Skip to main content

A New Transformation of 3D Models Using Chaotic Encryption Based on Arnold Cat Map

  • Conference paper
  • First Online:
Book cover Advances in Internet, Data and Web Technologies (EIDWT 2019)

Abstract

In the emerging Virtual Reality era, 3D multimedia contents are popularized as images and videos. Encryption is a methodology that enhances the security by converting the original content into unintelligible content. The Arnold transform or Arnold cat map is a commonly used chaos-based encryption system that encrypts by shuffling the data. 3D models include vertices, faces and textures. An efficient secure symmetric chaotic cryptosystem is proposed for 3D mesh graphical models using 3D Arnold cat map. Arnold cat map is performed to encrypt the 3D mesh model using shuffling and substitution. The cryptosystem is proposed for vertices and faces separately and are composited together to form the final encrypted model. Each round introduces a good permutation and substitution through the confusion and diffusion generated by the 3D Arnold map. The chaotic function delivers more security for the 3D models through the shuffling and substitution. Simulation results show that the proposed scheme encrypts and decrypts the 3D mesh models and resists various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lian, S., Mao, Y., Wang, Z.: 3D extensions of some 2D chaotic maps and their usage in data encryption. In: 4th International Conference on Control and Automation, pp. 819–823, June 2003

    Google Scholar 

  2. Thamizhchelvy, K., Geetha, G.: Data hiding technique with fractal image generation method using chaos theory and watermarking. Indian J. Sci. Technol. 7(9), 1271–1278 (2014)

    Google Scholar 

  3. Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012)

    Article  MathSciNet  Google Scholar 

  4. Li, C., Zhang, L.Y., Ou, R., Wong, K.-W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70(4), 2383–2388 (2012)

    Article  MathSciNet  Google Scholar 

  5. Wang, X.-Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)

    Article  MathSciNet  Google Scholar 

  6. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129–2151 (2006)

    Article  MathSciNet  Google Scholar 

  7. Guan, Z.-H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346(1), 153–157 (2005)

    Article  Google Scholar 

  8. Fridrich, J.: Secure image ciphering based on chaos. Final report for AFRL (1997)

    Google Scholar 

  9. Qi, D., Zou, J., Han, X.: Sci. China Ser. E: Technol. Sci. 43(3), 304–312 (2000)

    Article  Google Scholar 

  10. Jin, X., zhu, S., Xiao, C., Sun, H., Li, X., Zhao, G., Ge, S.: 3D textured model encryption via 3D Lu chaotic mapping. Science China Inf. Sci. 60, 122107 (2017)

    Article  Google Scholar 

  11. Jani Anbarasi, L., Anandha Mala, G.S.: Verifiable multi secret sharing scheme for 3D models. Int. Arab. J. Inf. Technol. (IAJIT) 14(6), 1683–3198 (2015)

    Google Scholar 

  12. Jani Anbarasi, L., Narendra, M.: Robust watermarking scheme using Weber Law for 3D mesh models. Imaging Sci. J. 65, 409–417 (2017)

    Article  Google Scholar 

  13. Rey, A.M.D.: A method to encrypt 3D solid objects based on three-dimensional cellular automata. In: Proceedings of the 10th International Conference on Hybrid ArtiLcial Intelligent Systems, Bilbao, pp. 427–438 (2015)

    Google Scholar 

  14. Jolfaei, A., Wu, X.W., Muthukkumarasamy, V.: A 3D object encryption scheme which maintains dimensional and spatial stability. IEEE Trans. Inf. Foren. Secur. 10, 409–422 (2015)

    Article  Google Scholar 

  15. Jin, X., Wu, Z.X., Song, C.G., et al.: 3D point cloud encryption through chaotic mapping. In: Proceedings of the 17th Pacific Rim Conference on Multimedia Information Processing, Xi’an, pp. 119–129 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benson Raj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Raj, B., Jani Anbarasi, L., Narendra, M., Subashini, V.J. (2019). A New Transformation of 3D Models Using Chaotic Encryption Based on Arnold Cat Map. In: Barolli, L., Xhafa, F., Khan, Z., Odhabi, H. (eds) Advances in Internet, Data and Web Technologies. EIDWT 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 29. Springer, Cham. https://doi.org/10.1007/978-3-030-12839-5_29

Download citation

Publish with us

Policies and ethics