• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

三层安全系统:通过5G及以后的网络实现可靠且安全的图像通信。

Triple-layered security system: reliable and secured image communications over 5G and beyond networks.

作者信息

Srour Tarek, El-Bendary Mohsen A M, Eltokhy Mostafa, Abouelazm Atef E

机构信息

Department of Electronics Technology, Faculty of Technology and Education, Helwan University, Cairo, Egypt.

Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, Egypt.

出版信息

Sci Rep. 2025 Aug 5;15(1):28567. doi: 10.1038/s41598-025-10022-0.

DOI:10.1038/s41598-025-10022-0
PMID:40764780
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12325630/
Abstract

The vision of 5G and beyond networks is geared towards linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data with very high levels of security. This paper presents the proposed vision of 5G and beyond security to build a research gap of existing and related technique that lack the adaptation, boosting gradient and complexity analysis, through design and evaluate the adapted and graded security system. This paper focuses on designing a security approach to make up the lacks of existing techniques. The paper proposes a Loss-less Triple-level security system that secures the data without loss and high quality of extracted messages. The Triple-level security system consists of three combined/ merged security levels, the classified images are encrypted by two chaos-based tools, the encrypted images are embedded into another fake image or audio file using Singular Value Decomposition-Discrete Wavelet Transform (SVD-DWT) based techniques. Various simulation experiments have been executed to find the best integration between two-Dimensional (2D) Logistic map, SVD, and baker map techniques to ensure the integrity of plaintext and the transparency of the proposed approach. The result analysis of the various computerized experiments reveals that the time of algorithms are 2.13s for ciphering/hiding and 1.57s for deciphering/extracting. Hence, the time complexity of the proposed approach superiors the existing and related research works. The simulation results indicates a 100% perfect match between the original and decrypted. The performance evaluating of the proposed technique proves its robustness, low complexity and high reliability, where the original and extracted message similarity is 100%. The advanced wireless networks require reliable graded complexity security tools with various levels capabilities, therefore, the proposed adapted complexity/levels security system is suitable and applicable for 5G/beyond networks.

摘要

5G及未来网络的愿景旨在将海底、地面和空间网络连接在一起。这一愿景涉及以极高的安全性传输大量数据。本文提出了5G及未来安全的愿景,以弥补现有及相关技术在适应性、增强梯度和复杂性分析方面的研究空白,通过设计和评估适应性和分级安全系统来实现。本文着重设计一种安全方法来弥补现有技术的不足。该论文提出了一种无损三级安全系统,该系统能够确保数据无损失且提取的消息质量高。三级安全系统由三个组合/合并的安全级别组成,分类图像通过两种基于混沌的工具进行加密,加密后的图像使用基于奇异值分解-离散小波变换(SVD-DWT)的技术嵌入到另一个伪造图像或音频文件中。已经进行了各种模拟实验,以找到二维(2D)逻辑映射、SVD和面包师映射技术之间的最佳集成,以确保明文的完整性和所提方法的透明度。各种计算机实验的结果分析表明,加密/隐藏算法的时间为2.13秒,解密/提取算法的时间为1.57秒。因此,所提方法的时间复杂度优于现有及相关研究工作。模拟结果表明原始数据和解密后的数据完全匹配。对所提技术的性能评估证明了其鲁棒性、低复杂性和高可靠性,其中原始消息和提取消息的相似度为100%。先进的无线网络需要具有各种级别能力的可靠分级复杂性安全工具,因此,所提的适应性复杂性/级别安全系统适用于5G及未来网络。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/333e5c36430e/41598_2025_10022_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/30d16cd16146/41598_2025_10022_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/94ea89414f4e/41598_2025_10022_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/c561f287fe9e/41598_2025_10022_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/4f082e031b52/41598_2025_10022_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/0b6de927f0b1/41598_2025_10022_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/740a663bac65/41598_2025_10022_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/619bed95ce58/41598_2025_10022_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/a367a9c418bc/41598_2025_10022_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/981d5133baa4/41598_2025_10022_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/dc4be6e501a3/41598_2025_10022_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/909070356e96/41598_2025_10022_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/70242b34c920/41598_2025_10022_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/6f3e1514708f/41598_2025_10022_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/797c9f30b638/41598_2025_10022_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/f9a8c86d2b20/41598_2025_10022_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/333e5c36430e/41598_2025_10022_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/30d16cd16146/41598_2025_10022_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/94ea89414f4e/41598_2025_10022_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/c561f287fe9e/41598_2025_10022_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/4f082e031b52/41598_2025_10022_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/0b6de927f0b1/41598_2025_10022_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/740a663bac65/41598_2025_10022_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/619bed95ce58/41598_2025_10022_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/a367a9c418bc/41598_2025_10022_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/981d5133baa4/41598_2025_10022_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/dc4be6e501a3/41598_2025_10022_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/909070356e96/41598_2025_10022_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/70242b34c920/41598_2025_10022_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/6f3e1514708f/41598_2025_10022_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/797c9f30b638/41598_2025_10022_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/f9a8c86d2b20/41598_2025_10022_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/3e59/12325630/333e5c36430e/41598_2025_10022_Fig16_HTML.jpg

相似文献

1
Triple-layered security system: reliable and secured image communications over 5G and beyond networks.三层安全系统:通过5G及以后的网络实现可靠且安全的图像通信。
Sci Rep. 2025 Aug 5;15(1):28567. doi: 10.1038/s41598-025-10022-0.
2
Short-Term Memory Impairment短期记忆障碍
3
2-D Stationary Wavelet Transform and 2-D Dual-Tree DWT for MRI Denoising.用于磁共振成像去噪的二维平稳小波变换和二维双树离散小波变换
Curr Med Imaging. 2025 Jul 7. doi: 10.2174/0115734056365765250630140748.
4
Management of urinary stones by experts in stone disease (ESD 2025).结石病专家对尿路结石的管理(2025年结石病专家共识)
Arch Ital Urol Androl. 2025 Jun 30;97(2):14085. doi: 10.4081/aiua.2025.14085.
5
Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency.利用三维超混沌系统增强高级加密标准(AES)图像加密以提高安全性和效率。
PLoS One. 2025 Jul 18;20(7):e0328297. doi: 10.1371/journal.pone.0328297. eCollection 2025.
6
SLCCC-Net: Hybrid steganography and AI system for secure cancer classification from histopathological images in internet of medical things applications.SLCCC-Net:用于医疗物联网应用中基于组织病理学图像进行安全癌症分类的混合隐写术与人工智能系统。
MethodsX. 2025 May 27;15:103398. doi: 10.1016/j.mex.2025.103398. eCollection 2025 Dec.
7
Health professionals' experience of teamwork education in acute hospital settings: a systematic review of qualitative literature.医疗专业人员在急症医院环境中团队合作教育的经验:对定性文献的系统综述
JBI Database System Rev Implement Rep. 2016 Apr;14(4):96-137. doi: 10.11124/JBISRIR-2016-1843.
8
Artificial intelligence for detecting keratoconus.人工智能在圆锥角膜检测中的应用。
Cochrane Database Syst Rev. 2023 Nov 15;11(11):CD014911. doi: 10.1002/14651858.CD014911.pub2.
9
Robust zero-watermarking for color images using hybrid deep learning models and encryption.使用混合深度学习模型和加密技术的彩色图像鲁棒零水印
Sci Rep. 2025 Aug 7;15(1):28906. doi: 10.1038/s41598-025-09290-7.
10
Non-orthogonal kV imaging guided patient position verification in non-coplanar radiation therapy with dataset-free implicit neural representation.在无数据集隐式神经表示的非共面放射治疗中,基于非正交千伏成像的患者体位验证
Med Phys. 2025 May 19. doi: 10.1002/mp.17885.

本文引用的文献

1
A robust audio steganography technique based on image encryption using different chaotic maps.一种基于使用不同混沌映射的图像加密的稳健音频隐写技术。
Sci Rep. 2024 Sep 27;14(1):22054. doi: 10.1038/s41598-024-70940-3.