Multi-Level Chaotic Maps for 3D Textured Model Encryption
- 194 Downloads
With the rapid progress of virtual reality and augmented reality technologies, 3D contents are the next widespread media in many applications. Thus, the protection of 3D models is primarily important. Encryption of 3D models is essential to maintain confidentiality. Previous work on encryption of 3D surface model often considers the point clouds, the meshes, and the textures individually. In this work, a multi-level chaotic maps model for 3D textured encryption was presented by observing the different contributions for recognizing cipher 3D models between vertices (point cloud), polygons, and textures. For vertices which make main contribution for recognizing, we use high-level 3D Lu chaotic map to encrypt them. For polygons and textures which make relatively smaller contributions for recognizing, we use 2D Arnold’s cat map and 1D logistic map to encrypt them, respectively. The experimental results show that our method can get similar performance with the other method and use the same high-level chaotic map for point cloud, polygons, and textures, while we use less time. Besides, our method can resist more method of attacks such as statistic attack, brute-force attack, and correlation attack.
Keywords3D model Textured model encryption Point cloud Chaotic map
This work is partially supported by the National Natural Science Foundation of China (Grant Nos. 61772047, 61772513), the Science and Technology Project of the State Archives Administrator (Grant No. 2015-B-10), and the Fundamental Research Funds for the Central Universities (Grant No. 328201803, 328201801).
- 2.Éluard, M., Maetz, Y., & Doërr, G. (2013). Geometry-preserving encryption for 3D meshes. In Actes de Compression et REprsentation des Signaux Audiovisuels (pp. 7–12).Google Scholar
- 5.Jin, X., Wu, Z., Song, C., Zhang, C., & Li, X. (2016). 3D point cloud encryption through chaotic mapping. In Advances in Multimedia Information Processing (PCM) 2016. Proceedings of the 17th Pacific-rim Conference on Multimedia (pp. 119–129). Cham: Springer.Google Scholar
- 6.Jin, X., Yin, S., Li, X., Zhao, G., Tian, Z., Sun, N., et al. (2016). Color image encryption in YCbCr space. In 8th International Conference on Wireless Communications & Signal Processing, WCSP (pp. 1–5). Piscataway: IEEE.Google Scholar
- 10.Jolfaei, A., Wu, X., & Muthukkumarasamy, V. (2016). A secure lightweight texture encryption scheme. In Image and Video Technology – PSIVT 2015 Workshops. PSIVT 2015 (pp. 344–356). Cham: SpringerGoogle Scholar
- 11.del Rey, Á. M. (2015). A method to encrypt 3D solid objects based on three-dimensional cellular automata. In Hybrid Artificial Intelligent Systems. 10th International Conference on Hybrid Artificial Intelligence Systems (pp. 427–438). Cham: SpringerGoogle Scholar