A New Transformation of 3D Models Using Chaotic Encryption Based on Arnold Cat Map

  • Benson RajEmail author
  • L. Jani Anbarasi
  • Modigari Narendra
  • V. J. Subashini
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 29)


In the emerging Virtual Reality era, 3D multimedia contents are popularized as images and videos. Encryption is a methodology that enhances the security by converting the original content into unintelligible content. The Arnold transform or Arnold cat map is a commonly used chaos-based encryption system that encrypts by shuffling the data. 3D models include vertices, faces and textures. An efficient secure symmetric chaotic cryptosystem is proposed for 3D mesh graphical models using 3D Arnold cat map. Arnold cat map is performed to encrypt the 3D mesh model using shuffling and substitution. The cryptosystem is proposed for vertices and faces separately and are composited together to form the final encrypted model. Each round introduces a good permutation and substitution through the confusion and diffusion generated by the 3D Arnold map. The chaotic function delivers more security for the 3D models through the shuffling and substitution. Simulation results show that the proposed scheme encrypts and decrypts the 3D mesh models and resists various attacks.


3D mesh models Chaos Image encryption Arnold cat map Arnold transform 


  1. 1.
    Lian, S., Mao, Y., Wang, Z.: 3D extensions of some 2D chaotic maps and their usage in data encryption. In: 4th International Conference on Control and Automation, pp. 819–823, June 2003Google Scholar
  2. 2.
    Thamizhchelvy, K., Geetha, G.: Data hiding technique with fractal image generation method using chaos theory and watermarking. Indian J. Sci. Technol. 7(9), 1271–1278 (2014)Google Scholar
  3. 3.
    Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Li, C., Zhang, L.Y., Ou, R., Wong, K.-W., Shu, S.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70(4), 2383–2388 (2012)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Wang, X.-Y., Yang, L., Liu, R., Kadir, A.: A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 62(3), 615–621 (2010)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129–2151 (2006)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Guan, Z.-H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346(1), 153–157 (2005)CrossRefGoogle Scholar
  8. 8.
    Fridrich, J.: Secure image ciphering based on chaos. Final report for AFRL (1997)Google Scholar
  9. 9.
    Qi, D., Zou, J., Han, X.: Sci. China Ser. E: Technol. Sci. 43(3), 304–312 (2000)CrossRefGoogle Scholar
  10. 10.
    Jin, X., zhu, S., Xiao, C., Sun, H., Li, X., Zhao, G., Ge, S.: 3D textured model encryption via 3D Lu chaotic mapping. Science China Inf. Sci. 60, 122107 (2017)CrossRefGoogle Scholar
  11. 11.
    Jani Anbarasi, L., Anandha Mala, G.S.: Verifiable multi secret sharing scheme for 3D models. Int. Arab. J. Inf. Technol. (IAJIT) 14(6), 1683–3198 (2015)Google Scholar
  12. 12.
    Jani Anbarasi, L., Narendra, M.: Robust watermarking scheme using Weber Law for 3D mesh models. Imaging Sci. J. 65, 409–417 (2017)CrossRefGoogle Scholar
  13. 13.
    Rey, A.M.D.: A method to encrypt 3D solid objects based on three-dimensional cellular automata. In: Proceedings of the 10th International Conference on Hybrid ArtiLcial Intelligent Systems, Bilbao, pp. 427–438 (2015)Google Scholar
  14. 14.
    Jolfaei, A., Wu, X.W., Muthukkumarasamy, V.: A 3D object encryption scheme which maintains dimensional and spatial stability. IEEE Trans. Inf. Foren. Secur. 10, 409–422 (2015)CrossRefGoogle Scholar
  15. 15.
    Jin, X., Wu, Z.X., Song, C.G., et al.: 3D point cloud encryption through chaotic mapping. In: Proceedings of the 17th Pacific Rim Conference on Multimedia Information Processing, Xi’an, pp. 119–129 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Benson Raj
    • 1
    Email author
  • L. Jani Anbarasi
    • 2
  • Modigari Narendra
    • 3
  • V. J. Subashini
    • 4
  1. 1.Computer Information ScienceHigher Colleges of Technology, Fujairah Women’s CampusFujairahUnited Arab Emirates
  2. 2.School of Computing Science and EngineeringVIT UniversityChennaiIndia
  3. 3.Computer Science and EngineeringMadhav Institute of Technology and ScienceGwaliorIndia
  4. 4.Department of CSEJerusalem College of EngineeringPallikaranai, ChennaiIndia

Personalised recommendations