A Secure Lightweight Texture Encryption Scheme

Due to the widespread application of augmented and virtual environments, the research into 3D content protection is fundamentally important. To maintain confidentiality, encryption of 3D content, including the 3D objects and texture images, is essential. In this paper, a novel texture encryption scheme is proposed which complements the existing 3D object encryption methods. The proposed method encrypts texture images by bit masking and a permutation procedure using the Salsa20/12 stream cipher. The method is lightweight and satisfies the security requirement. It also prevents the partial disclosure of the encrypted 3D surface geometry by protecting the texture patterns from being partially leaked. The scheme has a better speed-security profile than the full encryption and the selective 4 most significant bit-plane encryption by 128-bit AES. The encryption schemes are implemented and tested with 500 sample texture images. The experimental results show that the scheme has a better encryption performance compared to the full/selective encryption by 128-bit AES.

[1]  Jim R. Parker,et al.  Algorithms for image processing and computer vision , 1996 .

[2]  Marc Levoy,et al.  Protected interactive 3D graphics via remote rendering , 2004, SIGGRAPH 2004.

[3]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice,Second Edition , 2002 .

[4]  Jean-Luc Dugelay,et al.  Texture-based watermarking of 3D video objects , 2003, IEEE Trans. Circuits Syst. Video Technol..

[5]  David Cash,et al.  Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks , 2010, CRYPTO.

[6]  Ron Kimmel,et al.  Texture Mapping Using Surface Flattening via Multidimensional Scaling , 2002, IEEE Trans. Vis. Comput. Graph..

[7]  Marc Eluard,et al.  Geometry-preserving Encryption for 3D Meshes , 2013 .

[8]  Andrey Bogdanov,et al.  Comb to Pipeline: Fast Software Encryption Revisited , 2015, FSE.

[9]  Xin-Wen Wu,et al.  A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability , 2015, IEEE Transactions on Information Forensics and Security.

[10]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[11]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[12]  Shahram Khazaei,et al.  New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba , 2008, FSE.

[13]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[14]  Yu Chen,et al.  Inferring 3D Shapes and Deformations from Single Views , 2010, ECCV.

[15]  Ashutosh Saxena,et al.  Make3D: Learning 3D Scene Structure from a Single Still Image , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.