Multimedia Tools and Applications

, Volume 78, Issue 23, pp 33865–33884 | Cite as

Fast encryption scheme for 3D models based on chaos system

  • Xingyuan WangEmail author
  • Mingxiao XuEmail author
  • Yong Li


With the development of multimedia applications, the application of 3D models becomes more and more popular, and its security has become an urgent problem to be solved. 3D objects have more complex spatial structures than 1D and 2D objects. Most of the previous work is to encrypt 3D objects directly, and this kind of algorithm is often tedious and the encryption time is long. Therefore, a new fast image encryption scheme based on chaos theory is proposed in this paper. In this scheme, the 3D object is transformed into 2D object (similar to image format), and then encrypted. The encryption process is divided into two stages: confusion stage and diffusion stage. In the confusion phase, we introduce random points. In the diffusion phase, we split the floating-point data, the integer part is encrypted by XOR, and the decimal part is scrambled only. The experimental results show that the scheme can encrypt and decrypt the 3D model correctly. The numerical results in security analysis are close to the ideal value, which shows that the scheme can resist common attacks and has high security.


Chaos System 3D models Scrambling-diffusion Floating point data 



This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019JH2/10300057). The authors declare that they have no conflict of interest.


  1. 1.
    Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688Google Scholar
  2. 2.
    Altaf M, Ahmad A, Khan FA et al (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimed Tools Appl 77:27981–27995Google Scholar
  3. 3.
    Babaei M (2013) A novel text and image encryption method based on chaos theory and DNA computing. Nat Comput 12(1):101–107MathSciNetzbMATHGoogle Scholar
  4. 4.
    Berman B (2012) 3-D printing: The new industrial revolution. Business Horizons 55(2):155–162Google Scholar
  5. 5.
    Brown AC, de Beer D (2013) Development of a stereolithography (STL) slicing and G-code generation algorithm for an entry level 3-D printer. Africon Institute of Electrical and Electronics Engineers 2013:1–5Google Scholar
  6. 6.
    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213Google Scholar
  7. 7.
    Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetzbMATHGoogle Scholar
  8. 8.
    Chen DY, Tian XP, Shen YT et al (2003) On visual similarity based 3D model retrieval. Computer Graphics Forum 22(3):223–232Google Scholar
  9. 9.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(06):1259–1284MathSciNetzbMATHGoogle Scholar
  10. 10.
    Gao Y, Dai Q, Zhang NY (2010) 3D model comparison using spatial structure circular descriptor. Pattern Recogn 43(3):1142–1151zbMATHGoogle Scholar
  11. 11.
    Gupta B, Agrawal DP, Wang H et al (2018) Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press, Boca RatonGoogle Scholar
  12. 12.
    Gupta B, Agrawal DP, Yamaguchi S et al (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, HersheyGoogle Scholar
  13. 13.
    Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. International Journal of Cloud Applications and Computing 7(2):27–40Google Scholar
  14. 14.
    Jin X, Zhu S, Xiao C et al (2017) 3D textured model encryption via 3D Lu chaotic mapping. SCIENCE CHINA Inf Sci 60(12):122107Google Scholar
  15. 15.
    Jolfaei A, Wu XW, Muthukkumarasamy V (2014) A 3D object encryption scheme which maintains dimensional and spatial stability. Institute of Electrical and Electronics Engineers Transactions on Information Forensics and Security 10(2):409–422Google Scholar
  16. 16.
    Kaminsky W, Snyder T, Stone-Sundberg J et al (2014) One-click preparation of 3D print files (*. stl,*. wrl) from*. cif (crystallographic information framework) data using Cif2VRML. Powder Diffract 29(S2):S42–S47Google Scholar
  17. 17.
    Kaneko K (1989) Pattern dynamics in spatiotemporal chaos. Physica D 34(1-2):1–41MathSciNetzbMATHGoogle Scholar
  18. 18.
    Kusaka M, Sugimoto M, Fukami N et al (2015) Initial experience with a tailor-made simulation and navigation program using a 3-D printer model of kidney transplantation surgery. Transplant Proc 47(3):596–599Google Scholar
  19. 19.
    Li X, Zhou C, Xu N (2018) A Secure and Efficient Image Encryption Algorithm Based on DNA Coding and Spatiotemporal Chaos. International Journal Network Security 20(1):110–120Google Scholar
  20. 20.
    Liu AA, Nie WZ, Gao Y et al (2018) View-based 3-d model retrieval: a benchmark. Institute of Electrical and Electronics Engineers Transactions on Cybernetics 48(3):916–928Google Scholar
  21. 21.
    Matthews R (1984) On the derivation of a “Chaotic” encryption algorithm. Cryptologia 8(1):29–41MathSciNetGoogle Scholar
  22. 22.
    May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467zbMATHGoogle Scholar
  23. 23.
    Parvees MYM, Samath JA, Bose BP (2018) Audio encryption-a chaos-based data byte scrambling technique. Int J Appl Syst Stud 8(1):51–75Google Scholar
  24. 24.
    Preishuber M, Hütter T, Katzenbeisser S et al (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. Institute of Electrical and Electronics Engineers Transactions on Information Forensics and Security 13(9):2137–2150Google Scholar
  25. 25.
    Rey AM (2015) A Method to encrypt 3D solid objects based on three-dimensional cellular automata. International Conference on Hybrid Artificial Intelligence Systems. Springer, Cham, pp. 427-438Google Scholar
  26. 26.
    Sadkhan SB, Mohammed RS (2015) Proposed random unified chaotic map as PRBG for voice encryption in wireless communication. Procedia Computer Science 65:314–323Google Scholar
  27. 27.
    Saraf KR, Jagtap VP, Mishra AK (2014) Text and image encryption decryption using advanced encryption standard. International Journal of Emerging Trends & Technology in Computer Science 3(3):118–126Google Scholar
  28. 28.
    Tang J, Zhang F (2017) A new code-based encryption scheme and its applications. International Journal of High Performance Computing and Networking 10(6):515–523Google Scholar
  29. 29.
    Ventola CL (2014) Medical applications for 3D printing: current and projected uses. Pharmacy and Therapeutics 39(10):704–711Google Scholar
  30. 30.
    Wang XY, Feng L, Wang SB et al (2018) Spatiotemporal chaos in coupled logistic map lattice with dynamic coupling coefficient and its application in image encryption. IEEE Access 6:39705–39724Google Scholar
  31. 31.
    Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358Google Scholar
  32. 32.
    Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36MathSciNetGoogle Scholar
  33. 33.
    Wang XY, Li P, Zhang YQ et al (2018) A novel color image encryption scheme using DNA permutation based on the Lorenz system. Multimed Tools Appl 77(5):6243–6265Google Scholar
  34. 34.
    Wang XY, Liu CM (2017) A novel and effective image encryption algorithm based on Chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245Google Scholar
  35. 35.
    Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18Google Scholar
  36. 36.
    Wang J, Wang C (2018) Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. International Journal of High Performance Computing and Networking 12(2):111–117Google Scholar
  37. 37.
    Wang C, Wang X, Xia Z et al (2019) Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf Sci 470:109–120Google Scholar
  38. 38.
    Wang X, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dynamics 83(1-2):333–346MathSciNetGoogle Scholar
  39. 39.
    Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61Google Scholar
  40. 40.
    Xu SJ, Wang JZ, Yang SX (2008) An improved image encryption algorithm based on chaotic maps. Chinese Physics B 17(11):4027Google Scholar
  41. 41.
    Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608Google Scholar
  42. 42.
    Zhang J, Gao H (2019) A compact construction for non-monotonic key-policy attribute-based encryption. International Journal of High Performance Computing and Networking 13(3):321–330Google Scholar
  43. 43.
    Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351Google Scholar
  44. 44.
    Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dynamics 77(3):687–698Google Scholar
  45. 45.
    Zhang H, Wang XY, Wang SW et al (2017) Application of coupled map lattice with parameter q in image encryption. Opt Lasers Eng 88:65–74Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Information Science and TechnologyDalian Maritime UniversityDalianChina

Personalised recommendations