logo

SCIENCE CHINA Information Sciences, Volume 60 , Issue 12 : 122107(2017) https://doi.org/10.1007/s11432-017-9266-1

3D textured model encryption via 3D Lu chaotic mapping

More info
  • ReceivedSep 7, 2017
  • AcceptedSep 26, 2017
  • PublishedNov 9, 2017

Abstract


Acknowledgment

This work was partially supported by National Natural Science Foundation of China (Grant Nos. 61402021, 61401228, 61640216, 61772047), Science and Technology Project of the State Archives Administrator (Grant No. 2015-B-10), Open Funding Project of State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (Grant No. BUAA-VR-16KF-09), Fundamental Research Funds for the Central Universities (Grant Nos. 2016LG03, 2016LG04), China Postdoctoral Science Foundation (Grant No. 2015M581841), and Postdoctoral Science Foundation of Jiangsu Province (Grant No.1501019A).


References

[1] Rey A M D. A method to encrypt 3D solid objects based on three-dimensional cellular automata. In: Proceedings of the 10th International Conference on Hybrid ArtiLcial Intelligent Systems, Bilbao, 2015. 427--438. Google Scholar

[2] Jolfaei A, Xin-Wen Wu A, Muthukkumarasamy V. A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability. IEEE TransInformForensic Secur, 2015, 10: 409-422 CrossRef Google Scholar

[3] Jin X, Wu Z X, Song C G, et al. 3D point cloud encryption through chaotic mapping. In: Proceedings of the 17th Pacific Rim Conference on Multimedia Information Processing, Xian, 2016. 119--129. Google Scholar

[4] Eluard M, Maetz Y, Doerr G. Geometry-preserving encryption for 3D meshes. In: Proceedings of Compression et Representation des Signaux Audiovisuels (CORESA), Le Creusot, 2013. 7--12. Google Scholar

[5] Jolfaei A, Wu X W, Muthukkumarasamy V. A secure lightweight texture encryption scheme. In: Proceedings of Pacific-Rim Symposium on Image and Video Technology, Auckland, 2015. 344--356. Google Scholar

[6] Ying Z, Li H, Ma J. Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Sci China Inf Sci, 2016, 59: 042701 CrossRef Google Scholar

[7] Zhang K, Ma J, Liu J. Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Sci China Inf Sci, 2016, 59: 099105 CrossRef Google Scholar

[8] Chen Z, Yin L, Pei Y. CodeHop: physical layer error correction and encryption with LDPC-based code hopping. Sci China Inf Sci, 2016, 59: 102309 CrossRef Google Scholar

[9] Cao Z F. New trends of information security — how to change peoples life style? Sci China Inf Sci, 2016, 59: 050106. Google Scholar

[10] Yu H, Hao Y, Bai D. Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. Sci China Inf Sci, 2016, 59: 052110 CrossRef Google Scholar

[11] Verma O P, Nizam M, Ahmad M. Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption. J Inf Processing Syst, 2013, 9: 271-286 CrossRef Google Scholar

[12] Jin H, Dai W, Zou D. Theory and methodology of research on cloud security. Sci China Inf Sci, 2016, 59: 050105 CrossRef Google Scholar

[13] Li A S, Li X C, Pan Y C, et al. Strategies for network security. Sci China Inf Sci, 2015, 58: 012107. Google Scholar

[14] Li H T, Ma J F, Fu S. A privacy-preserving data collection model for digital community. Sci China Inf Sci, 2015, 58: 032101. Google Scholar

[15] Huang X Z, Liu J Q, Han Z, et al. Privacy beyond sensitive values. Sci China Inf Sci, 2015, 58: 072106. Google Scholar

[16] Liu B, Gao F, Huang W, et al. Controlling the key by choosing the detection bits in quantum cryptographic protocols. Sci China Inf Sci, 2015, 58: 112110. Google Scholar

[17] Zhen P, Zhao G, Min L. Chaos-based image encryption scheme combining DNA coding and entropy. Multimed Tools Appl, 2016, 75: 6303-6319 CrossRef Google Scholar

[18] Liu H, Wang X, kadir A. Image encryption using DNA complementary rule and chaotic maps. Appl Soft Computing, 2012, 12: 1457-1466 CrossRef Google Scholar

[19] Wei X, Guo L, Zhang Q. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Software, 2012, 85: 290-299 CrossRef Google Scholar

[20] Zhang Q, Guo L, Wei X. Image encryption using DNA addition combining with chaotic maps. Math Comp Model, 2010, 52: 2028-2035 CrossRef Google Scholar

[21] Jin X, Tian Y L, Song C G, et al. An invertible and anti-chosen plaintext attack image encryption method based on DNA encoding and chaotic mapping. In: Proceedings of Chinese Automation Congress (CAC), Wuhan, 2015. 1159--1164. Google Scholar

[22] Jin X, Chen Y Y, Ge S M, et al. Color image encryption in CIE L*a*b* space. In: Proceedings of the 6th International Conference on Applications and Techniques for Information Security (ATIS), Beijing, 2015. 74--85. Google Scholar

[23] Li Y Z, Li X D, Jin X, et al. An image encryption algorithm based on zigzag transformation and 3-dimension chaotic logistic map. In: Proceedings of the 6th International Conference on Applications and Techniques for Information Security (ATIS), Beijing, 2015. 3--12. Google Scholar

[24] Jin X, Yin S, Li X D, et al. Color image encryption in YCbCr space. In: Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, Yangzhou, 2016. Google Scholar

[25] Bogdanov A, Khovratovich D, Rechberger C. Biclique cryptanalysis of the full AES. In: Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, 2011. 344--371. Google Scholar

  • Figure 1

    (Color online) A full 3D surface model containing vertices, polygons and textures.

  • Figure 2

    (Color online) Proposed method for 3D textured model encryption.

  • Figure 3

    (Color online) Simulation results. We test our method on 3D models with various contents.

  • Figure 4

    (Color online) Decryption with slightly changed keys. The dog and cat examples are shown. We only show the changed keys. The full original keys are shown in Table 1.

  • Figure 5

    (Color online) Decryption with slightly changed keys. The phone, toy and clock examples are shown. We only show changed keys. The full original keys are shown in Table 1. Note that, in this figure, for each example, we slightly change the original keys twice to show the key-sensitivity of our method. For each example, the decrypted results of both times are completely different from the correctly decrypted results.

  • Figure 6

    (Color online) VFH of 3D textured models before and after encryption.

  • Figure 7

    (Color online) Distribution of occupied positions per $z$-coordinate of the 3D textured models before and after encryption.

  • Figure 8

    (Color online) Encryption and decryption time costs of the proposed method for 3D model encryption against the number of vertices.

  • Table 1   The secret keys of the 3D Lu maps in (), where $a=36$, $b=3$, and $c=20$
    Encryption phase Keys
    Vertices encryption $x_0^{v}=-6.045$, $y_0^{v}=2.668$, $z_0^{v}=16.363$
    Polygons encryption $x_0^{p}=-5.045$, $y_0^{p}=2.668$, $z_0^{p}=16.363$
    Texture encryption $x_0^{t1}=-6.045$, $y_0^{t1}=2.668$, $z_0^{t1}=20.363$, $x_0^{t2}=-5.045$, $y_0^{t2}=3.668$, $z_0^{t2}=16.363$