A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks

被引:7
|
作者
Qin, Shiyue [1 ]
Tan, Zhenhua [2 ]
Zhou, Fucai [2 ]
Xu, Jian [2 ]
Zhang, Zongye [2 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
CELLULAR-AUTOMATA;
D O I
10.1155/2021/6629726
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development and innovation of new techniques for 5G, 5G networks can provide extremely large capacity, robust integrity, high bandwidth, and low latency for multimedia image sharing and storage. However, it will surely exacerbate the privacy problems intrinsic to image transformation. Due to the high security and reliability requirements for storing and sharing sensitive images in the 5G network environment, verifiable steganography-based secret image sharing (SIS) is attracting increasing attention. The verifiable capability is necessary to ensure the correct image reconstruction. From the literature, efficient cheating verification, lossless reconstruction, low reconstruct complexity, and high-quality stego images without pixel expansion are summarized as the primary goals of proposing an effective steganography-based SIS scheme. Compared with the traditional underlying techniques for SIS, cellular automata (CA) and matrix projection have more strengths as well as some weaknesses. In this paper, we perform a complimentary of these two techniques to propose a verifiable secret image sharing scheme, where CA is used to enhance the security of the secret image, and matrix projection is used to generate shadows with a smaller size. From the steganography perspective, instead of the traditional least significant bits replacement method, matrix encoding is used in this paper to improve the embedding efficiency and stego image quality. Therefore, we can simultaneously achieve the above goals and achieve proactive and dynamic features based on matrix projection. Such features can make the proposed SIS scheme more applicable to flexible 5G networks. Finally, the security analysis illustrates that our scheme can effectively resist the collusion attack and detect the shadow tampering over the persistent adversary. The analyses for performance and comparative demonstrate that our scheme is a better performer among the recent schemes with the perspective of functionality, visual quality, embedding ratio, and computational efficiency. Therefore, our scheme further strengthens security for the images in 5G networks.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] A Lossless Secret Image Sharing Scheme Based on Steganography
    Li, Li
    Abd El-Latif, Ahmed A.
    Yan, Xuehu
    Wang, Shen
    Niu, Xiamu
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1247 - 1250
  • [2] A Verifiable Secret Image Sharing Scheme Based on Compressive Sensing
    LI Xinyan
    XIAO Di
    MOU Huajian
    ZHANG Rui
    WuhanUniversityJournalofNaturalSciences, 2018, 23 (03) : 219 - 224
  • [3] A Secure Verifiable Scheme for Secret Image Sharing
    Rose, Angel A.
    Thampi, Sabu M.
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTER VISION AND THE INTERNET (VISIONNET'15), 2015, 58 : 140 - 150
  • [4] Verifiable Rational Secret Sharing Scheme in Mobile Networks
    Zhang, En
    Yuan, Peiyan
    Du, Jiao
    MOBILE INFORMATION SYSTEMS, 2015, 2015
  • [5] Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem
    Dehkordi, Massoud Hadian
    Mashhadi, Samaneh
    Farahi, Seyed Taghi
    Noorallahzadeh, Mohammad Hossein
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (02) : 1099 - 1118
  • [6] A verifiable multi-secret image sharing scheme based on DNA encryption
    Chattopadhyay A.K.
    Saha S.
    Nag A.
    Singh J.P.
    Multimedia Tools and Applications, 2025, 84 (4) : 1967 - 1983
  • [7] A new approach of Secret Image Sharing using Verifiable Scheme
    Rao, Jyoti
    Venny, Priya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1134 - 1139
  • [8] A verifiable threshold secret sharing scheme based on lattices
    Rajabi, Bahman
    Eslami, Ziba
    INFORMATION SCIENCES, 2019, 501 : 655 - 661
  • [9] A new (k, n) verifiable secret image sharing scheme (VSISS)
    Nag, Amitava
    Biswas, Sushanta
    Sarkar, Debasree
    Sarkar, Partha Pratim
    EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (03) : 201 - 209
  • [10] Meaningful Secret Image Sharing Scheme with High Visual Quality Based on Natural Steganography
    Sun, Yuyuan
    Lu, Yuliang
    Chen, Jinrui
    Zhang, Weiming
    Yan, Xuehu
    MATHEMATICS, 2020, 8 (09)