Abstract
With the development of multimedia applications, the application of 3D models becomes more and more popular, and its security has become an urgent problem to be solved. 3D objects have more complex spatial structures than 1D and 2D objects. Most of the previous work is to encrypt 3D objects directly, and this kind of algorithm is often tedious and the encryption time is long. Therefore, a new fast image encryption scheme based on chaos theory is proposed in this paper. In this scheme, the 3D object is transformed into 2D object (similar to image format), and then encrypted. The encryption process is divided into two stages: confusion stage and diffusion stage. In the confusion phase, we introduce random points. In the diffusion phase, we split the floating-point data, the integer part is encrypted by XOR, and the decimal part is scrambled only. The experimental results show that the scheme can encrypt and decrypt the 3D model correctly. The numerical results in security analysis are close to the ideal value, which shows that the scheme can resist common attacks and has high security.
Similar content being viewed by others
References
Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688
Altaf M, Ahmad A, Khan FA et al (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimed Tools Appl 77:27981–27995
Babaei M (2013) A novel text and image encryption method based on chaos theory and DNA computing. Nat Comput 12(1):101–107
Berman B (2012) 3-D printing: The new industrial revolution. Business Horizons 55(2):155–162
Brown AC, de Beer D (2013) Development of a stereolithography (STL) slicing and G-code generation algorithm for an entry level 3-D printer. Africon Institute of Electrical and Electronics Engineers 2013:1–5
Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213
Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761
Chen DY, Tian XP, Shen YT et al (2003) On visual similarity based 3D model retrieval. Computer Graphics Forum 22(3):223–232
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(06):1259–1284
Gao Y, Dai Q, Zhang NY (2010) 3D model comparison using spatial structure circular descriptor. Pattern Recogn 43(3):1142–1151
Gupta B, Agrawal DP, Wang H et al (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press, Boca Raton
Gupta B, Agrawal DP, Yamaguchi S et al (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey
Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. International Journal of Cloud Applications and Computing 7(2):27–40
Jin X, Zhu S, Xiao C et al (2017) 3D textured model encryption via 3D Lu chaotic mapping. SCIENCE CHINA Inf Sci 60(12):122107
Jolfaei A, Wu XW, Muthukkumarasamy V (2014) A 3D object encryption scheme which maintains dimensional and spatial stability. Institute of Electrical and Electronics Engineers Transactions on Information Forensics and Security 10(2):409–422
Kaminsky W, Snyder T, Stone-Sundberg J et al (2014) One-click preparation of 3D print files (*. stl,*. wrl) from*. cif (crystallographic information framework) data using Cif2VRML. Powder Diffract 29(S2):S42–S47
Kaneko K (1989) Pattern dynamics in spatiotemporal chaos. Physica D 34(1-2):1–41
Kusaka M, Sugimoto M, Fukami N et al (2015) Initial experience with a tailor-made simulation and navigation program using a 3-D printer model of kidney transplantation surgery. Transplant Proc 47(3):596–599
Li X, Zhou C, Xu N (2018) A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos. International Journal Network Security 20(1):110–120
Liu AA, Nie WZ, Gao Y et al (2018) View-based 3-d model retrieval: a benchmark. Institute of Electrical and Electronics Engineers Transactions on Cybernetics 48(3):916–928
Matthews R (1984) On the derivation of a “Chaotic” encryption algorithm. Cryptologia 8(1):29–41
May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467
Parvees MYM, Samath JA, Bose BP (2018) Audio encryption-a chaos-based data byte scrambling technique. Int J Appl Syst Stud 8(1):51–75
Preishuber M, Hütter T, Katzenbeisser S et al (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. Institute of Electrical and Electronics Engineers Transactions on Information Forensics and Security 13(9):2137–2150
Rey AM (2015) A Method to encrypt 3D solid objects based on three-dimensional cellular automata. International Conference on Hybrid Artificial Intelligence Systems. Springer, Cham, pp. 427-438
Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as PRBG for voice encryption in wireless communication. Procedia Computer Science 65:314–323
Saraf KR, Jagtap VP, Mishra AK (2014) Text and image encryption decryption using advanced encryption standard. International Journal of Emerging Trends & Technology in Computer Science 3(3):118–126
Tang J, Zhang F (2017) A new code-based encryption scheme and its applications. International Journal of High Performance Computing and Networking 10(6):515–523
Ventola CL (2014) Medical applications for 3D printing: current and projected uses. Pharmacy and Therapeutics 39(10):704–711
Wang XY, Feng L, Wang SB et al (2018) Spatiotemporal chaos in coupled logistic map lattice with dynamic coupling coefficient and its application in image encryption. IEEE Access 6:39705–39724
Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358
Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36
Wang XY, Li P, Zhang YQ et al (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77(5):6243–6265
Wang XY, Liu CM (2017) A novel and effective image encryption algorithm based on Chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Wang J, Wang C (2018) Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. International Journal of High Performance Computing and Networking 12(2):111–117
Wang C, Wang X, Xia Z et al (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109–120
Wang X, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics 83(1-2):333–346
Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61
Xu SJ, Wang JZ, Yang SX (2008) An improved image encryption algorithm based on chaotic maps. Chinese Physics B 17(11):4027
Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Zhang J, Gao H (2019) A compact construction for non-monotonic key-policy attribute-based encryption. International Journal of High Performance Computing and Networking 13(3):321–330
Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351
Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dynamics 77(3):687–698
Zhang H, Wang XY, Wang SW et al (2017) Application of coupled map lattice with parameter q in image encryption. Opt Lasers Eng 88:65–74
Acknowledgements
This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019JH2/10300057). The authors declare that they have no conflict of interest.
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Wang, X., Xu, M. & Li, Y. Fast encryption scheme for 3D models based on chaos system. Multimed Tools Appl 78, 33865–33884 (2019). https://doi.org/10.1007/s11042-019-08171-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08171-2