Skip to main content
Log in

Fast encryption scheme for 3D models based on chaos system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

With the development of multimedia applications, the application of 3D models becomes more and more popular, and its security has become an urgent problem to be solved. 3D objects have more complex spatial structures than 1D and 2D objects. Most of the previous work is to encrypt 3D objects directly, and this kind of algorithm is often tedious and the encryption time is long. Therefore, a new fast image encryption scheme based on chaos theory is proposed in this paper. In this scheme, the 3D object is transformed into 2D object (similar to image format), and then encrypted. The encryption process is divided into two stages: confusion stage and diffusion stage. In the confusion phase, we introduce random points. In the diffusion phase, we split the floating-point data, the integer part is encrypted by XOR, and the decimal part is scrambled only. The experimental results show that the scheme can encrypt and decrypt the 3D model correctly. The numerical results in security analysis are close to the ideal value, which shows that the scheme can resist common attacks and has high security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688

    Article  Google Scholar 

  2. Altaf M, Ahmad A, Khan FA et al (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimed Tools Appl 77:27981–27995

    Article  Google Scholar 

  3. Babaei M (2013) A novel text and image encryption method based on chaos theory and DNA computing. Nat Comput 12(1):101–107

    Article  MathSciNet  MATH  Google Scholar 

  4. Berman B (2012) 3-D printing: The new industrial revolution. Business Horizons 55(2):155–162

    Article  Google Scholar 

  5. Brown AC, de Beer D (2013) Development of a stereolithography (STL) slicing and G-code generation algorithm for an entry level 3-D printer. Africon Institute of Electrical and Electronics Engineers 2013:1–5

    Google Scholar 

  6. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  7. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen DY, Tian XP, Shen YT et al (2003) On visual similarity based 3D model retrieval. Computer Graphics Forum 22(3):223–232

    Article  Google Scholar 

  9. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(06):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  10. Gao Y, Dai Q, Zhang NY (2010) 3D model comparison using spatial structure circular descriptor. Pattern Recogn 43(3):1142–1151

    Article  MATH  Google Scholar 

  11. Gupta B, Agrawal DP, Wang H et al (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press, Boca Raton

    Google Scholar 

  12. Gupta B, Agrawal DP, Yamaguchi S et al (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey

    Book  Google Scholar 

  13. Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. International Journal of Cloud Applications and Computing 7(2):27–40

    Article  Google Scholar 

  14. Jin X, Zhu S, Xiao C et al (2017) 3D textured model encryption via 3D Lu chaotic mapping. SCIENCE CHINA Inf Sci 60(12):122107

    Article  Google Scholar 

  15. Jolfaei A, Wu XW, Muthukkumarasamy V (2014) A 3D object encryption scheme which maintains dimensional and spatial stability. Institute of Electrical and Electronics Engineers Transactions on Information Forensics and Security 10(2):409–422

    Google Scholar 

  16. Kaminsky W, Snyder T, Stone-Sundberg J et al (2014) One-click preparation of 3D print files (*. stl,*. wrl) from*. cif (crystallographic information framework) data using Cif2VRML. Powder Diffract 29(S2):S42–S47

    Article  Google Scholar 

  17. Kaneko K (1989) Pattern dynamics in spatiotemporal chaos. Physica D 34(1-2):1–41

    Article  MathSciNet  MATH  Google Scholar 

  18. Kusaka M, Sugimoto M, Fukami N et al (2015) Initial experience with a tailor-made simulation and navigation program using a 3-D printer model of kidney transplantation surgery. Transplant Proc 47(3):596–599

    Article  Google Scholar 

  19. Li X, Zhou C, Xu N (2018) A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos. International Journal Network Security 20(1):110–120

    Google Scholar 

  20. Liu AA, Nie WZ, Gao Y et al (2018) View-based 3-d model retrieval: a benchmark. Institute of Electrical and Electronics Engineers Transactions on Cybernetics 48(3):916–928

    Google Scholar 

  21. Matthews R (1984) On the derivation of a “Chaotic” encryption algorithm. Cryptologia 8(1):29–41

    Article  MathSciNet  Google Scholar 

  22. May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467

    Article  MATH  Google Scholar 

  23. Parvees MYM, Samath JA, Bose BP (2018) Audio encryption-a chaos-based data byte scrambling technique. Int J Appl Syst Stud 8(1):51–75

    Article  Google Scholar 

  24. Preishuber M, Hütter T, Katzenbeisser S et al (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. Institute of Electrical and Electronics Engineers Transactions on Information Forensics and Security 13(9):2137–2150

    Google Scholar 

  25. Rey AM (2015) A Method to encrypt 3D solid objects based on three-dimensional cellular automata. International Conference on Hybrid Artificial Intelligence Systems. Springer, Cham, pp. 427-438

  26. Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as PRBG for voice encryption in wireless communication. Procedia Computer Science 65:314–323

    Article  Google Scholar 

  27. Saraf KR, Jagtap VP, Mishra AK (2014) Text and image encryption decryption using advanced encryption standard. International Journal of Emerging Trends & Technology in Computer Science 3(3):118–126

    Google Scholar 

  28. Tang J, Zhang F (2017) A new code-based encryption scheme and its applications. International Journal of High Performance Computing and Networking 10(6):515–523

    Article  Google Scholar 

  29. Ventola CL (2014) Medical applications for 3D printing: current and projected uses. Pharmacy and Therapeutics 39(10):704–711

    Google Scholar 

  30. Wang XY, Feng L, Wang SB et al (2018) Spatiotemporal chaos in coupled logistic map lattice with dynamic coupling coefficient and its application in image encryption. IEEE Access 6:39705–39724

    Article  Google Scholar 

  31. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  Google Scholar 

  32. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    Article  MathSciNet  Google Scholar 

  33. Wang XY, Li P, Zhang YQ et al (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77(5):6243–6265

    Article  Google Scholar 

  34. Wang XY, Liu CM (2017) A novel and effective image encryption algorithm based on Chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245

    Article  Google Scholar 

  35. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  36. Wang J, Wang C (2018) Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. International Journal of High Performance Computing and Networking 12(2):111–117

    Article  Google Scholar 

  37. Wang C, Wang X, Xia Z et al (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109–120

    Article  Google Scholar 

  38. Wang X, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics 83(1-2):333–346

    Article  MathSciNet  Google Scholar 

  39. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  40. Xu SJ, Wang JZ, Yang SX (2008) An improved image encryption algorithm based on chaotic maps. Chinese Physics B 17(11):4027

    Article  Google Scholar 

  41. Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Article  Google Scholar 

  42. Zhang J, Gao H (2019) A compact construction for non-monotonic key-policy attribute-based encryption. International Journal of High Performance Computing and Networking 13(3):321–330

    Article  Google Scholar 

  43. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  44. Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dynamics 77(3):687–698

    Article  Google Scholar 

  45. Zhang H, Wang XY, Wang SW et al (2017) Application of coupled map lattice with parameter q in image encryption. Opt Lasers Eng 88:65–74

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019JH2/10300057). The authors declare that they have no conflict of interest.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xingyuan Wang or Mingxiao Xu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Xu, M. & Li, Y. Fast encryption scheme for 3D models based on chaos system. Multimed Tools Appl 78, 33865–33884 (2019). https://doi.org/10.1007/s11042-019-08171-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08171-2

Keywords

Navigation