Wassim Alexan, H. Younis, Marwa Ibrahim, Sara Alajmy, Mohamed Gabr, Amr Aboshousha
{"title":"3D Object Encryption Through a Disruptive Rotational Symmetry Transformation","authors":"Wassim Alexan, H. Younis, Marwa Ibrahim, Sara Alajmy, Mohamed Gabr, Amr Aboshousha","doi":"10.1109/ICCTA58027.2022.10206305","DOIUrl":null,"url":null,"abstract":"The need to secure 3D objects that are exchanged over unsecured channels is unprecedented. In this paper, we propose a simple 3D object encryption scheme. The scheme is based on a rotational symmetry transformation that disrupts the pixel locations. Each 3D object is first sliced into a number of 2D images, then the disruptive transformation is applied on sets of 3 pixels of each 2D image at a time. The proposed scheme is shown to exhibit good security properties, in terms of visual analysis, statistical analysis (MSE, PSNR and SSIM), as well as robustness to brute force attacks.","PeriodicalId":227797,"journal":{"name":"2022 32nd International Conference on Computer Theory and Applications (ICCTA)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 32nd International Conference on Computer Theory and Applications (ICCTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTA58027.2022.10206305","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The need to secure 3D objects that are exchanged over unsecured channels is unprecedented. In this paper, we propose a simple 3D object encryption scheme. The scheme is based on a rotational symmetry transformation that disrupts the pixel locations. Each 3D object is first sliced into a number of 2D images, then the disruptive transformation is applied on sets of 3 pixels of each 2D image at a time. The proposed scheme is shown to exhibit good security properties, in terms of visual analysis, statistical analysis (MSE, PSNR and SSIM), as well as robustness to brute force attacks.