A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks

被引:7
|
作者
Qin, Shiyue [1 ]
Tan, Zhenhua [2 ]
Zhou, Fucai [2 ]
Xu, Jian [2 ]
Zhang, Zongye [2 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang, Peoples R China
[2] Northeastern Univ, Software Coll, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
CELLULAR-AUTOMATA;
D O I
10.1155/2021/6629726
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development and innovation of new techniques for 5G, 5G networks can provide extremely large capacity, robust integrity, high bandwidth, and low latency for multimedia image sharing and storage. However, it will surely exacerbate the privacy problems intrinsic to image transformation. Due to the high security and reliability requirements for storing and sharing sensitive images in the 5G network environment, verifiable steganography-based secret image sharing (SIS) is attracting increasing attention. The verifiable capability is necessary to ensure the correct image reconstruction. From the literature, efficient cheating verification, lossless reconstruction, low reconstruct complexity, and high-quality stego images without pixel expansion are summarized as the primary goals of proposing an effective steganography-based SIS scheme. Compared with the traditional underlying techniques for SIS, cellular automata (CA) and matrix projection have more strengths as well as some weaknesses. In this paper, we perform a complimentary of these two techniques to propose a verifiable secret image sharing scheme, where CA is used to enhance the security of the secret image, and matrix projection is used to generate shadows with a smaller size. From the steganography perspective, instead of the traditional least significant bits replacement method, matrix encoding is used in this paper to improve the embedding efficiency and stego image quality. Therefore, we can simultaneously achieve the above goals and achieve proactive and dynamic features based on matrix projection. Such features can make the proposed SIS scheme more applicable to flexible 5G networks. Finally, the security analysis illustrates that our scheme can effectively resist the collusion attack and detect the shadow tampering over the persistent adversary. The analyses for performance and comparative demonstrate that our scheme is a better performer among the recent schemes with the perspective of functionality, visual quality, embedding ratio, and computational efficiency. Therefore, our scheme further strengthens security for the images in 5G networks.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks
    Wang, Qiuhua
    Kang, Mingyang
    Wu, Guohua
    Ren, Yizhi
    Su, Chunhua
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (02) : 230 - 238
  • [42] Verifiable Rational Multi-secret Sharing Scheme
    Cai, Yongquan
    Luo, Zhanhai
    Yang, Yi
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
  • [43] A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least Significant Bits Construction
    Hu, Wei-Tong
    Li, Ming-Chu
    Guo, Cheng
    Yuan, Li-Feng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [44] A verifiable threshold secret image sharing (SIS) scheme with combiner verification and cheater identification
    Soreng A.V.
    Kandar S.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (08) : 10631 - 10655
  • [45] A practical verifiable multi-secret sharing scheme
    Zhao, Jianjie
    Zhang, Jianzhong
    Zhao, Rong
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
  • [46] Verifiable threshold multi-secret sharing scheme
    Pang, Liao-Jun
    Li, Hui-Xian
    Li, Zhi-Jie
    Wang, Yu-Min
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
  • [47] Verifiable Secret Sharing Scheme Using Hash Values
    Imai, Junta
    Mimura, Mamoru
    Tanaka, Hidema
    2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 405 - 409
  • [48] A Verifiable E-voting Scheme with Secret Sharing
    Yuan, Lifeng
    Li, Mingchu
    Guo, Cheng
    Hu, Weitong
    Tan, Xing
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 304 - 308
  • [49] Secure and verifiable vector space secret sharing scheme
    Xiao, QH
    Ping, LD
    Pan, XZ
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 689 - 693
  • [50] A verifiable multi-secret sharing scheme (VMSS)
    Pang Liaojun
    Li Huixian
    Jiao Licheng
    Wang Yumin
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 749 - +