Skip to main content

A Method to Encrypt \(3\)D Solid Objects Based on Three-Dimensional Cellular Automata

  • Conference paper
  • First Online:
Hybrid Artificial Intelligent Systems (HAIS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9121))

Included in the following conference series:

Abstract

In this work a novel encryption algorithm to assure the confidentiality of \(3\)D solid objects is introduced. The encryption method consists of two phases: the confusion phase and the diffusion phase. In the first one a three-dimensional chaotic Cat map is applied \(N\) times, whereas in the diffusion phase a \(2\)-th order memory reversible \(3\)D cellular automata is evolved \(T\) times during \(M\) rounds. The encryption method is shown to be secure against the most important cryptanalytic attacks: statistical attacks, differential attack, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Elsheh, E., Hamza, A.B.: Secret sharing approaches for \(3\)D object encryption. Expert Syst. Appl. 38, 13906–13911 (2011)

    Google Scholar 

  2. Fernandes, E., Delaigle, J.F.: Geometric soft hash functions for 2D and 3D objects. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, p. 784. SPIE (2004)

    Google Scholar 

  3. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8, 1259–1284 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  4. Lee, S.-H., Kwon, K.-R.: Robust 3D mesh model hashing based on feature object. Digit. Signal Process. 22, 744–759 (2012)

    Article  MathSciNet  Google Scholar 

  5. Lee, S.-H., Kwon, K.-R., Hwang, W.-J., Chandrasekar, V.: Key-dependent 3D model hashing for authentication using heat kernel signature. Digit. Signal Process. 23, 1505–1522 (2013)

    Article  MathSciNet  Google Scholar 

  6. Martín del Rey, A.: A multi-secret sharing scheme for \(3\)D solid objects. Expert Syst. Appl. 42, 2114–2120 (2015)

    Article  Google Scholar 

  7. Montañola Sales, M., Rondão Alface, P., Macq, B.: \(3\)D objects watermarking and tracking of their visual representations. In: Proceedings of the Third International Conferences on Advances in Multimedia, p. 111. IARIA (2011)

    Google Scholar 

  8. Nguyen, V.D., Chow, Y.-W., Susilo, W.: On the security of text-based 3D CAPTCHAs. Comput. Secur. 45, 84–99 (2014)

    Article  Google Scholar 

  9. Tarmissi, K., Ben Hamza, A.: Information-theoretic hashing of \(3\)D objects using spectral graph theory. Expert Syst. Appl. 36, 9409–9414 (2009)

    Article  Google Scholar 

  10. Wang, K., Lavoué, G., Denis, F., Baskurt, A.: Three-dimensional meshes watermarking: review and attack-centric investigation. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 50–64. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Wolfram, S.: A New Kind of Science. Wolfram Media Inc., Champaign (2002)

    MATH  Google Scholar 

  12. Zhang, S.: Handbook of D Machine Vision: Optical Metrology and Imaging. CRC Press, New York (2013)

    Book  Google Scholar 

Download references

Acknowledgement

This work has been supported by Gerencia Regional de Salud (Junta de Castilla y León, Spain) under grant number GES/SA01/14.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Martín del Rey .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Martín del Rey, A. (2015). A Method to Encrypt \(3\)D Solid Objects Based on Three-Dimensional Cellular Automata. In: Onieva, E., Santos, I., Osaba, E., Quintián, H., Corchado, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2015. Lecture Notes in Computer Science(), vol 9121. Springer, Cham. https://doi.org/10.1007/978-3-319-19644-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19644-2_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19643-5

  • Online ISBN: 978-3-319-19644-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics