Abstract
In this work a novel encryption algorithm to assure the confidentiality of \(3\)D solid objects is introduced. The encryption method consists of two phases: the confusion phase and the diffusion phase. In the first one a three-dimensional chaotic Cat map is applied \(N\) times, whereas in the diffusion phase a \(2\)-th order memory reversible \(3\)D cellular automata is evolved \(T\) times during \(M\) rounds. The encryption method is shown to be secure against the most important cryptanalytic attacks: statistical attacks, differential attack, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Elsheh, E., Hamza, A.B.: Secret sharing approaches for \(3\)D object encryption. Expert Syst. Appl. 38, 13906–13911 (2011)
Fernandes, E., Delaigle, J.F.: Geometric soft hash functions for 2D and 3D objects. In: Delp III, E.J., Wong, P.W. (eds.) Proceedings of SPIE 5306, Security, Steganography, and Watermarking of Multimedia Contents VI, p. 784. SPIE (2004)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8, 1259–1284 (1998)
Lee, S.-H., Kwon, K.-R.: Robust 3D mesh model hashing based on feature object. Digit. Signal Process. 22, 744–759 (2012)
Lee, S.-H., Kwon, K.-R., Hwang, W.-J., Chandrasekar, V.: Key-dependent 3D model hashing for authentication using heat kernel signature. Digit. Signal Process. 23, 1505–1522 (2013)
MartÃn del Rey, A.: A multi-secret sharing scheme for \(3\)D solid objects. Expert Syst. Appl. 42, 2114–2120 (2015)
Montañola Sales, M., Rondão Alface, P., Macq, B.: \(3\)D objects watermarking and tracking of their visual representations. In: Proceedings of the Third International Conferences on Advances in Multimedia, p. 111. IARIA (2011)
Nguyen, V.D., Chow, Y.-W., Susilo, W.: On the security of text-based 3D CAPTCHAs. Comput. Secur. 45, 84–99 (2014)
Tarmissi, K., Ben Hamza, A.: Information-theoretic hashing of \(3\)D objects using spectral graph theory. Expert Syst. Appl. 36, 9409–9414 (2009)
Wang, K., Lavoué, G., Denis, F., Baskurt, A.: Three-dimensional meshes watermarking: review and attack-centric investigation. In: Furon, T., Cayre, F., Doërr, G., Bas, P. (eds.) IH 2007. LNCS, vol. 4567, pp. 50–64. Springer, Heidelberg (2008)
Wolfram, S.: A New Kind of Science. Wolfram Media Inc., Champaign (2002)
Zhang, S.: Handbook of D Machine Vision: Optical Metrology and Imaging. CRC Press, New York (2013)
Acknowledgement
This work has been supported by Gerencia Regional de Salud (Junta de Castilla y León, Spain) under grant number GES/SA01/14.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
MartÃn del Rey, A. (2015). A Method to Encrypt \(3\)D Solid Objects Based on Three-Dimensional Cellular Automata. In: Onieva, E., Santos, I., Osaba, E., Quintián, H., Corchado, E. (eds) Hybrid Artificial Intelligent Systems. HAIS 2015. Lecture Notes in Computer Science(), vol 9121. Springer, Cham. https://doi.org/10.1007/978-3-319-19644-2_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-19644-2_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19643-5
Online ISBN: 978-3-319-19644-2
eBook Packages: Computer ScienceComputer Science (R0)