A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks

With the development and innovation of new techniques for 5G, 5G networks can provide extremely large capacity, robust integrity, high bandwidth, and low latency for multimedia image sharing and storage. However, it will surely exacerbate the privacy problems intrinsic to image transformation. Due to the high security and reliability requirements for storing and sharing sensitive images in the 5G network environment, verifiable steganography-based secret image sharing (SIS) is attracting increasing attention. -e verifiable capability is necessary to ensure the correct image reconstruction. From the literature, efficient cheating verification, lossless reconstruction, low reconstruct complexity, and high-quality stego images without pixel expansion are summarized as the primary goals of proposing an effective steganography-based SIS scheme. Compared with the traditional underlying techniques for SIS, cellular automata (CA) and matrix projection have more strengths as well as some weaknesses. In this paper, we perform a complimentary of these two techniques to propose a verifiable secret image sharing scheme, where CA is used to enhance the security of the secret image, and matrix projection is used to generate shadows with a smaller size. From the steganography perspective, instead of the traditional least significant bits replacement method, matrix encoding is used in this paper to improve the embedding efficiency and stego image quality.-erefore, we can simultaneously achieve the above goals and achieve proactive and dynamic features based on matrix projection. Such features can make the proposed SIS scheme more applicable to flexible 5G networks. Finally, the security analysis illustrates that our scheme can effectively resist the collusion attack and detect the shadow tampering over the persistent adversary. -e analyses for performance and comparative demonstrate that our scheme is a better performer among the recent schemes with the perspective of functionality, visual quality, embedding ratio, and computational efficiency. -erefore, our scheme further strengthens security for the images in 5G networks.

[1]  Mervat Ahmed,et al.  Secret Image Sharing Based on Elementary Cellular Automata , 2017, AISI.

[2]  Chin-Chen Chang,et al.  A Secret Image Sharing with Deep-steganography and Two-stage Authentication Based on Matrix Encoding , 2017, Int. J. Netw. Secur..

[3]  Malrey Lee,et al.  A hybrid genetic algorithm and chaotic function model for image encryption , 2012 .

[4]  Jing Zhang,et al.  5G-Smart Diabetes: Toward Personalized Diabetes Diagnosis with Healthcare Big Data Clouds , 2018, IEEE Communications Magazine.

[5]  Arambam Neelima,et al.  A survey paper on secret image sharing schemes , 2018, International Journal of Multimedia Information Retrieval.

[6]  Ziba Eslami,et al.  Secret image sharing based on cellular automata and steganography , 2010, Pattern Recognit..

[7]  Ye Liu,et al.  Internet of Things for Noise Mapping in Smart Cities: State of the Art and Future Directions , 2020, IEEE Network.

[8]  Mingwu Zhang,et al.  Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems , 2018, ACISP.

[9]  Mohammad Ebrahim Shiri,et al.  A cellular automata-based multi-stage secret image sharing scheme , 2018, Multimedia Tools and Applications.

[10]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[11]  Vasif V. Nabiyev,et al.  Secret image sharing scheme with adaptive authentication strength , 2013, Pattern Recognit. Lett..

[12]  Tzung-Her Chen,et al.  Multiple secret image sharing with general access structure , 2020, Multimedia Tools and Applications.

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[15]  Ahmed A. Abd El-Latif,et al.  Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario , 2020, IEEE Transactions on Network and Service Management.

[16]  Li Bai,et al.  A Proactive Secret Sharing Scheme in matrix projection method , 2009, Int. J. Secur. Networks.

[17]  Sabrina Sicari,et al.  5G In the internet of things era: An overview on security and privacy challenges , 2020, Comput. Networks.

[18]  A. Murat Tekalp,et al.  Reversible data hiding , 2002, Proceedings. International Conference on Image Processing.

[19]  Li Bai A Reliable (k, n) Image Secret Sharing Scheme , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[20]  Yuliang Lu,et al.  Secret image sharing with separate shadow authentication ability , 2020, Signal Process. Image Commun..

[21]  Xinping Guan,et al.  5G Enabled Codesign of Energy-Efficient Transmission and Estimation for Industrial IoT Systems , 2018, IEEE Transactions on Industrial Informatics.

[22]  Ramón Alonso-Sanz,et al.  Reversible cellular automata with memory: two-dimensional patterns from a single site seed , 2003 .

[23]  N F Azzahra,et al.  Verifiable Image Secret Sharing Using Matrix Projection , 2018 .

[24]  Roger Piqueras Jover,et al.  Challenges and Novel Solutions for 5G Network Security, Privacy and Trust , 2020, IEEE Wirel. Commun..

[25]  Ching-Nung Yang,et al.  Threshold changeable secret image sharing scheme based on interpolation polynomial , 2019, Multimedia Tools and Applications.

[26]  Vasif V. Nabiyev,et al.  Invertible secret image sharing for gray level and dithered cover images , 2013, J. Syst. Softw..

[27]  Li Bai,et al.  A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[28]  Chin-Chen Chang,et al.  A turtle shell-based visual secret sharing scheme with reversibility and authentication , 2018, Multimedia Tools and Applications.

[29]  Li Bai,et al.  A Reliable (K, N) Image Secret Sharing Scheme with Low Information Overhead , 2010 .

[30]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[31]  Alimohammad Latif,et al.  An adaptive secret image sharing with a new bitwise steganographic property , 2016, Inf. Sci..

[32]  Chin-Chen Chang,et al.  Sharing secrets in stego images with authentication , 2008, Pattern Recognit..

[33]  Yuliang Lu,et al.  Reversible Image Secret Sharing , 2020, IEEE Transactions on Information Forensics and Security.

[34]  Lei Zhu,et al.  Cheating identifiable secret sharing scheme using symmetric bivariate polynomial , 2018, Inf. Sci..