[1] Lee S H, Kwon K R, Hwang W J, et al.Key-dependent 3D model hashing for authentication using heat kernel signature[J]. Digital Signal Processing(S1051-2004), 2013, 23(5):1505-1522. [2] 赵维, 茅坪, 沈凡宇. 下一代三维图形引擎发展趋势研究[J]. 系统仿真学报, 2017, 29(12): 2935-2944. Zhao Wei, Mao Ping, Shen Fanyu.Research on the Development Trend of Next Generation 3D Graphics Engine[J]. Journal of System Simulation, 2017, 29(12): 2935-2944. [3] Jin X, Zhu S, Xiao C, et al.3D textured model encryption via 3D Lu chaotic mapping[J]. Science China Information Sciences, December.CCF-B, SCIE. 2017, 60(12): 122107. [4] 吴肇星, 金鑫, 宋承根, 等. 基于随机可逆矩阵的3D点云模型加密[J]. 系统仿真学报, 2016, 28(10): 2455-2459. Wu Zhaoxing, Jin Xin, Song Chenggen, et al.Random Reversible Matrix based Point Cloud Encryption[J]. Journal of System Simulation, 2016, 28(10): 2455-2459. [5] Jolfaei A, Wu X W, Muthukkumarasamy V.A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability[J]. IEEE Transactions on Information Forensics & Security(S1556-6013), 2015, 10(2): 409-422. [6] Rey A M D. A Method to Encrypt, \(3\), D Solid Objects Based on Three-Dimensional Cellular Automata[M]// Hybrid Artificial Intelligent Systems. Springer International Publishing, 2015:427-438. [7] Éluard M, Maetz Y, Doërr G.Geometry-preserving Encryption for 3D Meshes[C]//Compression Et Représentation Des Signaux Audiovisuels. 2013. [8] Jolfaei A, Wu X W, Muthukkumarasamy V.A Secure Lightweight Texture Encryption Scheme[M]// Image and Video Technology-PSIVT 2015 Workshops. Springer International Publishing, 2015. [9] Lian S, Sun J, Wang Z.A block cipher based on a suitable use of the chaotic standard map[J]. Chaos Soliton Fract, 2005, 26(1): 117-129. [10] 江东, 孔德善, 刘绪坤, 等. 磁悬浮系统仿真及混沌特性研究[J]. 系统仿真学报, 2017, 29(3): 572-580. Jiang Dong, Kong Deshan, Liu Xukun, et al.Study on maglev system simulation and chaos characteristics[J]. Journal of System Simulation, 2017, 29(3): 572-580. [11] Jin X, Guo K, Song C, et al.Private Video Foreground Extraction Through Chaotic Mapping Based Encryption in the Cloud[C]// International Conference on Multimedia Modeling. Springer, Cham, 2016:562-573. [12] Wang Y, Ren G, Jiang J, et al.Image Encryption Method Based on Chaotic Map[C]// IEEE Conference on Industrial Electronics and Applications. IEEE, 2007:2558-2560. [13] Jiang R, Zhou H, Zhang W, et al.Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models[J]. IEEE Transactions on Multimedia, 2017, (99): 1. [14] Jin X, Tian Y, Song C, et al.An invertible and anti-chosen plaintext attack image encryption method based on DNA encoding and chaotic mapping[C]// Chinese Automation Congress. IEEE, 2016:1159-1164. [15] Li Y, Li X, Jin X, et al.An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map[J]. Applications and Techniques in Information Security, Springer, Berlin, Heidelberg, 2015: 3-13 [16] Jin X, Chen Y, Ge S, et al.Color Image Encryption in CIE L*a*b* Space[C]// International Conference on Applications and Techniques in Information Security. Springer, Berlin, Heidelberg, 2015: 74-85. [17] Rusu R B, Blodow N, Beetz M.Fast point feature histograms (FPFH) for 3D registration[C]// IEEE International Conference on Robotics and Automation. IEEE, 2009:3212-3217. [18] Jin X, Yin S, Li X, et al.Color image encryption in YCbCr space[C]// International Conference on Wireless Communications & Signal Processing. IEEE, 2016: 1-5. |