Abstract
Language | English |
---|---|
Pages | 409-422 |
Number of pages | 14 |
Journal | IEEE Transactions on Information Forensics and Security |
Volume | 10 |
Issue number | 2 |
DOIs | |
Publication status | Published - Feb 2015 |
Externally published | Yes |
Fingerprint
Keywords
- 3D object encryption
- geometry deformation
- permutation
- geometric rotation
- cryptanalysis
- statistical analysis
Cite this
}
A 3D object encryption scheme which maintains dimensional and spatial stability. / Jolfaei, Alireza; Wu, Xin-Wen; Muthukkumarasamy, Vallipuram.
In: IEEE Transactions on Information Forensics and Security, Vol. 10, No. 2, 02.2015, p. 409-422.Research output: Contribution to journal › Article › Research › peer-review
TY - JOUR
T1 - A 3D object encryption scheme which maintains dimensional and spatial stability
AU - Jolfaei, Alireza
AU - Wu, Xin-Wen
AU - Muthukkumarasamy, Vallipuram
PY - 2015/2
Y1 - 2015/2
N2 - Due to widespread applications of 3D vision technology, the research into 3D object protection is primarily important. To maintain confidentiality, encryption of 3D objects is essential. However, the requirements and limitations imposed by 3D objects indicate the impropriety of conventional cryptosystems for 3D object encryption. This suggests the necessity of designing new ciphers. In addition, the study of prior works indicates that the majority of problems encountered with encrypting 3D objects are about point cloud protection, dimensional and spatial stability, and robustness against surface reconstruction attacks. To address these problems, this paper proposes a 3D object encryption scheme, based on a series of random permutations and rotations, which deform the geometry of the point cloud. Since the inverse of a permutation and a rotation matrix is its transpose, the decryption implementation is very efficient. Our statistical analyses show that within the cipher point cloud, points are randomly distributed. Furthermore, the proposed cipher leaks no information regarding the geometric structure of the plain point cloud, and is also highly sensitive to the changes of the plaintext and secret key. The theoretical and experimental analyses demonstrate the security, effectiveness, and robustness of the proposed cipher against surface reconstruction attacks.
AB - Due to widespread applications of 3D vision technology, the research into 3D object protection is primarily important. To maintain confidentiality, encryption of 3D objects is essential. However, the requirements and limitations imposed by 3D objects indicate the impropriety of conventional cryptosystems for 3D object encryption. This suggests the necessity of designing new ciphers. In addition, the study of prior works indicates that the majority of problems encountered with encrypting 3D objects are about point cloud protection, dimensional and spatial stability, and robustness against surface reconstruction attacks. To address these problems, this paper proposes a 3D object encryption scheme, based on a series of random permutations and rotations, which deform the geometry of the point cloud. Since the inverse of a permutation and a rotation matrix is its transpose, the decryption implementation is very efficient. Our statistical analyses show that within the cipher point cloud, points are randomly distributed. Furthermore, the proposed cipher leaks no information regarding the geometric structure of the plain point cloud, and is also highly sensitive to the changes of the plaintext and secret key. The theoretical and experimental analyses demonstrate the security, effectiveness, and robustness of the proposed cipher against surface reconstruction attacks.
KW - 3D object encryption
KW - geometry deformation
KW - permutation
KW - geometric rotation
KW - cryptanalysis
KW - statistical analysis
UR - http://www.scopus.com/inward/record.url?scp=84921373750&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2014.2378146
DO - 10.1109/TIFS.2014.2378146
M3 - Article
VL - 10
SP - 409
EP - 422
JO - IEEE Transactions on Information Forensics and Security
T2 - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
SN - 1556-6013
IS - 2
ER -