Skip to main content

3D Point Cloud Encryption Through Chaotic Mapping

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9916))

Abstract

Three dimensional (3D) contents such as 3D point clouds, 3D meshes and 3D surface models are increasingly growing and being widely spread into the industry and our daily life. However, less people consider the problem of the privacy preserving of 3D contents. As an attempt towards 3D security, in this papers, we propose methods of encrypting the 3D point clouds through chaotic mapping. 2 schemes of encryption using chaotic mapping have been proposed to encrypt 3D point clouds. (1) 3 random sequences are generated by the logistic chaotic mapping. Each random vector is sorted to randomly shuffler each coordinate of the 3D point clouds. (2) A random 3×3 invertible rotation matrix and a 3×1 translate vector are generated by the logistic mapping. Then each 3D point is projected to another random place using the above random rotation matrix and translate vector in the homogeneous coordinate. We test the above 2 encryption schemes of 3D point cloud encryption using various 3D point clouds. The 3D point clouds can be encrypted and decrypted correctly. In addition, we evaluated the encryption results by VFH (Viewpoint Feature Histogram). The experimental results show that our proposed methods can produce nearly un-recognized encrypted results of 3D point clouds.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.123dapp.com/.

  2. 2.

    http://www.sketchup.com/.

  3. 3.

    http://www.pointclouds.org/.

References

  1. Huang, C., Nien, H.: Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 282, 2123–2127 (2009)

    Article  Google Scholar 

  2. Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos Soliton. Fract. 26(1), 117–129 (2005)

    Article  MATH  Google Scholar 

  3. Zhen, P., Zhao, G., Min, L.Q., Jin, X.: Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools Appl. (MTA) 75, 6303–6319 (2015)

    Article  Google Scholar 

  4. Wang YZ., Ren GY., Jiang JL., Zhang J., Sun L.J.: Image encryption method based on chaotic map. In: 2nd IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 2558–2560 (2007)

    Google Scholar 

  5. Jin, X., et al.: Private video foreground extraction through chaotic mapping based encryption in the cloud. In: Tian, Q., Sebe, N., Qi, G.-J., Huet, B., Hong, R., Liu, X. (eds.) MMM 2016. LNCS, vol. 9516, pp. 562–573. Springer, Heidelberg (2016). doi:10.1007/978-3-319-27671-7_47

    Chapter  Google Scholar 

  6. Jin, X., Tian, Y., Song, C., Wei, G., Li, X., Zhao, G., Wang, H.: An invertible and anti-chosen plaintext attack image encryption method based on DNA encoding and chaotic mapping. In: Chinese Automation Congress (CAC), Wuhan, China, 2015, pp. 11.27– 11.29 (2015)

    Google Scholar 

  7. Jin, X., Liu, Y., Li, X., Zhao, G., Chen, Y., Guo, K.: Privacy preserving face identification in the cloud through sparse representation. In: Yang, J., Yang, J., Sun, Z., Shan, S., Zheng, W., Feng, J. (eds.) Biometric Recognition. LNCS, vol. 9428, pp. 160–167. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25417-3_20

    Chapter  Google Scholar 

  8. Jin, X., Chen, Y., Ge, S., Zhang, K., Li, X., Li, Y., Liu, Y., Guo, K., Tian, Y., Zhao, G., Zhang, X., Wang, Z.: Color image encryption in CIE L*a*b* space. In: Niu, W., Li, G., Liu, J., Tan, J., Guo, L., Han, Z., Batten, L. (eds.) ATIS 2015. CCIS, vol. 557, pp. 74–85. Springer, Heidelberg (2015). doi:10.1007/978-3-662-48683-2_8

    Chapter  Google Scholar 

  9. Li, Y., et al.: An image encryption algorithm based on Zigzag transformation and 3-Dimension chaotic Logistic map. In: Niu, W., Li, G., Liu, J., Tan, J., Guo, L., Han, Z., Batten, L. (eds.) ATIS 2015. CCIS, vol. 557, pp. 3–13. Springer, Heidelberg (2015). doi:10.1007/978-3-662-48683-2_1

    Chapter  Google Scholar 

  10. del Rey, A.M.: A method to encrypt 3D solid objects based on three-dimensional cellular automata. In: Onieva, E., Santos, I., Osaba, E., Quintián, H., Corchado, E. (eds.) HAIS 2015. LNCS (LNAI), vol. 9121, pp. 427–438. Springer, Heidelberg (2015). doi:10.1007/978-3-319-19644-2_36

    Chapter  Google Scholar 

  11. Rusu, R.B., Blodow, N., Beetz, M.: Fast point feature histograms (FPFH) for 3D registration. In: IEEE International Conference on Robotics and Automation (2009)

    Google Scholar 

  12. Éluard M., Maetz Y., Doërr G.: Geometry-preserving encryption for 3D meshes. In: Compression Et Représentation Des Signaux Audiovisuels (2013)

    Google Scholar 

Download references

Acknowledgement

The work is supported by the National Natural Science Foundation of China (No. 61402021), the Science and Technology Program of the State Archives Administration (2015-B-10), and the open funding project of State Key Laboratory of Virtual Reality Technology and Systems, Beihang University (Grant No. BUAA-VR-16KF-09).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xin Jin or Xiaodong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Jin, X., Wu, Z., Song, C., Zhang, C., Li, X. (2016). 3D Point Cloud Encryption Through Chaotic Mapping. In: Chen, E., Gong, Y., Tie, Y. (eds) Advances in Multimedia Information Processing - PCM 2016. PCM 2016. Lecture Notes in Computer Science(), vol 9916. Springer, Cham. https://doi.org/10.1007/978-3-319-48890-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48890-5_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48889-9

  • Online ISBN: 978-3-319-48890-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics