Skip to main content
Log in

3D textured model encryption via 3D Lu chaotic mapping

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

In the emerging Virtual/Augmented Reality (VR/AR) era, three dimensional (3D) content will be popularized just as images and videos today. The security and privacy of these 3D contents should be taken into consideration. 3D contents contain surface models and solid models. Surface models include point clouds, meshes and textured models. Previous work mainly focused on the encryption of solid models, point clouds and meshes. This work focuses on the most complicated 3D textured model. We propose a 3D Lu chaotic mapping based encryption method for 3D textured models. We encrypt the vertices, polygons, and textures of 3D models separately using the 3D Lu chaotic mapping. Then the encrypted vertices, polygons and textures are composited together to form the final encrypted 3D textured model. The experimental results reveal that our method can encrypt and decrypt 3D textured models correctly. Furthermore, typical statistic and brute-force attacks can be resisted by the proposed method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Rey A M D. A method to encrypt 3D solid objects based on three-dimensional cellular automata. In: Proceedings of the 10th International Conference on Hybrid ArtiLcial Intelligent Systems, Bilbao, 2015. 427–438

    Google Scholar 

  2. Jolfaei A, Wu X W, Muthukkumarasamy V. A 3D object encryption scheme which maintains dimensional and spatial stability. IEEE Trans Inf Foren Secur, 2015, 10: 409–422

    Article  Google Scholar 

  3. Jin X, Wu Z X, Song C G, et al. 3D point cloud encryption through chaotic mapping. In: Proceedings of the 17th Pacific Rim Conference on Multimedia Information Processing, Xi’an, 2016. 119–129

    Google Scholar 

  4. Éluard M, Maetz Y, Doërr G. Geometry-preserving encryption for 3D meshes. In: Proceedings of Compression et Représentation des Signaux Audiovisuels (CORESA), Le Creusot, 2013. 7–12

    Google Scholar 

  5. Jolfaei A, Wu X W, Muthukkumarasamy V. A secure lightweight texture encryption scheme. In: Proceedings of Pacific-Rim Symposium on Image and Video Technology, Auckland, 2015. 344–356

    Google Scholar 

  6. Ying Z B, Li H, Ma J F, et al. Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Sci China Inf Sci, 2016, 59: 042701

    Article  Google Scholar 

  7. Zhang K, Ma J F, Liu J J, et al. Adaptively secure multi-authority attribute-based encryption with veriLable outsourced decryption. Sci China Inf Sci, 2016, 59: 099105

    Article  Google Scholar 

  8. Chen Z, Yin L G, Pei Y K, et al. CodeHop: physical layer error correction and encryption with LDPC-based code hopping. Sci China Inf Sci, 2016, 59: 102309

    Article  Google Scholar 

  9. Cao Z F. New trends of information security — how to change people’s life style? Sci China Inf Sci, 2016, 59: 050106

    Article  Google Scholar 

  10. Yu H B, Hao Y L, Bai D X. Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. Sci China Inf Sci, 2016, 59: 052110

    Article  MathSciNet  Google Scholar 

  11. Verma O P, Nizam M, Ahmad M. Modified multi-chaotic systems that are based on pixel shuoe for image encryption. J Inf Process Syst, 2013, 9: 271–286

    Article  Google Scholar 

  12. Jin H, Dai W Q, Zou D Q. Theory and methodology of research on cloud security. Sci China Inf Sci, 2016, 59: 050105

    Article  Google Scholar 

  13. Li A S, Li X C, Pan Y C, et al. Strategies for network security. Sci China Inf Sci, 2015, 58: 012107

    MATH  Google Scholar 

  14. Li H T, Ma J F, Fu S. A privacy-preserving data collection model for digital community. Sci China Inf Sci, 2015, 58: 032101

    Google Scholar 

  15. Huang X Z, Liu J Q, Han Z, et al. Privacy beyond sensitive values. Sci China Inf Sci, 2015, 58: 072106

    MathSciNet  Google Scholar 

  16. Liu B, Gao F, Huang W, et al. Controlling the key by choosing the detection bits in quantum cryptographic protocols. Sci China Inf Sci, 2015, 58: 112110

    MathSciNet  Google Scholar 

  17. Zhen P, Zhao G, Min L Q, et al. Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tool Appl, 2016, 75: 6303–6319

    Article  Google Scholar 

  18. Liu H J, Wang X Y, Kadir A. Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput, 2012, 12: 1457–1466

    Article  Google Scholar 

  19. Wei X P, Guo L, Zhang Q, et al. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw, 2012, 85: 290–299

    Article  Google Scholar 

  20. Zhang Q, Guo L, Wei X P. Image encryption using DNA addition combining with chaotic maps. Math Comput Model, 2010, 52: 2028–2035

    Article  MATH  MathSciNet  Google Scholar 

  21. Jin X, Tian Y L, Song C G, et al. An invertible and anti-chosen plaintext attack image encryption method based on DNA encoding and chaotic mapping. In: Proceedings of Chinese Automation Congress (CAC), Wuhan, 2015. 1159–1164

    Google Scholar 

  22. Jin X, Chen Y Y, Ge S M, et al. Color image encryption in CIE L*a*b* space. In: Proceedings of the 6th International Conference on Applications and Techniques for Information Security (ATIS), Beijing, 2015. 74–85

    Google Scholar 

  23. Li Y Z, Li X D, Jin X, et al. An image encryption algorithm based on zigzag transformation and 3-dimension chaotic logistic map. In: Proceedings of the 6th International Conference on Applications and Techniques for Information Security (ATIS), Beijing, 2015. 3–12

    Google Scholar 

  24. Jin X, Yin S, Li X D, et al. Color image encryption in YCbCr space. In: Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, Yangzhou, 2016

    Google Scholar 

  25. Bogdanov A, Khovratovich D, Rechberger C. Biclique cryptanalysis of the full AES. In: Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, 2011. 344–371

    Google Scholar 

Download references

Acknowledgements

This work was partially supported by National Natural Science Foundation of China (Grant Nos. 61402021, 61401228, 61640216, 61772047), Science and Technology Project of the State Archives Administrator (Grant No. 2015-B-10), Open Funding Project of State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (Grant No. BUAA-VR-16KF-09), Fundamental Research Funds for the Central Universities (Grant Nos. 2016LG03, 2016LG04), China Postdoctoral Science Foundation (Grant No. 2015M581841), and Postdoctoral Science Foundation of Jiangsu Province (Grant No.1501019A).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiaodong Li or Shiming Ge.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jin, X., Zhu, S., Xiao, C. et al. 3D textured model encryption via 3D Lu chaotic mapping. Sci. China Inf. Sci. 60, 122107 (2017). https://doi.org/10.1007/s11432-017-9266-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-017-9266-1

Keywords

Navigation