New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations
DOI:
https://doi.org/10.26438/ijcse/v6i12.984992Keywords:
Compression, Cryptographic techniques, Generation, 3D, and Polynomial equationsAbstract
Almost every 3D objects can be represented with the help of a set of equations. When 3D objects are converted to text in terms of equations, any standard cryptographic techniques can be applied to encrypt it. This method is useful to hide classified military secrets, as we compress it to a large amount in the form of text, yet it can be regenerated in mathmod software, after decrypting it using the key. In this study, we propose a new way to formulate polynomial equation of any objects in context by fitting it using brute force techniques. We find that the complexity of the algorithm is too high to be achieved in practical scenarios, which encourages more efficient work in this new field.
References
[1] https://www.desmos.com/calculator/ accessed on 14.10.2018.
[2] https://tpenguinltg.wordpress.com/2014/02/15/representing-theheart-shape-precisely/ accessed on 09.10.2018.
[3] M. M. Blane, Z. Lei, and D. B. Cooper, “The 3L Algorithm for Fitting Implicit Polynomial Curves and Surfaces to Data”, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.53.8289 &rep=rep1&type=pdf accessed on 10.10.2018, June 1996. [4] C. Oden, A. Ercil, V. T. Yildiz, H. Kirmizita, and B. Buke, “Hand Recognition Using Implicit Polynomials and Geometric Features” https://pdfs.semanticscholar.org/1432/01f8d05e22882fe01f3f2ac2e 17b14e78a93.pdf accessed on 10.10.2018.
[5] J. C. Quiroz, and S. M. Dascalu, “Design and Implementation of a Procedural Content Generation Web Application for Vertex Shaders”, arXiv: 1608.05231[cs.GR], https://arxiv.org/abs/1608.05231 accessed on 10.10.2018, August 2016.
[6] A. A. Ahmadi, G. Hall, A. Makaida, and V. Sindhwani, “Geometry of 3D Environments and Sum of Squares Polynomials”, arXiv: 1611.07369 [math.OC], https://arxiv.org/abs/1611.07369 accessed on 10.10.2018, November 2016.
[7] S. Hu, and J. Ji, “Using Chebyshev polynomials interpolation to improve the computation efficiency of gravity near an irregularshaped asteroid”, arXiv: 1708.06493 [astro-ph.EP], https://arxiv.org/abs/1708.06493 accessed on 10.10.2018, August 2017.
[8] J. Komorowski, and P. Rokita, “Face Recognition Based on Sequence of Images”, arXiv: 1809.11069 [cs.CV], https://arxiv.org/abs/1809.11069 accessed on 10.10.2018, September 2018.
[9] P. Mandikal, N. K. L, and R. V. Babu, “3D-PSRNet: Part Segment 3D Point Cloud Reconstruction from a Single Image”, arXiv: 1810.00461 [cs.CV], https://arxiv.org/abs/1810.00461v1 accessed on 10.10.2018, September 2018.
[10] Y. L. Qiao, L. Gao, Y. K. Lai, and S. Xia, “Learning Bidirectional LSTM Networks for Synthesizing 3D Mesh Animation Sequences”, arXiv: 1810.02042 [cs.GR], https://arxiv.org/abs/1810.02042 accessed on 10.10.2018, October 2018.
[11] J. C. Carr, R. K. Beaston, J. B. Cherrie, T. J. Mitchell, W. R. Fright,B. C. McCallum, and T. R. Evans, “Reconstruction and Representation of 3D Objects with Radial Bias Functions”, http://www.cs.jhu.edu/~misha/Fall05/Papers/carr01.pdf accessed on 10.10.2018.
[12] H. Gross, U. Thoennessen, and W. V. Hansen, “3D-Modelling of Urban Structures”, Research Institute for Optronics and Pattern Recognition, Stilla U, Rottensteiner F, Hinz S (Eds) CMRT05. IAPRS, Vol. XXXVI, Part 3/W24, http://www.isprs.org/proceedings/XXXVI/3-W24/papers/CMRT05_Gross_et_al.pdf accessed on 10.10.2018, August 2018.
[13] N. Kholgade, T. Simon, A. Efros, and Y. Sheikh, “3D Object Manipulation in a Single Photograph using Stock 3D Models”, https://dl.acm.org/citation.cfm?id=2601209 accessed on 10.10.2018.
[14] https://github.com/parisolab/mathmod accessed on 09.10.2018.
[15] StorageCraft, https://blog.storagecraft.com/5-common-encryptionalgorithms/ 5 Common Encryption Algorithms and the Unbreakables of the Future, Contel Bradford, accessed on 9.10.18.
[16] Diagram of the AES Algorithm (9.16.04), https://www.eng.tau.ac.il/~yash/crypto-netsec/rijndael.htm, colorful crypto rijindial, Christopher Brown, The Advanced Encryption Standard (Rijndael), accessed on 15.10.2018.
[17] http://rijndael.online-domain-tools.com/ -- tool for encryption, accessed on 14.10.2018.
[18] https://bodhis96.wixsite.com/website-3d/ accessed on 09.10.2018
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
