A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks

被引:7
|
作者
Qin, Shiyue [1 ]
Tan, Zhenhua [2 ]
Zhou, Fucai [2 ]
Xu, Jian [2 ]
Zhang, Zongye [2 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
CELLULAR-AUTOMATA;
D O I
10.1155/2021/6629726
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development and innovation of new techniques for 5G, 5G networks can provide extremely large capacity, robust integrity, high bandwidth, and low latency for multimedia image sharing and storage. However, it will surely exacerbate the privacy problems intrinsic to image transformation. Due to the high security and reliability requirements for storing and sharing sensitive images in the 5G network environment, verifiable steganography-based secret image sharing (SIS) is attracting increasing attention. The verifiable capability is necessary to ensure the correct image reconstruction. From the literature, efficient cheating verification, lossless reconstruction, low reconstruct complexity, and high-quality stego images without pixel expansion are summarized as the primary goals of proposing an effective steganography-based SIS scheme. Compared with the traditional underlying techniques for SIS, cellular automata (CA) and matrix projection have more strengths as well as some weaknesses. In this paper, we perform a complimentary of these two techniques to propose a verifiable secret image sharing scheme, where CA is used to enhance the security of the secret image, and matrix projection is used to generate shadows with a smaller size. From the steganography perspective, instead of the traditional least significant bits replacement method, matrix encoding is used in this paper to improve the embedding efficiency and stego image quality. Therefore, we can simultaneously achieve the above goals and achieve proactive and dynamic features based on matrix projection. Such features can make the proposed SIS scheme more applicable to flexible 5G networks. Finally, the security analysis illustrates that our scheme can effectively resist the collusion attack and detect the shadow tampering over the persistent adversary. The analyses for performance and comparative demonstrate that our scheme is a better performer among the recent schemes with the perspective of functionality, visual quality, embedding ratio, and computational efficiency. Therefore, our scheme further strengthens security for the images in 5G networks.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Verifiable (2, n) Image Secret Sharing Scheme Using Sudoku Matrix
    Chen, Yi-Hui
    Lee, Jia-Ye
    Chiang, Min-Hsien
    Chen, Shih-Hsin
    SYMMETRY-BASEL, 2022, 14 (07):
  • [32] A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme
    Wang, Lingfu
    Wang, Jing
    Zhang, Mingwu
    Huang, Weijia
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT III, 2022, 13157 : 411 - 431
  • [33] A secret sharing scheme for EBTC using steganography
    Cheonshik Kim
    Dongkyoo Shin
    Dongil Shin
    Raylin Tso
    Chin-Nung Yang
    Journal of Intelligent Manufacturing, 2014, 25 : 241 - 249
  • [34] A secret sharing scheme for EBTC using steganography
    Kim, Cheonshik
    Shin, Dongkyoo
    Shin, Dongil
    Tso, Raylin
    Yang, Chin-Nung
    JOURNAL OF INTELLIGENT MANUFACTURING, 2014, 25 (02) : 241 - 249
  • [35] A Practical Publicly Verifiable Secret Sharing Scheme Based on Bilinear Pairing
    Tian, Youliang
    Peng, Changgen
    Zhang, Renping
    Chen, Yuling
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 71 - 75
  • [36] Verifiable Image Secret Sharing with Cheater Identification
    Patil, Sonali D.
    Ithape, Priya K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1238 - 1241
  • [37] Publicly verifiable secret sharing scheme based on the Chinese Remainder Theorem
    Jia, Xingxing
    Wang, Daoshun
    Wu, Yujiang
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1945 - +
  • [38] A verifiable multi-secret sharing scheme based on cellular automata
    Eslami, Z.
    Ahmadabadi, J. Zarepour
    INFORMATION SCIENCES, 2010, 180 (15) : 2889 - 2894
  • [39] Verifiable quantum secret sharing scheme based on orthogonal product states
    白晨明
    刘璐
    张素娟
    Chinese Physics B, 2024, 33 (07) : 188 - 198
  • [40] Verifiable quantum secret sharing scheme based on orthogonal product states
    Bai, Chen-Ming
    Liu, Lu
    Zhang, Sujuan
    CHINESE PHYSICS B, 2024, 33 (07)