A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks

被引:7
|
作者
Qin, Shiyue [1 ]
Tan, Zhenhua [2 ]
Zhou, Fucai [2 ]
Xu, Jian [2 ]
Zhang, Zongye [2 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
CELLULAR-AUTOMATA;
D O I
10.1155/2021/6629726
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development and innovation of new techniques for 5G, 5G networks can provide extremely large capacity, robust integrity, high bandwidth, and low latency for multimedia image sharing and storage. However, it will surely exacerbate the privacy problems intrinsic to image transformation. Due to the high security and reliability requirements for storing and sharing sensitive images in the 5G network environment, verifiable steganography-based secret image sharing (SIS) is attracting increasing attention. The verifiable capability is necessary to ensure the correct image reconstruction. From the literature, efficient cheating verification, lossless reconstruction, low reconstruct complexity, and high-quality stego images without pixel expansion are summarized as the primary goals of proposing an effective steganography-based SIS scheme. Compared with the traditional underlying techniques for SIS, cellular automata (CA) and matrix projection have more strengths as well as some weaknesses. In this paper, we perform a complimentary of these two techniques to propose a verifiable secret image sharing scheme, where CA is used to enhance the security of the secret image, and matrix projection is used to generate shadows with a smaller size. From the steganography perspective, instead of the traditional least significant bits replacement method, matrix encoding is used in this paper to improve the embedding efficiency and stego image quality. Therefore, we can simultaneously achieve the above goals and achieve proactive and dynamic features based on matrix projection. Such features can make the proposed SIS scheme more applicable to flexible 5G networks. Finally, the security analysis illustrates that our scheme can effectively resist the collusion attack and detect the shadow tampering over the persistent adversary. The analyses for performance and comparative demonstrate that our scheme is a better performer among the recent schemes with the perspective of functionality, visual quality, embedding ratio, and computational efficiency. Therefore, our scheme further strengthens security for the images in 5G networks.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] VSBSIS: A verifiable SVD-based secret image sharing scheme for lossless and efficient reconstruction
    Maity, Krishnendu
    Mukhopadhyay, Susanta
    DISPLAYS, 2023, 78
  • [22] Invertible secret image sharing with steganography
    Lin, Pei-Yu
    Chan, Chi-Shiang
    PATTERN RECOGNITION LETTERS, 2010, 31 (13) : 1887 - 1893
  • [23] A VERIFIABLE MULTI-SECRET SHARING SCHEME
    Wang, Yong
    Zhu, Yanqin
    Luo, Xizhao
    INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS, 2009, : 136 - 138
  • [24] Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks
    Xu, Yan
    Wang, Ming
    Zhong, Hong
    Cui, Jie
    Liu, Lu
    Franqueira, Virginia N. L.
    IEEE ACCESS, 2017, 5 : 12702 - 12713
  • [25] A quantum secret sharing scheme with verifiable function
    Li-Juan Liu
    Zhi-Hui Li
    Zhao-Wei Han
    Dan-Li Zhi
    The European Physical Journal D, 2020, 74
  • [26] Design and analysis of a verifiable secret sharing scheme
    Li, Hui-Xian
    Cai, Wan-Dong
    Pei, Qing-Qi
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2008, 35 (01): : 148 - 151
  • [27] A quantum secret sharing scheme with verifiable function
    Liu, Li-Juan
    Li, Zhi-Hui
    Han, Zhao-Wei
    Zhi, Dan-Li
    EUROPEAN PHYSICAL JOURNAL D, 2020, 74 (07):
  • [28] A New, Publicly Verifiable, Secret Sharing Scheme
    Behnad, A.
    Eghlidos, T.
    SCIENTIA IRANICA, 2008, 15 (02) : 246 - 251
  • [29] A user-friendly secret image sharing scheme with reversible steganography based on cellular automata
    Wu, Xiaotian
    Ou, Duanhao
    Liang, Qiming
    Sun, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (08) : 1852 - 1863
  • [30] A Verifiable (n, n) Secret Image Sharing Scheme Using XOR Operations
    Chattopadhyay, Arup Kumar
    Ghosh, Debalina
    Maitra, Paramita
    Nag, Amitava
    Saha, Himadri Nath
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 1025 - 1031