An asymmetric and optimized encryption method to protect the confidentiality of 3D mesh model

Abstract 3D models are widely used in computer graphics, design and manufacture engineering, art animation and entertainment. With the universal of acquisition equipment and sensors, a huge number of 3D models are generated, which are becoming the major source of engineering data. How to preserve the privacy of the 3D models is a challenge issue. In this paper, an asymmetric and optimized encryption method is presented to protect the 3D mesh models. Firstly, we propose an asymmetric encryption method for 3D mesh models to overcome the drawbacks of traditional symmetric encryption. The primary benefit is that our approach can enhance the security of the key. Secondly, we extend the typically asymmetric encryption algorithm from integer domain to float domain. In our method, we present a normalization function to map the float DC (Discrete Cosine) coefficients to integer domain. Thirdly, considering that the shape error and encryption/decryption computation cost are contradictory in the normalization mapping, we formulate the contradiction as a multi-objective optimization problem. And then, we propose a multi-objective solution to find an optimized mapping range for encryption/decryption efficiently. Furthermore, benefiting from the proposed asymmetric encryption framework, we continue to put forward a method to check the integrity of the encrypted 3D mesh model, in which the digest is encrypted twice to generate digital signature more safely. The proposed method has been tested on 3D mesh models from Stanford university and other sources to demonstrate the effect of the proposed encryption method and optimization mechanism.

[1]  Yiteng Pan,et al.  A novel region-based active contour model via local patch similarity measure for image segmentation , 2018, Multimedia Tools and Applications.

[2]  Yuan Cheng,et al.  Integrating selective undo of feature-based modeling operations for real-time collaborative CAD systems , 2019, Future Gener. Comput. Syst..

[3]  G. Lokeshwari,et al.  A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and Rsa Algorithm , 2015 .

[4]  Xin Jin,et al.  3D Point Cloud Encryption Through Chaotic Mapping , 2016, PCM.

[5]  Michele Germani,et al.  A design for disassembly tool oriented to mechatronic product de-manufacturing and recycling , 2019, Adv. Eng. Informatics.

[6]  Fazhi He,et al.  A survey on partitioning models, solution algorithms and algorithm parallelization for hardware/software co-design , 2019, Des. Autom. Embed. Syst..

[7]  Haibin Zhu,et al.  Maximizing Group Performance While Minimizing Budget , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[8]  Fazhi He,et al.  Customized Encryption of Computer Aided Design Models for Collaboration in Cloud Manufacturing Environment , 2015 .

[9]  Xia Li,et al.  A new hybrid memetic multi-objective optimization algorithm for multi-objective optimization , 2018, Inf. Sci..

[10]  Angelo Corallo,et al.  Cybersecurity for Industry 4.0 in the current literature: A reference framework , 2018, Comput. Ind..

[11]  Fei Peng,et al.  Reversible watermarking for 2D CAD engineering graphics based on improved histogram shifting , 2014, Comput. Aided Des..

[12]  Yi Zhou,et al.  Parallel ant colony optimization on multi-core SIMD CPUs , 2018, Future Gener. Comput. Syst..

[13]  Fazhi He,et al.  IBEA-SVM: An Indicator-based Evolutionary Algorithm Based on Pre-selection with Classification Guided by SVM , 2019, Applied Mathematics-A Journal of Chinese Universities.

[14]  A. Ben Hamza,et al.  Secret sharing approaches for 3D object encryption , 2011, Expert Syst. Appl..

[15]  Jun Peng,et al.  A Novel Digital Image Encryption Algorithm Based on Hyperchaos by Controlling Lorenz System , 2009, 2009 Fifth International Conference on Natural Computation.

[16]  Zhiliang Ma,et al.  A review of 3D reconstruction techniques in civil engineering and their applications , 2018, Adv. Eng. Informatics.

[17]  Chih-Hsing Chu,et al.  3D parametric human face modeling for personalized product design: Eyeglasses frame design case , 2017, Adv. Eng. Informatics.

[18]  Suk-Hwan Lee,et al.  Selective Encryption Algorithm for 3D Printing Model Based on Clustering and DCT Domain , 2017 .

[19]  Ventola Cl Medical Applications for 3D Printing: Current and Projected Uses. , 2014 .

[20]  Manolis I. A. Lourakis,et al.  Automated as-built 3D reconstruction of civil infrastructure using computer vision: Achievements, opportunities, and challenges , 2015, Adv. Eng. Informatics.

[21]  Christine Guillemot,et al.  3D Scene Modeling from Dense Video Light Fields , 2018, 2018 International Conference on 3D Immersion (IC3D).

[22]  Yang Liu,et al.  Secure and robust digital image watermarking scheme using logistic and RSA encryption , 2018, Expert Syst. Appl..

[23]  Yong Zhang,et al.  The unified image encryption algorithm based on chaos and cubic S-Box , 2018, Inf. Sci..

[24]  Milan Curkovic,et al.  3D shape acquisition and integral compact representation using optical scanning and enhanced shape parameterization , 2014, Adv. Eng. Informatics.

[25]  Mikhail J. Atallah,et al.  Security in Cyber-Enabled Design and Manufacturing: A Survey , 2018, J. Comput. Inf. Sci. Eng..

[26]  Kang Li,et al.  Robust Visual Tracking Based on Convolutional Features with Illumination and Occlusion Handing , 2018, Journal of Computer Science and Technology.

[27]  Haibin Zhu,et al.  Avoiding Critical Members in a Team by Redundant Assignment , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[28]  Yiteng Pan,et al.  A novel segmentation model for medical images with intensity inhomogeneity based on adaptive perturbation , 2018, Multimedia Tools and Applications.

[29]  Mikhail J. Atallah,et al.  Strategic information revelation in collaborative design , 2018, Adv. Eng. Informatics.

[30]  Richard H. Stern Napster: A Walking Copyright Infringement? , 2000, IEEE Micro.

[31]  Li Wang,et al.  Rapid Reconstruction of a Three-Dimensional Mesh Model Based on Oblique Images in the Internet of Things , 2018, IEEE Access.

[32]  Jian Yao,et al.  Joint learning of image detail and transmission map for single image dehazing , 2018, The Visual Computer.

[33]  Ming Li,et al.  An ontology-based semantic retrieval approach for heterogeneous 3D CAD models , 2016, Adv. Eng. Informatics.

[34]  Harvey J. Miller,et al.  Big data for healthy cities: Using location-aware technologies, open data and 3D urban models to design healthier built environments , 2016 .

[35]  Shilong Ma,et al.  Remote-sensing image encryption in hybrid domains , 2012 .

[36]  M.E.E. Abashar,et al.  On the chaotic behaviour of forced fluidized bed catalytic reactors , 1995 .

[37]  Xiao Chen,et al.  A matting method based on full feature coverage , 2018, Multimedia Tools and Applications.

[38]  Seung Ki Moon,et al.  Application of 3D printing technology for designing light-weight unmanned aerial vehicle wing structures , 2014, International Journal of Precision Engineering and Manufacturing-Green Technology.

[39]  Constantinos S. Hilas,et al.  3D geospatial visualizations: Animation and motion effects on spatial objects , 2018, Comput. Geosci..

[40]  Yiteng Pan,et al.  A novel Enhanced Collaborative Autoencoder with knowledge distillation for top-N recommender systems , 2019, Neurocomputing.

[41]  X.T. Cai,et al.  An encryption approach for product assembly models , 2017, Adv. Eng. Informatics.

[42]  Yuan Cheng,et al.  An optimized RGA supporting selective undo for collaborative text editing systems , 2019, J. Parallel Distributed Comput..

[43]  Marc Eluard,et al.  Geometry-preserving Encryption for 3D Meshes , 2013 .

[44]  Xin Lu,et al.  Customized Encryption of CAD Models for Cloud-Enabled Collaborative Product Development , 2017 .

[45]  Fazhi He,et al.  A Novel Hardware/Software Partitioning Method Based on Position Disturbed Particle Swarm Optimization with Invasive Weed Optimization , 2017, Journal of Computer Science and Technology.

[46]  Yanru Zhong,et al.  Selecting a semantic similarity measure for concepts in two different CAD model data ontologies , 2016, Adv. Eng. Informatics.

[47]  Baochang Zhang,et al.  A 3D Reconstruction System for Large Scene Based on RGB-D Image , 2018, IScIDE.

[48]  JungHyun Han,et al.  Role-based viewing envelopes for information protection in collaborative modeling , 2004, Comput. Aided Des..

[49]  Hamid Bessalah,et al.  RSA based encryption decryption of medical images , 2010, 2010 7th International Multi- Conference on Systems, Signals and Devices.

[50]  Hyunseung Choo,et al.  Multi-Level modeling and access control for data sharing in collaborative design , 2006, Adv. Eng. Informatics.

[51]  Hirokazu Kato,et al.  Augmented Reality versus Virtual Reality for 3D Object Manipulation , 2018, IEEE Transactions on Visualization and Computer Graphics.

[52]  Soonhung Han,et al.  An efficient approach to directly compute the exact Hausdorff distance for 3D point sets , 2017, Integr. Comput. Aided Eng..

[53]  Qing Zhang,et al.  Video Background Completion Using Motion-Guided Pixel Assignment Optimization , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[54]  Yuan Cheng,et al.  Supporting selective undo of string-wise operations for collaborative editing systems , 2018, Future Gener. Comput. Syst..

[55]  Dengguo Feng,et al.  Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD , 2004, IACR Cryptol. ePrint Arch..

[56]  Ali Khaloo,et al.  Robust normal estimation and region growing segmentation of infrastructure 3D point cloud models , 2017, Adv. Eng. Informatics.

[57]  Fazhi He,et al.  A correlative classifiers approach based on particle filter and sample set for tracking occluded target , 2017 .

[58]  Wen Feng Lu,et al.  A 3D simplification algorithm for distributed visualization , 2007, Comput. Ind..

[59]  Dazhong Wu,et al.  Cloud-based design and manufacturing: A new paradigm in digital manufacturing and design innovation , 2015, Comput. Aided Des..

[60]  Fazhi He,et al.  An efficient and robust bat algorithm with fusion of opposition-based learning and whale optimization algorithm , 2020, Intell. Data Anal..

[61]  Lukumon O. Oyedele,et al.  Big Data in the construction industry: A review of present status, opportunities, and future trends , 2016, Adv. Eng. Informatics.

[62]  Fazhi He,et al.  Service-Oriented Feature-Based Data Exchange for Cloud-Based Design and Manufacturing , 2018, IEEE Transactions on Services Computing.

[63]  Abdellah Ezzati,et al.  Speedy Cloud-RSA homomorphic scheme for preserving data confidentiality in cloud computing , 2019, J. Ambient Intell. Humaniz. Comput..

[64]  Xiao Chen,et al.  A parallel and robust object tracking approach synthesizing adaptive Bayesian learning and improved incremental subspace learning , 2019, Frontiers of Computer Science.