Skip to main content

Chaotic Encryption of 3D Objects

  • Conference paper
  • First Online:
Biomedical Applications Based on Natural and Artificial Computing (IWINAC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10338))

Abstract

In the recent years there has been an unstoppable rise of the use of 3D technologies in several branches of science and technology. In this sense it is mandatory to guarantee the privacy of 3D data since they are exposed to several cybersecurity threats. The main goal of this work is to introduce a novel protocol to encrypt 3D objects defined by voxels. The proposed protocol involves the iterative application of two phases: the confusion phase (based on a chaotic map), and the diffusion phase (governed by a three-dimensional cellular automata). It is shown to be secure against the most important cryptanalytic attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  2. Kong, D.Z., Cao, L.C., Jin, G.F., Javidi, B.: Three-dimensional scene encryption and display based on computer-generated holograms. Appl. Opt. 55(29), 8296–8300 (2016)

    Article  Google Scholar 

  3. Lee, S.H., Kwon, K.R.: Multiple 3D medical data watermarking for healthcare data management. J. Med. Syst. 35, 1573–1593 (2011)

    Article  Google Scholar 

  4. Li, W.N., Shi, C.X., Piao, M.L., Kim, N.: Multiple 3D-object secure information system based on phase shifting method and single interference. Appl. Opt. 55(15), 4052–4059 (2016)

    Article  Google Scholar 

  5. Li, X.W., Wang, Q.H., Kim, S.T., Lee, I.K.: Encrypting 2D/3D image using improved lensless integral imaging in Fresnel domain. Opt. Commun. 381, 260–270 (2016)

    Article  Google Scholar 

  6. del Rey, A.M., Hernández Pastora, J.L., Rodríguez Sánchez, G.: 3D medical data security protection. Expert Syst. Appl. 54, 379–386 (2016)

    Article  Google Scholar 

  7. Stapleton, J.J.: Security Without Obscurity: A Guide to Confidentiality, Authentication, and Integrity. Auerbach Publications, Boca Raton (2014)

    Book  Google Scholar 

  8. Wolfram, S.: A New Kind of Science. Wolfram Media Inc., Champaign (2002)

    MATH  Google Scholar 

Download references

Acknowledgments

This work has been supported by Ministerio de Economía y Competitividad (Spain) and the European Union through FEDER funds under grants TIN2014-55325-C2-2-R and MTM2015-69138-REDT.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Martín del Rey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

del Rey, A.M. (2017). Chaotic Encryption of 3D Objects. In: Ferrández Vicente, J., Álvarez-Sánchez, J., de la Paz López, F., Toledo Moreo, J., Adeli, H. (eds) Biomedical Applications Based on Natural and Artificial Computing. IWINAC 2017. Lecture Notes in Computer Science(), vol 10338. Springer, Cham. https://doi.org/10.1007/978-3-319-59773-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59773-7_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59772-0

  • Online ISBN: 978-3-319-59773-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics