ORIGINAL RESEARCH article

Front. Phys., 30 September 2022

Sec. Interdisciplinary Physics

Volume 10 - 2022 | https://doi.org/10.3389/fphy.2022.1006324

1D Sine-Map-Coupling-Logistic-Map for 3D model encryption

  • 1. School of Information Engineering, Binzhou University, Binzhou, China

  • 2. School of Information Engineering, Tianjin University of Commerce, Tianjin, China

Article metrics

View details

14

Citations

3,1k

Views

766

Downloads

Abstract

With the rise of technologies of VR technology, AR technology, and 3D printing, the application of 3D models has become more and more extensive. The data of the 3D model is the floating point and has a unique storage format, and the traditional 2D image encryption algorithms are unsuitable for 3D models. Therefore, based on 1D Sine-Map-Coupling-Logistic-Map (1D-SMCLM), a 3D model encryption algorithm is designed in this paper. The 1D-SMCLM is a new chaotic system with large parameter space and good chaotic characteristics. The keystream generated by the 1D-SMCLM has good randomness and is very suitable for cryptographic systems. In the new encryption algorithm (SMCLM-3ME), the vertices of the 3D models are divided into integer and decimal vertices. The integer part is encrypted by the strategy of simultaneous scrambling and diffusion. The 3D ciphertext model is obtained by combining the integer and fractional parts. Experimental results show that the SMCLM-IE exhibits excellent performance.

1 Introduction

With the rapid development of network communication and big data applications, information security has become a critical hot issue [15]. The amount of image data on the Internet continues to grow, and most plaintext images are stored in plaintext, which poses a significant security risk [68]. Protecting the secure transmission of images on the Internet is an urgent security issue [912].

The adjacent pixels of the image has a very strong correlation [1317], and the traditional DES, AES and other algorithms [18] cannot eliminate this correlation, and the efficiency of these algorithms is very low. Currently, many image protection algorithms have been proposed, such as image watermarking technology, image encryption technology, and image steganography technology [1924]. Among them, image encryption technology is one of the most widely used technologies [25, 26]. Image encryption technology can convert plaintext images into ciphertext images with random noise according to specific rules, which has high-security [27, 28].

Chaos, as a nonlinear system, has seemingly random irregular motions [2931], and the behavior of chaos is uncertain, unrepeatable, and unpredictable, which makes chaos and cryptography have many natural connections [3236]. Therefore, many image encryption algorithms are proposed based on chaos. For example, the chaotic image encryption algorithm based on DNA [3739], the chaotic image encryption algorithm based on RNA [40, 41], the chaotic image encryption algorithm based on matrix semi-tensor product [4245], and the chaotic image encryption algorithm based on compressed sensing [46, 47].

With the rise of technologies of VR technology, AR technology, and 3D printing, the application of 3D models has become more and more extensive. The 2D image encryption algorithm based on chaos has matured, and the 3D model encryption algorithm based on chaos is less studied. Unlike 2D images, the data type of 3D models is a floating point and has a unique storage format. Therefore, the 2D image encryption algorithm cannot be transplanted into the 3D model encryption algorithm. Although a few 3D model encryption algorithms have been proposed, they all have some disadvantages [48, 49]. For example, Xu et al. proposed a CTBCS hyperchaotic system, which uses Arnold scrambling and DNA diffusion to encrypt 3D models. The CTBCS generates the keystream required by the cryptosystem. However, the Arnold mapping has certain limitations, and the scrambled image will result in a plaintext image after a finite number of iterations [48]. In order to improve the defects of this algorithm, Chu et al. used the 3D Arnold algorithm to scramble the plaintext image and used RNA in the diffusion. The memristive chaotic system generated the keystream required by the cryptosystem, and the effect of the algorithm seemed to be good. However, the time of the algorithm is prolonged. They are sacrificing time to improve the security of the algorithm [49]. Unlike traditional scrambling and diffusing algorithms, the 3D model encryption algorithm (SMCLM-3ME) proposed in this paper is scrambling and diffusing simultaneously, which is fast and has high security.

Although high-dimensional chaotic systems have high dynamic behavior, the cost is that the generation speed of the key stream is plodding, and their complex structure makes them difficult to be applied in industrial production [5054]. Therefore, making a low-dimensional chaotic system generate complex dynamic behavior is essential to increasing a cryptographic system’s security. This paper proposes a new one-dimensional chaotic system 1D Sine-Map-Coupling-Logistic-Map (1D-SMCLM) based on Sin Map [55] and Logistic Map [56]. Compared with Sin and Logistic maps, 1D-SMCLM has a larger parameter space. As well as better kinetic behavior, the resulting sequences have good randomness and are therefore very suitable for cryptography. In SMCLM-3ME, the 1D-SMCLM is used to generate a random keystream.

The remaining chapters of this paper are organized as follows. Section 2 introduces the 1D-SMCLM and analyzes its chaotic behavior. Section 3 introduces the SMCLM-3ME algorithm. Section 4 simulates and analyzes the security of the SMCLM-3ME. Finally, the whole paper is concluded in Section 5.

2 1D-SMCLM

The 1D-SMCLM is the coupling of two classical one-dimensional chaotic maps (Sin Map and Logistic Map). The Sin Map is defined as,where φ is the control parameter of the Sin Map. The Logistic Map is defined as,where γ is the control parameter of the Logistic Map.

The simple structure of Sin Map and Logistic Map can produce complex chaotic behavior, so they are widely used in chaotic image encryption. However, they have some defects, the space of their control parameters is small, and the parameter space in the chaotic state is discontinuous, which will reduce the security of the cryptosystem. Therefore, we propose a new one-dimensional chaotic system (1D-SMCLM), which is defined as,where φ and γ are the control parameters of the 1D-SMCLM, γR+ and φR+. x0 is the initial value of the 1D-SMCLM.

2.1 Trajectory analysis

The trajectory of a nonlinear dynamical system describes the iterative changes. The larger the area of the image space occupied by the trajectory of the nonlinear dynamical system, the better the performance of the sequence generated by this system. The trajectory analysis of the 1D-SMCLM is shown in Figure 1 and Figure 2 in different parameter spaces. The trajectory analysis in this paper includes two-dimensional trajectory analysis and three-dimensional trajectory analysis. The initial value of the 1D-SMCLM is x0 = 0.32498324654.

FIGURE 1

FIGURE 1

2D trajectory analysis of 1D-SMCLM. (A)φ = 2.3, γ = 3.9. (B)φ = 3, γ = 5.9. (C)φ = 5, γ = 7. (D)φ = 10, γ = 10.

FIGURE 2

FIGURE 2

3D trajectory analysis of 1D-SMCLM. (A)φ = 2.3, γ = 3.9. (B)φ = 3, γ = 5.9. (C)φ = 5, γ = 7. (D)φ = 10, γ = 10.

Consists of 2D trajectory and 3D trajectory of the 1D-SMCLM. When φ is small, the sequences generated by the 1D-SMCLM have weak performance, and as φ gradually increases, the performance of sequences generated by the 1D-SMCLM gradually increases. In addition, the trajectories of Sin Map and Logistic Map are shown in Figure 3 and Figure 4.

FIGURE 3

FIGURE 3

Trajectory analysis of Sin Map. (A) 2D trajectory analysis with φ = 2.3. (B) 3D trajectory analysis with φ = 2.3. (C) 2D trajectory analysis with φ = 10. (D) 3D trajectory analysis with φ = 10.

FIGURE 4

FIGURE 4

Trajectory analysis of Logistic Map. (A) 2D trajectory analysis with γ = 3.9. (B) 3D trajectory analysis with γ = 3.9. (C) 2D trajectory analysis with γ = 10. (D) 3D trajectory analysis with γ = 10.

Under the same parameters, the 1D-SMCLM exhibits better performance compared to Sin Map and Logistic Map. The trajectory of the 1D-SMCLM fills almost the entire phase space. Therefore, it can be shown that the sequences generated by the 1D-SMCLM have better performance than Sin Map and Logistic Map.

2.2 Lyapunov exponent analysis

Lyapunov exponents is an important index to evaluate whether the nonlinear dynamic system is in a chaotic state. When LE is greater than 0, it indicates that the nonlinear dynamical system is chaotic at this time. LE is defined as,

The LE analysis of 1D-SMCLM is shown in Figure 5.

FIGURE 5

FIGURE 5

LE analysis of 1D-SMCLM. (A)φ = 2.3. (B)φ = 3. (C)φ = 5. (D)φ = 10.

When φ = 2.3, at γ = 0.5501, γ = 1.4001, and γ = 7.001, the 1D-SMCLM is in a non-chaotic state, with the φ gradual increase of, this non-chaotic phenomenon gradually disappears. When φ = 5, the 1D-SMCLM is almost global chaotic, which means that the parameter of 1D-SMCLM can be selected is γR+. In addition, the LE analysis of Sin Map and Logistic Map are shown in Figure 6. The parameter space of the Sin Map in chaotic state is discontinuous, while the parameter space of the Logistic Map in chaotic state is very small. The 1D-SMCLM addresses the advantages of both systems and exhibits excellent performance. 1D-SMCLM addresses the shortcomings of these two systems and exhibits excellent performance. The 1D-SMCLM can generate better random sequences.

FIGURE 6

FIGURE 6

LE analysis of Sin Map and Logistic Map. (A) LE of Sin Map. (B) LE of Logistic Map.

2.3 NIST statistical test suite

National Institute of Standards and Technology (NIST) suit is used to test the random performance of the chaotic sequence generated by chaos. NIST statistical test of the 1D-SMCLM is shown in Table 1. The test results show that the 1D-SMCLM can generate chaotic sequences with good randomness.

TABLE 1

NumberStatistical testφ = 2.3, γ = 3.9φ = 3, γ = 5.9
p-valueResultp-valueResult
1Longest run of ones0.883171Pass0.419021Pass
2Overlapping template matching0.534146Pass0.494392Pass
3Random excursions variant0.888137Pass0.739918Pass
4Rank0.013569Pass0.657933Pass
5Frequency0.494392Pass0.319084Pass
6Universal0.289667Pass0.122325Pass
7Random excursions0.964295Pass0.671779Pass
8Block frequency0.883171Pass0.455937Pass
9Cumulative sums0.574903Pass0.911413Pass
10Runs0.699313Pass0.779188Pass
11Serial0.739918Pass0.616305Pass
12Spectral0.657933Pass0.289667Pass
13Approximate entropy0.779188Pass0.236810Pass
14Non-overlapping template matching0.816537Pass0.779188Pass
15Linear complexity0.534146Pass0.534146Pass

NISTtest of 1D-SMCLM.

2.4 0–1 test

The 0–1 test is another random number test, the 0–1 test is defined as,

When a sequence has good randomness, its 0–1 test graph exhibits a Boolean motion state. When the sequence has no randomness, its 0–1 test graph is clustered. The 0–1 test of the 1D-SMCLM is shown in Figure 7.

FIGURE 7

FIGURE 7

0–1 test. (A)φ = 2.3, γ = 3.9. (B)φ = 3, γ = 5.9. (C)φ = 5, γ = 7. (D)φ = 2.3γ = 0.1.

Figures 7A–C are Boolean motion states, and the corresponding the 1D-SMCLM is a chaotic state at this time. Figure 7D is the Boolean motion state, corresponding to the periodic state of the 1D-SMCLM. The 0–1 test shows that the 1D-SMCLM has good performance and can generate random sequences.

3 SMCLM-3ME

Unlike 2D images, the data type of 3D images is a floating point type. Traditional 2D image encryption algorithms cannot be ported to 3D model encryption. Because the 1D-SMCLM has good performance, we propose a new 3D model encryption algorithm based on the 1D-SMCLM, called SMCLM-3ME. The structure diagram of the SMCLM-3ME is shown in Figure 8.

FIGURE 8

FIGURE 8

Structure diagram of SMCLM-3ME.

3.1 3D model processing

The encrypted objects of SMCLM-3ME are in Stereolithography (STL) format. A 3D model in STL format is composed of multiple triangular faces. The vertex coordinates in 3D space determine the shape of the 3D model. The vertex coordinates of the 3D model are represented as, Pi = {xi, yi, zi}.

In SMCLM-3ME, the 3D model is first normalized, so that the vertex coordinates are mapped to between [0, 255], and the normalization method is shown in Eq. 6,

The 3D model dataset is selected from http://www.3dwhere.com. The 3D model is normalized as shown in Figure 9.

FIGURE 9

FIGURE 9

3D models. (A) Topographic map of the United States. (B) Topographic map of South Korea. (C) Topographic map of Colombia. (D) Topographic map of the capital of Australia.

3.2 Key generation

The key of the SMCLM-3ME is generated by a hash function, and the normalized plaintext is used as the input of the hash function. The key generation process is described as follows.

Input: P.

Step 1: The plaintext P is the input of the hash function. The hash-256 function is used to generate a 256-bit secret key K. The other secret key of the SMCLM-3ME is generated by the secret key K.

Step 2: Convert K to array K1, .

Step 3: Convert to by Eq. 7,

Step 4: K2 as the initial value of Logistic Map, the Logistic Map is iterated 30 times to produce the sequence K3 by Eq. 8,

Step 5: The initial key eventually evolves intoOutput: k1, k2, k3 and k4 (k1 ∈ (0, 1), k2 ∈ (0, 1), k3 ∈ (0, 1)], and k4 ∈ (0, 1))

3.3 Encryption algorithm

Different from the traditional image encryption algorithm of scrambling and then diffusing. The Encrypt for 3D model proposed in this paper is scrambling and diffusing at the same time, which increases the security of the algorithm. The encryption process is described as follow.

Input: P.

Step 1: Convert the plaintext P to a new one, that . Divide the floating point number into two parts, the fractional part PO (PO = P mod 1) and the integer part PN (PN = PPO).

Step 2: Generate the secret key of the first keystream by Eq. 10,

Step 3: Generate the first key stream of the cryptosystem by the 1D-SMCLM,where x0 = KN1, φ = KN2, and γ = KN3. When the keystream is generated, the initial point of the iteration needs to be discarded, which is set to 500 in this paper. Then the first keystream is generated which is .

Step 4: Generate the secret key of the second keystream by Eq. 12

Step 5: Generate the second keystream of the cryptosystem by the 1D-SMCLM,where x0 = KN4, φ = KN5, and γ = KN6. Then the second keystream is generated which is .

Step 6: Generate the ordering matrix s required by the cryptosystem. Sort the keystream X1 from small to large to generate a new sorted key stream SX1. Pick elements from SX1 in turn and find the positions of these elements in X1, recorded as S. In addition, a cryptographic matrix D is generated for the cryptosystem, where D = floor(X2 × 1010) mod 256.

Step 7

: The encryption process is described as follow,

  • 1) C(S(1)) = (PN(1) + D (S (1))) mod 256.

  • 2) if i mod 2 = 0, then C(S(i)) = (PN(i) + D (S(i)) + C(S(i − 1))) mod 256, i = 2, 3, 4, … , 3M.

  • 3) if i mod 2 = 1, then .

Step 8: Convert the ciphertext to vertex coordinates in STL format, C = C + PO and .Output: C. The SMCLM-3ME is a symmetric cryptosystem, and the decryption process is the reverse process of encryption. This paper omits the decryption process.

4 Performance analysis

This section analyzes the security of the SMCLM-3ME, including visualization analysis, key analysis, information entropy analysis, statistical analysis, NIST, time analysis, etc.

4.1 Visualization

The visualization analysis results of the SMCLM-3ME are shown in Figure 10. The 3D model selected for visual analysis is shown in Figure 9. Visual analysis includes 3D model encryption and 3D model decryption. Visual analysis results show that SMCLM-3ME has good encryption effect visually and can decrypt without error.

FIGURE 10

FIGURE 10

Visualization of SMCLM-3ME. (A) Encrypted topographic map of the United States. (B) Decrypted topographic map of the United States. (C) Encrypted topographic map of South Korea. (D) Decrypted topographic map of South Korea. (E) Encrypted topographic map of Colombia. (F) Decrypted topographic map of Colombia. (G) Encrypted topographic map of the capital of Australia. (H) Decrypted topographic map of the capital of Australia.

4.2 Key analysis

Key analysis includes key space analysis and key sensitivity analysis. The original key of the SMCLM-3ME is generated by a hash function, and the key space is 2256. When the key space is larger than 2100, the algorithm can resist brute force attacks. Therefore, the SMCLM-3ME has better resistance to brute force attacks.

A secure encryption algorithm cannot decrypt an encrypted image with a wrong key that differs very little from the correct key. The key sensitivity analysis of the SMCLM-3ME is shown in Figure 11. The original key is ψ, and the wrong keys are ψ1, ψ2, ψ3, ψ4 and ψ5. ψ = 3159a982400f77436326b3ebb3c7c5ce844151ef4a89503b0e77136fd6e0f947.ψ1 = 3159a982400f77436326b3ebb3c7c5ce844151ef4a89503b0e77136fd6e0f948.ψ2 = 3159a 982400 f77436326b3ebb3c7c5ce844151ef4a89503b0e77136fd6e0f946.ψ3= 4159a982400f77436326b3ebb3c7c5ce844151ef4a89503 b0e7713 6fd6e0f947.ψ4 = 2159a982400f77436326b3ebb3c7c5ce844151ef 4a89503b0e77136fd6e0f947.ψ5 = 3159a982400f77436326b3ebb 3c7c5ce844251ef4a89503b0e77136fd6e0f947.

FIGURE 11

FIGURE 11

Key sensitivity analysis of SMCLM-3ME. (A) Decrypted by ψ. (B) decrypted by ψ1. (C) Decrypted by ψ2. (D) Decrypted by ψ3. (E) Decrypted by ψ4. (F) Decrypted by ψ5.

The key sensitivity analysis shows that the key of the encryption algorithm is very sensitive. When one bit of the key changes, the obtained encrypted image and decrypted image have a big gap.

4.3 Information entropy analysis

Information entropy is a measure of the chaotic degree of an image. The more chaotic the image, the greater the information entropy. The calculation formula of information entropy is,

The information entropy analysis of the SMCLM-3ME is shown in Table 2. In addition, the information entropy of the SMCLM-3ME is compared with some algorithms (Refs. [49, 59, 60]), the comparison results are shown in Table 3. The information entropy comparison shows that the ciphertext information entropy value of the SMCLM-3ME is closer to the theoretical value than the algorithms in Refs. [49, 59, 60], so the ciphertext of the SMCLM-3ME has better randomness, attackers cannot obtain useful information from the ciphertext.

TABLE 2

3D modelsPlaintextCiphertext
Topographic map of the United States6.77827.9994
Topographic map of South Korea6.63137.9999
Topographic map of Colombia6.49757.9999
Topographic map of the capital of Australia7.07547.9994
Average6.74567.9997

Information entropy of SMCLM-3ME.

TABLE 3

AlgorithmsSMCLM-3MEAlgorithm [49]Algorithm [59]Algorithm [60]
Information entropy7.99977.99887.99807.9959

Information entropy comparison.

4.4 Correlation analysis

A plaintext image has a strong correlation between adjacent pixels, and the purpose of encryption is to eliminate this correlation. The adjacent pixel correlation is defined as,

In the 3D model, correlation analysis is divided into X-direction correlation, Y-direction correlation, and Z-direction correlation. Taking the Topographic map of Colombia as an example, the correlation analysis of the SMCLM-3ME is shown in Figure 12. Taking the Topographic map of South Korea as an example, the correlation analysis of the SMCLM-3ME is shown in Figure 13.

FIGURE 12

FIGURE 12

Correlation analysis of Topographic map of Colombia. (A) X-direction of plaintext. (B) Y-direction of plaintext. (C) Z-direction of plaintext. (D) X-direction of ciphertext. (E) Y-direction of ciphertext. (F) Z-direction of ciphertext.

FIGURE 13

FIGURE 13

Correlation analysis of Topographic map of South Korea. (A) X-direction of plaintext. (B) Y-direction of plaintext. (C) Z-direction of plaintext. (D) X-direction of ciphertext. (E) Y-direction of ciphertext. (F) Z-direction of ciphertext.

The quantitative analysis results of the correlation are shown in Table 4, and the correlation comparison with some algorithms (Refs. [48, 49, 59]) are shown in Table 5.

TABLE 4

ImagePlaintextCiphertext
X-directionY-directionZ-directionX-directionY-directionZ-direction
United States0.99140.99990.8449−0.0050−0.0029−0.0008
South Korea0.94620.96210.97370.00220.0008−0.0011
Colombia0.99960.98800.99890.00100.00080.00009
Capital of Australia0.96390.92540.7848−0.00240.00030.0006
Average0.97530.96890.9006−0.0010−0.0002−0.0003

Correlation coefficients of SMCLM-3ME.

TABLE 5

AlgorithmsSMCLM-3MEAlgorithm [48]Algorithm [49]Algorithm [59]
X-direction−0.00100.0118−0.0055−0.0254
Y-direction−0.00020.00620.0081−0.0097
Z-direction−0.00030.00040.01150.0049

Correlation coefficients comparison.

The correlation analysis results show that the SMCLM-3ME can eliminate the strong correlation between the coordinates of the plaintext, and the correlation of the ciphertext becomes very low. This shows that an attacker cannot use a statistical attack to obtain useful information from the ciphertext to crack the algorithm. The correlation comparison results show that the SMCLM-3ME has lower correlations in all three directions, which indicates that the SMCLM-3ME has better resistance to statistical attacks than the algorithm in Refs. [48, 49, 59].

4.5 NIST statistical test suite

In order to verify whether the ciphertext generated by the SMCLM-3ME is random, the NIST test is used on the ciphertext. When the ciphertext passes the NIST test, it indicates that the distribution of ciphertext values is random. The NIST test results of SMCLM-3ME are shown in Table 6. The test results show that the plaintext is not random, while the ciphertext has passed all 15 tests, indicating that the ciphertext has good randomness. The attacker cannot obtain useful information from the ciphertext, so the SMCLM-3ME has high security.

TABLE 6

NumberStatistical testPlaintextCiphertext
p-valueResultp-valueResult
1Longest run of ones0Fail0.657933Pass
2Overlapping template matching0Fail0.616305Pass
3Random excursions variant0Fail0.931952Pass
4Rank0Fail0.911413Pass
5Frequency0Fail0.319084Pass
6Universal0Fail0.122325Pass
7Random excursions0Fail0.964295Pass
8Block frequency0Fail0.739918Pass
9Cumulative sums0Fail0.971699Pass
10Runs0Fail0.236810Pass
11Serial0Fail0.574903Pass
12Spectral0Fail0.699313Pass
13Approximate entropy0Fail0.108791Pass
14Non-overlapping template matching0Fail0.616305Pass
15Linear complexity0Fail0.739918Pass

Correlation coefficients comparison.

4.6 Robustness analysis

During the transmission process, the image will lose some information or be disturbed by some noise. This section analyzes the ability of the algorithm to resist clipping attacks and noise attacks which are shown in Figure 14.

FIGURE 14

FIGURE 14

Robustness analysis of United States. (A) Ciphertext of data loss 10 groups. (B) Ciphertext of data loss 50 groups. (C) Ciphertext of 0.0001 salt and pepper. (D) Decrypted image of (A). (E) Decrypted image of (B). (F) Decrypted image of (C).

It can be seen from Figure 14 that SMCLM-3ME has good robustness. Even if part of the image data is lost or interfered by some noise during the transmission process, part of the plaintext information can still be obtained through the decryption algorithm.

4.7 Time analysis

The running environment of the SMCLM-3ME is Windows 10, matlab 2020, i3-10105F. The running time of the SMCLM-3ME is shown in Table 7.

TABLE 7

Name of 3D modelsNumber of coordinateTime/s
Topographic map of the United States1,24,4071.059190
Topographic map of South Korea7,23,4326.519195
Topographic map of Colombia2,461,82421.201624
Topographic map of the capital of Australia1,08,3960.945507

Time analysis of SMCLM-3ME.

The encryption time in Ref. [49] is 30.1795 s with 348,282 vertex coordinates, where the encryption time in the SMCLM-3ME is 6.519195 s with 723,432 vertex coordinates. The encryption time in Ref. [57] is 7.59 s with 65,536 pixel values, where the encryption time in the SMCLM-3ME is 0.945507s with 108,396 vertex coordinates. The encryption time in Ref. [58] is 21.5 s with 7,86,432 pixel values, where the encryption time in the SMCLM-3ME is 21.201624 s with 2,461,824 vertex coordinates. The encryption time comparison shows that the SMCLM-3ME has a faster running speed.

4.8 Influence analysis of 1D-SMCLM in SMCLM-3ME

In this section, the influence of 1D-SMCLM in SMCLM-3ME is analyzed. In SMCLM-3ME, Logistic Map and Sin Map are used to replace 1D-SMCLM, respectively, and the performance of the obtained ciphertext is analyzed, as shown in Tables 8, 9, 10.

TABLE 8

ImageX-directionY-directionZ-directionInformation entropy
United States−0.0032−0.0024−0.00317.9995
South Korea0.00160.00200.00097.9999
Colombia0.00040.0005−0.00017.99997
Capital of Australia−0.0066−0.0026−0.00057.9994
Average−0.0019−0.0006−0.00077.9996

Replace 1D-SMCLM with logistic map in SMCLM-3ME.

TABLE 9

ImageX-directionY-directionZ-directionInformation entropy
United States−0.0011−0.00060.00177.9995
South Korea0.0023−0.0002−0.00067.9999
Colombia0.0003−0.0002−0.00097.9998
Capital of Australia−0.0013−0.00240.00277.9994
Average0.0005−0.00080.00077.9997

Replace 1D-SMCLM with sin map in SMCLM-3ME.

TABLE 10

SMCLM-3MEX-directionY-directionZ-directionInformation entropy
SMCLM-3ME with 1D-SMCLM−0.0010−0.0002−0.00037.9997
SMCLM-3ME with Logistic Map−0.0019−0.0006−0.00077.9996
SMCLM-3ME with Sin Map0.00050.00080.00077.9997

Influence analysis of 1D-SMCLM in SMCLM-3ME.

Bold values are the best value among the three methods.

As shown in Tables 8, 9, 10, 1D-SMCLM improves the coding quality of the cryptosystem. On the indicators of the information entropy of the ciphertext and the correlation between the adjacent pixels of the ciphertext, using 1D-SMCLM will make the values of these indicators closer to the theoretical values. It is shown that using 1D-SMCLM in the cryptosystem has better security. In addition, 1D-SMCLM has a larger parameter space, and the parameter space in the chaotic state is continuous, which makes 1D-SMCLM a better choice in cryptosystems.

5 Conclusion

This paper proposes a 3D model encryption algorithm based on the 1D-SMCLM to ensure the network’s safe transmission of 3D models. A 1D-SMCLM is proposed. Through 2D trajectory analysis, 3D trajectory analysis, Lyapunov exponent, NIST statistical test suite, and 0–1 test, it is verified that the 1D-SMCLM has good performance, the parameter space in the chaotic state is continuous, and the sequence has good randomness, which is very suitable for generating the key stream of the cryptosystem. In the encryption phase, the secret key of the cryptosystem is generated by a hash function, which ensures that the algorithm can resist chosen-plaintext attacks. The 3D model is encrypted by the strategy of scrambling and diffusion simultaneously, and the 1D-SMCLM generates the keystream in the encryption stage. Through visual analysis, key analysis, statistical analysis, time analysis, and ciphertext NIST analysis, it is verified that the SMCLM-3ME has good security. The SMCLM-3ME can resist standard attack methods.

The encryption algorithm in this paper is only for 3D models in STL format. Due to the different storage principles of 3D models in different storage formats, in future work, we will try to propose 3D image encryption algorithms in other formats.

Statements

Data availability statement

The raw data supporting the conclusion of this article will be made available by the authors, without undue reservation.

Author contributions

YH: Writing—original draft, Writing—review and editing. XW: Conceptualization, Investigation, Visualization LZ: Methodology, Software.

Funding

Funds for New Generation Information Technology of the Industry-University-Research Innovation Foundation of China University (No. 2020ITA03022).

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher’s note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

References

  • 1.

    FarahMABGuesmiRKachouriASametM. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Opt Laser Technol (2020) 121:105777. 10.1016/j.optlastec.2019.105777

  • 2.

    GaoS.WuR.WangX.WangJ.LiQ.WangC.et alA 3D model encryption scheme based on a cascaded chaotic system. Signal Process (2022) 202:108745. 10.1016/j.sigpro.2022.108745

  • 3.

    HuangXDongYZhuHYeG. Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image. Alexandria Eng J (2022) 61(10): 763747. 10.1016/j.aej.2022.01.015

  • 4.

    GaoXMiaoMChenX. Multi-image encryption algorithm for 2D and 3D images based on chaotic system. Front Phys (2022) 10:498. 10.3389/fphy.2022.901800

  • 5.

    ShaYBuFJahanshahiHWangL. A chaos-based image encryption scheme using the hamming distance and DNA sequence operation. Front Phys (2022) 10:421. 10.3389/fphy.2022.911156

  • 6.

    ToktasAErkanUToktasFYetginZ. Chaotic map optimization for image encryption using triple objective differential evolution algorithm. IEEE Access (2021) 9:12781432. 10.1109/access.2021.3111691

  • 7.

    YangFMouJMaCCaoY. Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application. Opt Lasers Eng (2020) 129:106031. 10.1016/j.optlaseng.2020.106031

  • 8.

    ChaiXFuXGanZLuYChenY. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. (2019) 155:4462. 10.1016/j.sigpro.2018.09.029

  • 9.

    LiuBYeXChenQ. Generating infinitely many coexisting attractors via a new 3D cosine system and its application in image encryption. IEEE Access (2021) 9:136292301. 10.1109/access.2021.3117570

  • 10.

    WangXGaoSYuLSunYSunH. Chaotic image encryption algorithm based on bit-combination scrambling in decimal system and dynamic diffusion. IEEE Access (2019) 7:10366277. 10.1109/access.2019.2931052

  • 11.

    YaoXChenXLiuHSunLHeL. Adaptive sliding-mode synchronization of the memristor-based sixth-order uncertain chaotic system and its application in image encryption. Front Phys (2022) 10:269. 10.3389/fphy.2022.863668

  • 12.

    YuFKongXChenHYuQCaiSHuangYet alA 6D fractional-order memristive hopfield neural network and its application in image encryption. Front Phys (2022) 10:109. 10.3389/fphy.2022.847385

  • 13.

    MirzaeiOYaghoobiMIraniH. A new image encryption method: Parallel sub-image encryption with hyper chaos. Nonlinear Dyn (2012) 67(1):55766. 10.1007/s11071-011-0006-6

  • 14.

    PourasadYRanjbarzadehRMardaniA. A new algorithm for digital image encryption based on chaos theory. Entropy (2021) 23(3):341. 10.3390/e23030341

  • 15.

    SiYLiuHChenY. Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurcation Chaos (2021) 31(10):2150146. 10.1142/s0218127421501467

  • 16.

    SiYLiuHChenY. Constructing a 3D exponential hyperchaotic map with application to PRNG. Int J Bifurcation Chaos (2022) 32(07):2250095. 10.1142/s021812742250095x

  • 17.

    SunJHanGWangY. Dynamical analysis of memcapacitor chaotic system and its image encryption application. Int J Control Autom Syst (2020) 18(5):12429. 10.1007/s12555-019-0015-7

  • 18.

    HsiaoFH. Applying 3DES to chaotic synchronization cryptosystems. IEEE Access (2021) 10:103650. 10.1109/access.2021.3137356

  • 19.

    WangCMaBXiaZLiJLiQShiYQ. Stereoscopic image description with trinion fractional-order continuous orthogonal moments. IEEE Trans Circuits Syst Video Technol (2021) 32(4):19982012. 10.1109/tcsvt.2021.3094882

  • 20.

    WangXLiuP. A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst (2021) 69(3):1291301. 10.1109/tcsi.2021.3133318

  • 21.

    WangXWangXMaBLiQShiYQ. High precision error prediction algorithm based on ridge regression predictor for reversible data hiding. IEEE Signal Process Lett (2021) 28:11259. 10.1109/lsp.2021.3080181

  • 22.

    MaBShiYQ. A reversible data hiding scheme based on code division multiplexing. IEEE Trans Inform Forensic Secur (2016) 11(9):191427. 10.1109/tifs.2016.2566261

  • 23.

    LiQWangXMaBWangXWangCGaoSet alConcealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans Circuits Syst Video Technol (2021) 32:5695706. 10.1109/TCSVT.2021.3138795

  • 24.

    ErkanUToktasAToktasFAleneziF. 2D epi-map for image encryption. Inf Sci (2022) 589:77089. 10.1016/j.ins.2021.12.126

  • 25.

    WangQYuSLiCLuJFangXGuyeuxCet alTheoretical design and FPGA-based implementation of higher-dimensional digital chaotic systems. IEEE Trans Circuits Syst (2016) 63(3):40112. 10.1109/tcsi.2016.2515398

  • 26.

    HuaZZhuZYiSZhangZHuangH. Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf Sci (2021) 546:106383. 10.1016/j.ins.2020.09.032

  • 27.

    YangFMouJLiuJMaCYanH. Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application. Signal Process. (2020) 169:107373. 10.1016/j.sigpro.2019.107373

  • 28.

    OuannasAKaroumaAGrassiGPhamVTLuongVS. A novel secure communications scheme based on chaotic modulation, recursive encryption and chaotic masking. Alexandria Eng J (2021) 60(1):187384. 10.1016/j.aej.2020.11.035

  • 29.

    SunJZhaoXFangJWangY. Autonomous memristor chaotic systems of infinite chaotic attractors and circuitry realization. Nonlinear Dyn (2018) 94(4):287987. 10.1007/s11071-018-4531-4

  • 30.

    SunJShenYYinQXuC. Compound synchronization of four memristor chaotic oscillator systems and secure communication. Chaos (2013) 23(1):013140. 10.1063/1.4794794

  • 31.

    LiuHKadirAXuC. Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos (2020) 30(12):2050173. 10.1142/s0218127420501734

  • 32.

    WangXGaoSYeXShuangZMingxuW. A new image encryption algorithm with cantor diagonal scrambling based on the PUMCML system. Int J Bifurcation Chaos (2021) 31(01):2150003. 10.1142/s0218127421500036

  • 33.

    LiYLiCZhangSChenGZengZ. A Self-reproduction hyperchaotic map with compound lattice dynamics. IEEE Trans Ind Electron (2022) 69(10):1056472. 10.1109/tie.2022.3144592

  • 34.

    LiXMouJXiongLWangZXuJ. Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption. Opt Laser Technol (2021) 140:107074. 10.1016/j.optlastec.2021.107074

  • 35.

    ZhangSLiCZhengJWangXZengZPengX. Generating any number of initial offset-boosted coexisting chua’s double-scroll attractors via piecewise-nonlinear memristor. IEEE Trans Ind Electron (2022) 69(7):720212. 10.1109/tie.2021.3099231

  • 36.

    ZhangSLiCZhengJWangXZengZChenG. Generating any number of diversified hidden attractors via memristor coupling. IEEE Trans Circuits Syst (2021) 68(12):494556. 10.1109/tcsi.2021.3115662

  • 37.

    YangZYuanSLiJBaiXYuZZhouX. An encryption method based on computational ghost imaging with chaotic mapping and DNA encoding. J Opt (2022) 24(6):065702. 10.1088/2040-8986/ac6597

  • 38.

    LiuHWangXkadirA. Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput (2012) 12(5):145766. 10.1016/j.asoc.2012.01.016

  • 39.

    SunJZangMLiuPWangY. A secure communication scheme of three-variable chaotic coupling synchronization based on DNA chemical reaction networks. IEEE Trans Signal Process (2022) 70:236273. 10.1109/tsp.2022.3173154

  • 40.

    MahmudMLeeMChoiJY. Evolutionary-based image encryption using RNA codons truth table. Opt Laser Technol (2020) 121:105818. 10.1016/j.optlastec.2019.105818

  • 41.

    LuY.GongM.HuangZ.ZhangJ.ChaiX.ZhouC.Exploiting compressed sensing (CS) and RNA operations for effective content-adaptive image compression and encryption. Optik (2022) 263:169357. 10.1016/j.ijleo.2022.169357

  • 42.

    WangXGaoS. Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci (2020) 539:195214. 10.1016/j.ins.2020.06.030

  • 43.

    WangXGaoS. Application of matrix semi-tensor product in chaotic image encryption. J Franklin Inst (2019) 356(18):1163867. 10.1016/j.jfranklin.2019.10.006

  • 44.

    ChaiXZhiXGanZZhangYChenYFuJ. Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption. Signal Process. (2021) 183:108041. 10.1016/j.sigpro.2021.108041

  • 45.

    WangXGaoS. A chaotic image encryption algorithm based on a counting system and the semi-tensor product. Multimed Tools Appl (2021) 80(7):1030122. 10.1007/s11042-020-10101-6

  • 46.

    ZhuLJiangDNiJWangXRongXAhmadMet alA stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing. Signal Process. (2022) 195:108489. 10.1016/j.sigpro.2022.108489

  • 47.

    ChaiXWuHGanZHanDZhangYChenY. An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing. Inf Sci (2021) 556:30540. 10.1016/j.ins.2020.10.007

  • 48.

    XuJZhaoCMouJ. A 3D image encryption algorithm based on the chaotic system and the image segmentation. IEEE Access (2020) 8:1459956005. 10.1109/access.2020.3005925

  • 49.

    ChuRZhangSGaoX. A novel 3D image encryption based on the chaotic system and RNA crossover and mutation. Front Phys (2022) 10:57. 10.3389/fphy.2022.844966

  • 50.

    WangYYangF. A fractional-order CNN hyperchaotic system for image encryption algorithm. Phys Scr (2021) 96(3):035209. 10.1088/1402-4896/abd50f

  • 51.

    GaoXYuJBanerjeeSYanHMouJ. A new image encryption scheme based on fractional-order hyperchaotic system and multiple image fusion. Sci Rep (2021) 11(1):1573721. 10.1038/s41598-021-94748-7

  • 52.

    HosnyKMKamalSTDarwishMM. Novel encryption for color images using fractional-order hyperchaotic system. J Ambient Intell Humaniz Comput (2022) 13:97388. 10.1007/s12652-021-03675-y

  • 53.

    LiTZhangD. Hyperchaotic image encryption based on multiple bit permutation and diffusion. Entropy (2021) 23(5):510. 10.3390/e23050510

  • 54.

    ZhangMTongXWangZChenP. Joint lossless image compression and encryption scheme based on CALIC and hyperchaotic system. Entropy (2021) 23(8):1096. 10.3390/e23081096

  • 55.

    BelaziAAbd El-LatifAA. A simple yet efficient S-box method based on chaotic sine map. Optik (2017) 130:143844. 10.1016/j.ijleo.2016.11.152

  • 56.

    MayRM. Simple mathematical models with very complicated dynamics. Nature (1976) 261(5560):45967. 10.1038/261459a0

  • 57.

    ChaiXGanZLuYChenYHanD. A novel image encryption algorithm based on the chaotic system and DNA computing. Int J Mod Phys C (2017) 28(05):1750069. 10.1142/s0129183117500693

  • 58.

    WangXSuYLuoCNianFTengL. Color image encryption algorithm based on hyperchaotic system and improved quantum revolving gate. Multimed Tools Appl (2022) 81(10):1384565. 10.1007/s11042-022-12220-8

  • 59.

    WangXXuMLiY. Fast encryption scheme for 3D models based on chaos system. Multimed Tools Appl (2019) 78(23):3386584. 10.1007/s11042-019-08171-2

  • 60.

    JoshiABKumarDGaffarAMishraD. Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform. Opt Lasers Eng (2020) 133:106139. 10.1016/j.optlaseng.2020.106139

Summary

Keywords

chaotic image encryption, chaos theory, 3D model, cryptography, 1D-SMCLM

Citation

Hu Y, Wang X and Zhang L (2022) 1D Sine-Map-Coupling-Logistic-Map for 3D model encryption. Front. Phys. 10:1006324. doi: 10.3389/fphy.2022.1006324

Received

29 July 2022

Accepted

09 September 2022

Published

30 September 2022

Volume

10 - 2022

Edited by

Karthikeyan Rajagopal, Chennai Institute of Technology, India

Reviewed by

Hongjun Liu, University of Jinan, China

Junwei Sun, Zhengzhou University of Light Industry, China

Updates

Copyright

*Correspondence: Yongsheng Hu,

This article was submitted to Interdisciplinary Physics, a section of the journal Frontiers in Physics

Disclaimer

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.

Outline

Figures

Cite article

Copy to clipboard


Export citation file


Share article

Article metrics