Fast encryption scheme for 3D models based on chaos system

With the development of multimedia applications, the application of 3D models becomes more and more popular, and its security has become an urgent problem to be solved. 3D objects have more complex spatial structures than 1D and 2D objects. Most of the previous work is to encrypt 3D objects directly, and this kind of algorithm is often tedious and the encryption time is long. Therefore, a new fast image encryption scheme based on chaos theory is proposed in this paper. In this scheme, the 3D object is transformed into 2D object (similar to image format), and then encrypted. The encryption process is divided into two stages: confusion stage and diffusion stage. In the confusion phase, we introduce random points. In the diffusion phase, we split the floating-point data, the integer part is encrypted by XOR, and the decimal part is scrambled only. The experimental results show that the scheme can encrypt and decrypt the 3D model correctly. The numerical results in security analysis are close to the ideal value, which shows that the scheme can resist common attacks and has high security.

[1]  Ning Xu,et al.  A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos , 2018, Int. J. Netw. Secur..

[2]  Xin Jin,et al.  3D textured model encryption via 3D Lu chaotic mapping , 2017, Science China Information Sciences.

[3]  Chunxiao Wang,et al.  Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model , 2018, Int. J. High Perform. Comput. Netw..

[4]  Yiran Chen,et al.  A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .

[5]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[6]  Hongyu Zhao,et al.  Fast image encryption algorithm based on parallel computing system , 2019, Inf. Sci..

[7]  Xingyuan Wang,et al.  A novel chaotic block image encryption algorithm based on dynamic random growth technique , 2015 .

[8]  K. Kaneko Pattern dynamics in spatiotemporal chaos: Pattern selection, diffusion of defect and pattern competition intermettency , 1989 .

[9]  Zhang Hao,et al.  Application of coupled map lattice with parameter q in image encryption , 2017 .

[10]  T Kenmochi,et al.  Initial experience with a tailor-made simulation and navigation program using a 3-D printer model of kidney transplantation surgery. , 2015, Transplantation proceedings.

[11]  C. L. Ventola Medical Applications for 3D Printing: Current and Projected Uses. , 2014, P & T : a peer-reviewed journal for formulary management.

[12]  Sattar B. Sadkhan,et al.  Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication , 2015 .

[13]  Ibtihal Mouhib,et al.  Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment , 2017, Int. J. Cloud Appl. Comput..

[14]  Xing-yuan Wang,et al.  Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation , 2014 .

[15]  Kundankumar Rameshwar Saraf,et al.  Text and Image Encryption Decryption Using Advanced Encryption Standard , 2014 .

[16]  Robert M. May,et al.  Simple mathematical models with very complicated dynamics , 1976, Nature.

[17]  Ángel Martín del Rey A Method to Encrypt 3D Solid Objects Based on Three-Dimensional Cellular Automata , 2015, HAIS.

[18]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[19]  Peter Moeck,et al.  One-click preparation of 3D print files (*.stl, *.wrl) from *.cif (crystallographic information framework) data using Cif2VRML , 2014, Powder Diffraction.

[20]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[21]  Yu-Ting Su,et al.  View-Based 3-D Model Retrieval: A Benchmark , 2018, IEEE Transactions on Cybernetics.

[22]  Barry Berman,et al.  3D printing: the new industrial revolution , 2012, IEEE Engineering Management Review.

[23]  Shujiang Xu,et al.  An improved image encryption algorithm based on chaotic maps , 2008 .

[24]  Mahmoud Al-Ayyoub,et al.  Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2017, Multimedia Tools and Applications.

[25]  Xin-Wen Wu,et al.  A 3D Object Encryption Scheme Which Maintains Dimensional and Spatial Stability , 2015, IEEE Transactions on Information Forensics and Security.

[26]  Yue Gao,et al.  3D model comparison using spatial structure circular descriptor , 2010, Pattern Recognit..

[27]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[28]  Junqi Zhang,et al.  A compact construction for non-monotonic key-policy attribute-based encryption , 2019, Int. J. High Perform. Comput. Netw..

[29]  Xingyuan Wang,et al.  A novel and effective image encryption algorithm based on chaos and DNA encoding , 2017, Multimedia Tools and Applications.

[30]  Xing-Yuan Wang,et al.  A novel color image encryption scheme using DNA permutation based on the Lorenz system , 2018, Multimedia Tools and Applications.

[31]  Haoxiang Wang,et al.  Computer and Cyber Security , 2018 .

[32]  Stefan Katzenbeisser,et al.  Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[33]  Chuan Zhang,et al.  Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm , 2019, Inf. Sci..

[34]  Ventola Cl Medical Applications for 3D Printing: Current and Projected Uses. , 2014 .

[35]  Feng Liu,et al.  FLUIDS, PLASMAS AND ELECTRIC DISCHARGES: Improving the uniformity of RF-plasma density by a humped variable-gap spiral antenna , 2008 .

[36]  J. Abdul Samath,et al.  Audio encryption – a chaos-based data byte scrambling technique , 2018 .

[37]  Andrew C. Brown,et al.  Development of a stereolithography (STL) slicing and G-code generation algorithm for an entry level 3-D printer , 2013, 2013 Africon.

[38]  Xingyuan Wang,et al.  Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory , 2020, Inf. Sci..

[39]  Ming Ouhyoung,et al.  On Visual Similarity Based 3D Model Retrieval , 2003, Comput. Graph. Forum.

[40]  Majid Babaei,et al.  A novel text and image encryption method based on chaos theory and DNA computing , 2012, Natural Computing.

[41]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[42]  Xing-yuan Wang,et al.  A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems , 2015, Nonlinear Dynamics.

[43]  Muhammad Altaf,et al.  Computationally efficient selective video encryption with chaos based block cipher , 2018, Multimedia Tools and Applications.

[44]  Xing-Yuan Wang,et al.  A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice , 2014, Inf. Sci..

[45]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .

[46]  Feng Le,et al.  Spatiotemporal Chaos in Coupled Logistic Map Lattice With Dynamic Coupling Coefficient and its Application in Image Encryption , 2018, IEEE Access.

[47]  Fangguo Zhang,et al.  A new code-based encryption scheme and its applications , 2017, Int. J. High Perform. Comput. Netw..