Triple-layered security system: reliable and secured image communications over 5G and beyond networks
Abstract The vision of 5G and beyond networks is geared towards linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data with very high levels of security. This paper presents the proposed vision of 5G and beyond security to build a resea...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Nature Portfolio
2025-08-01
|
| Series: | Scientific Reports |
| Subjects: | |
| Online Access: | https://doi.org/10.1038/s41598-025-10022-0 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849333088737296384 |
|---|---|
| author | Tarek Srour Mohsen A. M. El-Bendary Mostafa Eltokhy Atef E. Abouelazm |
| author_facet | Tarek Srour Mohsen A. M. El-Bendary Mostafa Eltokhy Atef E. Abouelazm |
| author_sort | Tarek Srour |
| collection | DOAJ |
| description | Abstract The vision of 5G and beyond networks is geared towards linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data with very high levels of security. This paper presents the proposed vision of 5G and beyond security to build a research gap of existing and related technique that lack the adaptation, boosting gradient and complexity analysis, through design and evaluate the adapted and graded security system. This paper focuses on designing a security approach to make up the lacks of existing techniques. The paper proposes a Loss-less Triple-level security system that secures the data without loss and high quality of extracted messages. The Triple-level security system consists of three combined/ merged security levels, the classified images are encrypted by two chaos-based tools, the encrypted images are embedded into another fake image or audio file using Singular Value Decomposition-Discrete Wavelet Transform (SVD-DWT) based techniques. Various simulation experiments have been executed to find the best integration between two-Dimensional (2D) Logistic map, SVD, and baker map techniques to ensure the integrity of plaintext and the transparency of the proposed approach. The result analysis of the various computerized experiments reveals that the time of algorithms are 2.13s for ciphering/hiding and 1.57s for deciphering/extracting. Hence, the time complexity of the proposed approach superiors the existing and related research works. The simulation results indicates a 100% perfect match between the original and decrypted. The performance evaluating of the proposed technique proves its robustness, low complexity and high reliability, where the original and extracted message similarity is 100%. The advanced wireless networks require reliable graded complexity security tools with various levels capabilities, therefore, the proposed adapted complexity/levels security system is suitable and applicable for 5G/beyond networks. |
| format | Article |
| id | doaj-art-d58df2b4e5f740cd9dc8c8d3aa510c2f |
| institution | Kabale University |
| issn | 2045-2322 |
| language | English |
| publishDate | 2025-08-01 |
| publisher | Nature Portfolio |
| record_format | Article |
| series | Scientific Reports |
| spelling | doaj-art-d58df2b4e5f740cd9dc8c8d3aa510c2f2025-08-20T03:45:59ZengNature PortfolioScientific Reports2045-23222025-08-0115112610.1038/s41598-025-10022-0Triple-layered security system: reliable and secured image communications over 5G and beyond networksTarek Srour0Mohsen A. M. El-Bendary1Mostafa Eltokhy2Atef E. Abouelazm3Department of Electronics Technology, Faculty of Technology and Education, Helwan UniversityDepartment of Electronics Technology, Faculty of Technology and Education, Helwan UniversityDepartment of Electronics Technology, Faculty of Technology and Education, Helwan UniversityDepartment of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia UniversityAbstract The vision of 5G and beyond networks is geared towards linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data with very high levels of security. This paper presents the proposed vision of 5G and beyond security to build a research gap of existing and related technique that lack the adaptation, boosting gradient and complexity analysis, through design and evaluate the adapted and graded security system. This paper focuses on designing a security approach to make up the lacks of existing techniques. The paper proposes a Loss-less Triple-level security system that secures the data without loss and high quality of extracted messages. The Triple-level security system consists of three combined/ merged security levels, the classified images are encrypted by two chaos-based tools, the encrypted images are embedded into another fake image or audio file using Singular Value Decomposition-Discrete Wavelet Transform (SVD-DWT) based techniques. Various simulation experiments have been executed to find the best integration between two-Dimensional (2D) Logistic map, SVD, and baker map techniques to ensure the integrity of plaintext and the transparency of the proposed approach. The result analysis of the various computerized experiments reveals that the time of algorithms are 2.13s for ciphering/hiding and 1.57s for deciphering/extracting. Hence, the time complexity of the proposed approach superiors the existing and related research works. The simulation results indicates a 100% perfect match between the original and decrypted. The performance evaluating of the proposed technique proves its robustness, low complexity and high reliability, where the original and extracted message similarity is 100%. The advanced wireless networks require reliable graded complexity security tools with various levels capabilities, therefore, the proposed adapted complexity/levels security system is suitable and applicable for 5G/beyond networks.https://doi.org/10.1038/s41598-025-10022-05G and beyond networksSecurityLoss-less steganographyEncryption techniquesData hiding techniquesLayered-security adaptation |
| spellingShingle | Tarek Srour Mohsen A. M. El-Bendary Mostafa Eltokhy Atef E. Abouelazm Triple-layered security system: reliable and secured image communications over 5G and beyond networks Scientific Reports 5G and beyond networks Security Loss-less steganography Encryption techniques Data hiding techniques Layered-security adaptation |
| title | Triple-layered security system: reliable and secured image communications over 5G and beyond networks |
| title_full | Triple-layered security system: reliable and secured image communications over 5G and beyond networks |
| title_fullStr | Triple-layered security system: reliable and secured image communications over 5G and beyond networks |
| title_full_unstemmed | Triple-layered security system: reliable and secured image communications over 5G and beyond networks |
| title_short | Triple-layered security system: reliable and secured image communications over 5G and beyond networks |
| title_sort | triple layered security system reliable and secured image communications over 5g and beyond networks |
| topic | 5G and beyond networks Security Loss-less steganography Encryption techniques Data hiding techniques Layered-security adaptation |
| url | https://doi.org/10.1038/s41598-025-10022-0 |
| work_keys_str_mv | AT tareksrour triplelayeredsecuritysystemreliableandsecuredimagecommunicationsover5gandbeyondnetworks AT mohsenamelbendary triplelayeredsecuritysystemreliableandsecuredimagecommunicationsover5gandbeyondnetworks AT mostafaeltokhy triplelayeredsecuritysystemreliableandsecuredimagecommunicationsover5gandbeyondnetworks AT atefeabouelazm triplelayeredsecuritysystemreliableandsecuredimagecommunicationsover5gandbeyondnetworks |