A generative 3D asset encryption scheme with tiered visual effect after decryption

Zhongshuai WANG , Ruoyu ZHAO , Jiahao LI , Yiming WANG , Yushu ZHANG , Rushi LAN , Xiaonan LUO

Front. Comput. Sci. ›› 2026, Vol. 20 ›› Issue (10) : 2010811

PDF (3147KB)
Front. Comput. Sci. ›› 2026, Vol. 20 ›› Issue (10) : 2010811 DOI: 10.1007/s11704-025-50333-z
Information Security
RESEARCH ARTICLE

A generative 3D asset encryption scheme with tiered visual effect after decryption

Author information +
History +
PDF (3147KB)

Abstract

Generative artificial intelligence is capable of generating high-quality, fine-grained 3D assets with realistic visual effects. These 3D assets are often utilized in various scenarios that demand different levels of security permissions. As such, they need to display tiered visual effects while ensuring that the content remains protected. Recently, several researchers have proposed that traditional security encryption methods might not be sufficient to fulfill these requirements. We conduct an in-depth analysis of the structure of generative 3D assets and their visually salient features. Based on this analysis, we propose an encryption scheme for generative 3D assets that achieves tiered visual effects upon decryption. Specifically, a novel coordinate fine-grained regularization method is employed to partition different sub blocks, and ring encryption is implemented, followed by generating keys at different levels, ultimately constructing an encryption scheme with tiered visual effects. Experimental results demonstrate that the proposed scheme not only meets diverse security requirements but also effectively addresses the complexity issues in processing large-scale 3D assets.

Graphical abstract

Keywords

generative artificial intelligence / 3D asset security / 3D model encryption / visual effect

Cite this article

Download citation ▾
Zhongshuai WANG, Ruoyu ZHAO, Jiahao LI, Yiming WANG, Yushu ZHANG, Rushi LAN, Xiaonan LUO. A generative 3D asset encryption scheme with tiered visual effect after decryption. Front. Comput. Sci., 2026, 20(10): 2010811 DOI:10.1007/s11704-025-50333-z

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Li C, Zhang C, Cho J, Waghwase A, Lee L H, Rameau F, Yang Y, Bae S H, Hong C S. Generative AI meets 3D: a survey on text-to-3D in AIGC era. 2023, arXiv preprint arXiv: 2305.06131

[2]

Li X, Zhang Q, Kang D, Cheng W, Gao Y, Zhang J, Liang Z, Liao J, Cao Y P, Shan Y. Advances in 3D generation: a survey. 2024, arXiv preprint arXiv: 2401.17807

[3]

Jun H, Nichol A. Shap-E: generating conditional 3D implicit functions. 2023, arXiv preprint arXiv: 2305.02463

[4]

Wang M . Integrating 2D and 3D in game development: design and technology collaboration. Applied and Computational Engineering, 2024, 110: 170–174

[5]

Yang X . 3D animation production and design based on digital media technology. Procedia Computer Science, 2024, 247: 1207–1214

[6]

Schiavi B, Havard V, Beddiar K, Baudry D . BIM data flow architecture with AR/VR technologies: use cases in architecture, engineering and construction. Automation in Construction, 2022, 134: 104054

[7]

Behravan M. Generative AI framework for 3D object generation in augmented Reality. 2025, arXiv preprint arXiv: 2502.15869

[8]

Singh G, Hu T, Akbari M, Tang Q, Zhang Y. Towards Secure and Usable 3D Assets: A Novel Framework forAutomatic Visible Watermarking. arXiv e-prints, 2024, arXiv:2409.0031

[9]

Farlow H, Sadhani T, Garratt M, Mount G, Lynar T. Deceive, disrupt, disclose: The 3d model for ai security. In: International Conference on Information Technology and Applications. 2024, 435–443

[10]

Hamza N A, Jafeer S H, Ali A E. Encrypt 3D model using transposition, substitution, folding, and shifting (TSFS). In: Proceedings of the 2nd Scientific Conference of Computer Sciences. 2019, 126–131

[11]

Beugnon S, Puech W, Pedeboy J P. From visual confidentiality to transparent format-compliant selective encryption of 3D objects. In: Proceedings of 2018 IEEE International Conference on Multimedia & Expo Workshops. 2018, 1–6

[12]

van Rensburg B J, Puech W, Pedeboy J P . A format compliant encryption method for 3D objects allowing hierarchical decryption. IEEE Transactions on Multimedia, 2023, 25: 7196–7207

[13]

Bala M, Cui Y, Ding Y, Ge Y, Hao Z, Hasselgren J, Huffman J, Jin J, Lewis J P, Li Z, Lin C H, Lin Y C, Lin T Y, Liu M Y, Luo A, Ma Q, Munkberg J, Shi S, Wei F, Xiang D, Xu J, Zeng X, Zhang Q. Edify 3D: scalable high-quality 3D asset generation. 2024, arXiv preprint arXiv: 2411.07135

[14]

Xiang J, Lv Z, Xu S, Deng Y, Wang R, Zhang B, Chen D, Tong X, Yang J. Structured 3D latents for scalable and versatile 3D generation. 2024, arXiv preprint arXiv: 2412.01506

[15]

Yang X, Shi H, Zhang B, Yang F, Wang J, Zhao H, Liu X, Wang X, Lin Q, Yu J, Wang L, Xu J, He Z, Chen Z, Liu S, Wu J, Lian Y, Yang S, Liu Y, Yang Y, Wang D, Jiang J, Guo C. Hunyuan3D 1.0: a unified framework for text-to-3D and image-to-3D generation. 2024, arXiv preprint arXiv: 2411.02293

[16]

Dong W, Yang B, Ma L, Liu X, Cui L, Bao H, Ma Y, Cui Z. Coin3D: controllable and interactive 3D assets generation with proxy-guided conditioning. In: Proceedings of the ACM SIGGRAPH 2024 Conference Papers. 2024

[17]

Chen Z, Tang J, Dong Y, Cao Z, Hong F, Lan Y, Wang T, Xie H, Wu T, Saito S, Pan L, Lin D, Liu Z. 3DTopia-XL: scaling high-quality 3D asset generation via primitive diffusion. 2024, arXiv preprint arXiv: 2409.12957

[18]

Golda A, Mekonen K, Pandey A, Singh A, Hassija V, Chamola V, Sikdar B . Privacy and security concerns in generative AI: a comprehensive survey. IEEE Access, 2024, 12: 48126–48144

[19]

Jolfaei A, Wu X W, Muthukkumarasamy V . A 3D object encryption scheme which maintains dimensional and spatial stability. IEEE Transactions on Information Forensics and Security, 2015, 10( 2): 409–422

[20]

Wang X, Xu M, Li Y . Fast encryption scheme for 3D models based on chaos system. Multimedia Tools and Applications, 2019, 78( 23): 33865–33884

[21]

Liang Y, He F, Li H . An asymmetric and optimized encryption method to protect the confidentiality of 3D mesh model. Advanced Engineering Informatics, 2019, 42: 100963

[22]

Gao S, Wu R, Wang X, Wang J, Li Q, Wang C, Tang X . A 3D model encryption scheme based on a cascaded chaotic system. Signal Processing, 2023, 202: 108745

[23]

Cho M, Kim S, Sung M, On G. 3D fingerprinting and encryption principle for collaboration. In: Proceedings of 2006 Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution. 2006, 121–127

[24]

Gschwandtner M, Uhl A. Protected progressive meshes. In: Proceedings of the 5th International Symposium on Advances in Visual Computing: Part II. 2009, 35–48

[25]

Éluard M, Maetz Y, Doërr G. Geometry-preserving encryption for 3D meshes. In: Proceedings of the Compression et Représentation des Signaux Audiovisuels. 2013

[26]

Li S, Zhao R, Guan Q, Chen J, Zhang Y . A 3D model encryption method supporting adaptive visual effects after decryption. Advanced Engineering Informatics, 2024, 59: 102319

[27]

Zhao R, Zhang Y, Li S, Wen W, Yi S, Lan R . 3D mesh encryption with differentiated visual effect and high efficiency based on chaotic system. Expert Systems with Applications, 2024, 238: 122140

[28]

Gilbert H, Handschuh H. Security analysis of SHA-256 and sisters. In: Proceedings of the 10th Annual International Workshop Selected Areas in Cryptography. 2004

[29]

Sklavos N. Book review: stallings, w. cryptography and network security: Principles and practice: 6th ed. Upper Saddle River, NJ: Prentice Hall, 2013, 752p., $142.40. ISBN: 13: 978-0133354690. Information Security Journal: A Global Perspective, 2014, 23(1–2): 1–2

[30]

Levoy M, Curless B. The Stanford 3D scanning repository. See graphics.stanford.edu/data/3Dscanrep/ website, 2005

[31]

Chen X, Golovinskiy A, Funkhouser T . A benchmark for 3D mesh segmentation. ACM Transactions on Graphics (TOG), 2009, 28( 3): 73

[32]

Lian Z, Zhang J, Choi S, ElNaghy H, El-Sana J, Furuya T, Giachetti A, Güler R A, Lai L, Li C, Li H, Limberger F A, Martin R R, Nakanishi R U, Neto A, Nonato L G, Ohbuchi R, Pevzner K, Pickup D, Rosin P L, Sharf A, Sun L, Sun X, Tari S, Ünal G, Wilson R C. Non-rigid 3D shape retrieval. In: Proceedings of the 8th Eurographics Workshop on 3D Object Retrieval, 3DOR@Eurographics 2015. 2015, 107–120

RIGHTS & PERMISSIONS

Higher Education Press

AI Summary AI Mindmap
PDF (3147KB)

Supplementary files

Highlights

355

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/