

Journal

ADVANCED ENGINEERING INFORMATICS
Volume 42, Issue -, Pages -

Publisher

ELSEVIER SCI LTD
DOI: 10.1016/j.aei.2019.100963

Keywords

Asymmetric encryption; 3D mesh model; Multi-objective optimization; Integrity checking

Funding

  1. National Science Foundation of China [61472289]
  2. National Key Research and Development Project of China [2016YFC0106305]

Ask authors/readers for more resources

3D models are widely used in computer graphics, design and manufacture engineering, art animation and entertainment. With the universal of acquisition equipment and sensors, a huge number of 3D models are generated, which are becoming the major source of engineering data. How to preserve the privacy of the 3D models is a challenge issue. In this paper, an asymmetric and optimized encryption method is presented to protect the 3D mesh models. Firstly, we propose an asymmetric encryption method for 3D mesh models to overcome the drawbacks of traditional symmetric encryption. The primary benefit is that our approach can enhance the security of the key. Secondly, we extend the typically asymmetric encryption algorithm from integer domain to float domain. In our method, we present a normalization function to map the float DC (Discrete Cosine) coefficients to integer domain. Thirdly, considering that the shape error and encryption/decryption computation cost are contradictory in the normalization mapping, we formulate the contradiction as a multi-objective optimization problem. And then, we propose a multi-objective solution to find an optimized mapping range for encryption/decryption efficiently. Furthermore, benefiting from the proposed asymmetric encryption framework, we continue to put forward a method to check the integrity of the encrypted 3D mesh model, in which the digest is encrypted twice to generate digital signature more safely. The proposed method has been tested on 3D mesh models from Stanford university and other sources to demonstrate the effect of the proposed encryption method and optimization mechanism.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available