A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability

Due to widespread applications of 3D vision technology, the research into 3D object protection is primarily important. To maintain confidentiality, encryption of 3D objects is essential. However, the requirements and limitations imposed by 3D objects indicate the impropriety of conventional cryptosystems for 3D object encryption. This suggests the necessity of designing new ciphers. In addition, the study of prior works indicates that the majority of problems encountered with encrypting 3D objects are about point cloud protection, dimensional and spatial stability, and robustness against surface reconstruction attacks. To address these problems, this paper proposes a 3D object encryption scheme, based on a series of random permutations and rotations, which deform the geometry of the point cloud. Since the inverse of a permutation and a rotation matrix is its transpose, the decryption implementation is very efficient. Our statistical analyses show that within the cipher point cloud, points are randomly distributed. Furthermore, the proposed cipher leaks no information regarding the geometric structure of the plain point cloud, and is also highly sensitive to the changes of the plaintext and secret key. The theoretical and experimental analyses demonstrate the security, effectiveness, and robustness of the proposed cipher against surface reconstruction attacks.

[1]  Jean-Denis Durou,et al.  Numerical methods for shape-from-shading: A new survey with benchmarks , 2008, Comput. Vis. Image Underst..

[2]  Hsien-Hsin S. Lee,et al.  A digital rights enabled graphics processing system , 2006, GH '06.

[3]  Guanrong Chen,et al.  Chaos-Based Encryption for Digital Images and Videos , 2004 .

[4]  Yang Jie Geodesic Distance for Support Vector Machines , 2005 .

[5]  Gloria Haro Shape from Silhouette Consensus , 2012, Pattern Recognit..

[6]  Alexander M. Bronstein,et al.  Numerical Geometry of Non-Rigid Shapes , 2009, Monographs in Computer Science.

[7]  Richard P. Brent,et al.  Modern Computer Arithmetic , 2010 .

[8]  Ralph Howard,et al.  Data encryption standard , 1987 .

[9]  D. Eastlake,et al.  XML Encryption Syntax and Processing , 2003 .

[10]  José García Rodríguez,et al.  Geometric 3D point cloud compression , 2014, Pattern Recognit. Lett..

[11]  Xin-She Yang,et al.  Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.

[12]  Concha Bielza,et al.  Three-Dimensional Spatial Distribution of Synapses in the Neocortex: A Dual-Beam Electron Microscopy Study , 2013, Cerebral cortex.

[13]  Atilla Baskurt,et al.  A Comprehensive Survey on Three-Dimensional Mesh Watermarking , 2008, IEEE Transactions on Multimedia.

[14]  Peter J. Diggle,et al.  Statistical Analysis of Spatial and Spatio-Temporal Point Patterns , 2013 .

[15]  Hong Heather Yu,et al.  Multimedia Encryption , 2006, Encyclopedia of Multimedia.

[16]  Andrey Bogdanov,et al.  Analysis and design of block cipher constructions , 2010 .

[17]  A. Ardeshir Goshtasby,et al.  A Curvature-Adaptive Implicit Surface Reconstruction for Irregularly Spaced Points , 2012, IEEE Transactions on Visualization and Computer Graphics.

[18]  Marc Eluard,et al.  Geometry-preserving Encryption for 3D Meshes , 2013 .

[19]  Michael R. Frey,et al.  An Introduction to Stochastic Modeling (2nd Ed.) , 1994 .

[20]  Shipeng Li,et al.  Encryption and authentication for scalable multimedia: current state of the art and challenges , 2004, SPIE Optics East.

[21]  Liu Nian-sheng,et al.  Pseudo-randomness and complexity of binary sequences generated by the chaotic system , 2011 .

[22]  Jean-Michel Muller,et al.  Modern Computer Arithmetic , 2016, Computer.

[23]  H. M. Taylor,et al.  An introduction to stochastic modeling , 1985 .

[24]  Dietrich Stoyan Statistical Analysis of Spatial and Spatio‐Temporal Point Patterns, 3rd edition. P. J. Diggle (2013). Boca Raton: Chapman & Hall/CRC Monographs on Statistics and Applied Probability. 267 pages, ISBN: 978‐1‐4665‐6023‐9. , 2014 .

[25]  Martial Hebert,et al.  Statistical approaches to multi-scale point cloud processing , 2008 .

[26]  Charalambos Poullis,et al.  A Framework for Automatic Modeling from Point Cloud Data , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[27]  J. Rice Mathematical Statistics and Data Analysis , 1988 .

[28]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[29]  Kenneth Dixon,et al.  Introduction to Stochastic Modeling , 2011 .

[30]  William E. Burr,et al.  Recommendation for Key Management, Part 1: General (Revision 3) , 2006 .

[31]  Benoit M. Macq,et al.  From 3D Mesh Data Hiding to 3D Shape Blind and Robust Watermarking: A Survey , 2007, Trans. Data Hiding Multim. Secur..

[32]  Marc Levoy,et al.  Protected interactive 3D graphics via remote rendering , 2004, ACM Trans. Graph..

[33]  Jian Yang,et al.  Protect Interactive 3D Models via Vertex Shader Programming , 2005, ICEC.

[34]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[35]  Radu Bogdan Rusu,et al.  3D is here: Point Cloud Library (PCL) , 2011, 2011 IEEE International Conference on Robotics and Automation.

[36]  Levoy Marc,et al.  2 – THE EARLY HISTORY OF POINT-BASED GRAPHICS , 2007 .

[37]  Alexander M. Bronstein,et al.  Efficient Computation of Isometry-Invariant Distances Between Surfaces , 2006, SIAM J. Sci. Comput..