Open Access   Article Go Back

New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations

Jimut Bahan Pal1 , Asoke Nath2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 984-992, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.984992

Online published on Dec 31, 2018

Copyright © Jimut Bahan Pal, Asoke Nath . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jimut Bahan Pal, Asoke Nath, “New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.984-992, 2018.

MLA Style Citation: Jimut Bahan Pal, Asoke Nath "New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations." International Journal of Computer Sciences and Engineering 6.12 (2018): 984-992.

APA Style Citation: Jimut Bahan Pal, Asoke Nath, (2018). New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations. International Journal of Computer Sciences and Engineering, 6(12), 984-992.

BibTex Style Citation:
@article{Pal_2018,
author = {Jimut Bahan Pal, Asoke Nath},
title = {New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {984-992},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3453},
doi = {https://doi.org/10.26438/ijcse/v6i12.984992}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.984992}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3453
TI - New approach to Generate, Re-Generate, Encode, and Compress 3D structures using polynomial equations
T2 - International Journal of Computer Sciences and Engineering
AU - Jimut Bahan Pal, Asoke Nath
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 984-992
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
721 410 downloads 163 downloads
  
  
           

Abstract

Almost every 3D objects can be represented with the help of a set of equations. When 3D objects are converted to text in terms of equations, any standard cryptographic techniques can be applied to encrypt it. This method is useful to hide classified military secrets, as we compress it to a large amount in the form of text, yet it can be regenerated in mathmod software, after decrypting it using the key. In this study, we propose a new way to formulate polynomial equation of any objects in context by fitting it using brute force techniques. We find that the complexity of the algorithm is too high to be achieved in practical scenarios, which encourages more efficient work in this new field.

Key-Words / Index Term

Compression, Cryptographic techniques, Generation, 3D, and Polynomial equations

References

[1]. https://www.desmos.com/calculator/ accessed on 14.10.2018.
[2]. https://tpenguinltg.wordpress.com/2014/02/15/representing-the-heart-shape-precisely/ accessed on 09.10.2018.
[3]. M. M. Blane, Z. Lei, and D. B. Cooper, “The 3L Algorithm for Fitting Implicit Polynomial Curves and Surfaces to Data”, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.53.8289&rep=rep1&type=pdf accessed on 10.10.2018, June 1996.
[4]. C. Oden, A. Ercil, V. T. Yildiz, H. Kirmizita, and B. Buke, “Hand Recognition Using Implicit Polynomials and Geometric Features” https://pdfs.semanticscholar.org/1432/01f8d05e22882fe01f3f2ac2e17b14e78a93.pdf accessed on 10.10.2018.
[5]. J. C. Quiroz, and S. M. Dascalu, “Design and Implementation of a Procedural Content Generation Web Application for Vertex Shaders”, arXiv: 1608.05231[cs.GR], https://arxiv.org/abs/1608.05231 accessed on 10.10.2018, August 2016.
[6]. A. A. Ahmadi, G. Hall, A. Makaida, and V. Sindhwani, “Geometry of 3D Environments and Sum of Squares Polynomials”, arXiv: 1611.07369 [math.OC], https://arxiv.org/abs/1611.07369 accessed on 10.10.2018, November 2016.
[7]. S. Hu, and J. Ji, “Using Chebyshev polynomials interpolation to improve the computation efficiency of gravity near an irregular-shaped asteroid”, arXiv: 1708.06493 [astro-ph.EP], https://arxiv.org/abs/1708.06493 accessed on 10.10.2018, August 2017.
[8]. J. Komorowski, and P. Rokita, “Face Recognition Based on Sequence of Images”, arXiv: 1809.11069 [cs.CV], https://arxiv.org/abs/1809.11069 accessed on 10.10.2018, September 2018.
[9]. P. Mandikal, N. K. L, and R. V. Babu, “3D-PSRNet: Part Segment 3D Point Cloud Reconstruction from a Single Image”, arXiv: 1810.00461 [cs.CV],
https://arxiv.org/abs/1810.00461v1 accessed on 10.10.2018, September 2018.
[10]. Y. L. Qiao, L. Gao, Y. K. Lai, and S. Xia, “Learning Bidirectional LSTM Networks for Synthesizing 3D Mesh Animation Sequences”, arXiv: 1810.02042 [cs.GR], https://arxiv.org/abs/1810.02042 accessed on 10.10.2018, October 2018.
[11]. J. C. Carr, R. K. Beaston, J. B. Cherrie, T. J. Mitchell, W. R. Fright, B. C. McCallum, and T. R. Evans, “Reconstruction and Representation of 3D Objects with Radial Bias Functions”, http://www.cs.jhu.edu/~misha/Fall05/Papers/carr01.pdf accessed on 10.10.2018.
[12]. H. Gross, U. Thoennessen, and W. V. Hansen, “3D-Modelling of Urban Structures”, Research Institute for Optronics and Pattern Recognition, Stilla U, Rottensteiner F, Hinz S (Eds) CMRT05. IAPRS, Vol. XXXVI, Part 3/W24,
http://www.isprs.org/proceedings/XXXVI/3-W24/papers/CMRT05_Gross_et_al.pdf accessed on 10.10.2018, August 2018.
[13]. N. Kholgade, T. Simon, A. Efros, and Y. Sheikh, “3D Object Manipulation in a Single Photograph using Stock 3D Models”, https://dl.acm.org/citation.cfm?id=2601209 accessed on 10.10.2018.
[14]. https://github.com/parisolab/mathmod accessed on 09.10.2018.
[15]. StorageCraft, https://blog.storagecraft.com/5-common-encryption-algorithms/ 5 Common Encryption Algorithms and the Unbreakables of the Future, Contel Bradford, accessed on 9.10.18.
[16]. Diagram of the AES Algorithm (9.16.04), https://www.eng.tau.ac.il/~yash/crypto-netsec/rijndael.htm, colorful crypto rijindial, Christopher Brown, The Advanced Encryption Standard (Rijndael), accessed on 15.10.2018.
[17]. http://rijndael.online-domain-tools.com/ -- tool for encryption, accessed on 14.10.2018.
[18]. https://bodhis96.wixsite.com/website-3d/ accessed on 09.10.2018.