Nashwan Alsalam Ali; Abdul Monem S Rahma; Shaimaa h. Shaker
Abstract
The widespread of recent multimedia, including various 3D model applications in different domains of areas, may lead to 3D models being stolen and attacked by hackers. Moreover, 3D models must be protected from unauthorized users and when transmitting over the internet. Nowadays the 3D model protection ...
Read More ...
The widespread of recent multimedia, including various 3D model applications in different domains of areas, may lead to 3D models being stolen and attacked by hackers. Moreover, 3D models must be protected from unauthorized users and when transmitting over the internet. Nowadays the 3D model protection is a very important issue. This paper proposed a scheme that provides high protection for the textured 3D model by implementing multiple levels of security. The first level of security is achieved by encrypting the texture map based on a key generated by a 2D Logistic chaotic map. The second level of security is implemented by modifying the vertices values of the 3D mesh based on keys generated by the 3D Lorenz chaotic map. The proposed scheme was implemented on various 3D textured models varying in the number of vertices and faces. The experimental results show that the proposed scheme has a good encryption and provides high security by completely deforms the whole texture and 3D mesh of the textured 3D model into the two levels. The encryption scheme has a large key space 10135 making the scheme resists violent attacks. The Hausdorff Distance (HD) and histogram metrics are adopted to calculate the matching degree between the original and extracted model. The results show that the original and extracted model are identical through the values of HD, which are approximate to zero, and the histogram visually is similar.
Ibrahim Malik ALattar; Abdul Monem S Rahma
Volume 21, Issue 2 , June 2021, , Page 102-114
Abstract
This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle ...
Read More ...
This paper aims to develop a new cryptographic algorithm that isbased on the magic square method of order five with multi message lengths tobe more complex in order to increase the complexity; in addition to comparingthe cipher with the use of the magic square of order five, four and three (allsingle message length. The proposed work has been done by using two extrarounds and depending on round statuse ( even or odd) , messages are detectedto be used. The key is placed in agreed positions, then the remaining positionsare filled with the message, and then certain sums are calculated to representthe encrypted text. Speed, complexity, histogram calculations for images, andNIST calculations for texts were calculated, and the results were compared,where the complexity of the algorithms was as follows ((P)15 × (256)10)2 × (P)11× (256)14 and ((256)15 × (256)10)2 × (256)11 × (256)14 for GF(P) and GF(28)respectively , From that, it has been discovered that the proposed algorithm(Magic Square of order five with multi message length) is better than the rest ofthe algorithms as it has excellent complexity and a slight difference in thespeed.