Geometry-preserving Encryption for 3D Meshes

This paper introduces a geometry-preserving protection paradigm that heavily distorts 3D objects while preserving some intrinsic geometrical property (e.g. the bounding box or the convex hull), thereby avoiding a global corruption of the whole 3D scene. Backward compatibility is guaranteed de facto : legacy non-compliant rendering engines can display 3D scenes containing protected objects, but only compliant renderers with the necessary credentials can display deprotected objects. We propose a couple of permutation-based encryption algorithms embracing this geometry-preserving strategy and then detail some challenges related to them. For instance, we discuss the sideeffects of such protection mechanisms on other baseline 3D primitives, e.g. the rendering time, as well as the difficulty of assessing the security of such algorithms.

[1]  Mihir Bellare,et al.  Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..

[2]  D. Eastlake,et al.  XML Encryption Syntax and Processing , 2003 .

[3]  Teddy Furon,et al.  Tracing Pirated Content on the Internet: Unwinding Ariadne's Thread , 2010, IEEE Security & Privacy.

[4]  Amir Said Measuring the strength of partial encryption schemes , 2005, IEEE International Conference on Image Processing 2005.

[5]  James D. Foley ... et al. Introduction to computer graphics , 2013 .

[6]  Philipp Slusallek,et al.  3D Rasterization - Unifying Rasterization and Ray Casting , 2009 .

[7]  Steven K. Feiner,et al.  Introduction to Computer Graphics , 1993 .

[8]  Tony DeRose,et al.  Surface reconstruction from unorganized points , 1992, SIGGRAPH.

[9]  C.-C. Jay Kuo,et al.  Technologies for 3D mesh compression: A survey , 2005, J. Vis. Commun. Image Represent..

[10]  Nick Chirkov Fast 3D Line Segment–Triangle Intersection Test , 2005, J. Graph. Tools.

[11]  Martin Isenburg,et al.  Connectivity shapes , 2001, Proceedings Visualization, 2001. VIS '01..

[12]  Benoit M. Macq,et al.  From 3D Mesh Data Hiding to 3D Shape Blind and Robust Watermarking: A Survey , 2007, Trans. Data Hiding Multim. Secur..

[13]  Heinrich Müller,et al.  Graph-based surface reconstruction using structures in scattered point sets , 1998, Proceedings. Computer Graphics International (Cat. No.98EX149).

[14]  John Black,et al.  Ciphers with Arbitrary Finite Domains , 2002, CT-RSA.