Triple-layered security system: reliable and secured image communications over 5G and beyond networks

Abstract The vision of 5G and beyond networks is geared towards linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data with very high levels of security. This paper presents the proposed vision of 5G and beyond security to build a resea...

Full description

Saved in:
Bibliographic Details
Main Authors: Tarek Srour, Mohsen A. M. El-Bendary, Mostafa Eltokhy, Atef E. Abouelazm
Format: Article
Language:English
Published: Nature Portfolio 2025-08-01
Series:Scientific Reports
Subjects:
Online Access:https://doi.org/10.1038/s41598-025-10022-0
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849333088737296384
author Tarek Srour
Mohsen A. M. El-Bendary
Mostafa Eltokhy
Atef E. Abouelazm
author_facet Tarek Srour
Mohsen A. M. El-Bendary
Mostafa Eltokhy
Atef E. Abouelazm
author_sort Tarek Srour
collection DOAJ
description Abstract The vision of 5G and beyond networks is geared towards linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data with very high levels of security. This paper presents the proposed vision of 5G and beyond security to build a research gap of existing and related technique that lack the adaptation, boosting gradient and complexity analysis, through design and evaluate the adapted and graded security system. This paper focuses on designing a security approach to make up the lacks of existing techniques. The paper proposes a Loss-less Triple-level security system that secures the data without loss and high quality of extracted messages. The Triple-level security system consists of three combined/ merged security levels, the classified images are encrypted by two chaos-based tools, the encrypted images are embedded into another fake image or audio file using Singular Value Decomposition-Discrete Wavelet Transform (SVD-DWT) based techniques. Various simulation experiments have been executed to find the best integration between two-Dimensional (2D) Logistic map, SVD, and baker map techniques to ensure the integrity of plaintext and the transparency of the proposed approach. The result analysis of the various computerized experiments reveals that the time of algorithms are 2.13s for ciphering/hiding and 1.57s for deciphering/extracting. Hence, the time complexity of the proposed approach superiors the existing and related research works. The simulation results indicates a 100% perfect match between the original and decrypted. The performance evaluating of the proposed technique proves its robustness, low complexity and high reliability, where the original and extracted message similarity is 100%. The advanced wireless networks require reliable graded complexity security tools with various levels capabilities, therefore, the proposed adapted complexity/levels security system is suitable and applicable for 5G/beyond networks.
format Article
id doaj-art-d58df2b4e5f740cd9dc8c8d3aa510c2f
institution Kabale University
issn 2045-2322
language English
publishDate 2025-08-01
publisher Nature Portfolio
record_format Article
series Scientific Reports
spelling doaj-art-d58df2b4e5f740cd9dc8c8d3aa510c2f2025-08-20T03:45:59ZengNature PortfolioScientific Reports2045-23222025-08-0115112610.1038/s41598-025-10022-0Triple-layered security system: reliable and secured image communications over 5G and beyond networksTarek Srour0Mohsen A. M. El-Bendary1Mostafa Eltokhy2Atef E. Abouelazm3Department of Electronics Technology, Faculty of Technology and Education, Helwan UniversityDepartment of Electronics Technology, Faculty of Technology and Education, Helwan UniversityDepartment of Electronics Technology, Faculty of Technology and Education, Helwan UniversityDepartment of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia UniversityAbstract The vision of 5G and beyond networks is geared towards linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data with very high levels of security. This paper presents the proposed vision of 5G and beyond security to build a research gap of existing and related technique that lack the adaptation, boosting gradient and complexity analysis, through design and evaluate the adapted and graded security system. This paper focuses on designing a security approach to make up the lacks of existing techniques. The paper proposes a Loss-less Triple-level security system that secures the data without loss and high quality of extracted messages. The Triple-level security system consists of three combined/ merged security levels, the classified images are encrypted by two chaos-based tools, the encrypted images are embedded into another fake image or audio file using Singular Value Decomposition-Discrete Wavelet Transform (SVD-DWT) based techniques. Various simulation experiments have been executed to find the best integration between two-Dimensional (2D) Logistic map, SVD, and baker map techniques to ensure the integrity of plaintext and the transparency of the proposed approach. The result analysis of the various computerized experiments reveals that the time of algorithms are 2.13s for ciphering/hiding and 1.57s for deciphering/extracting. Hence, the time complexity of the proposed approach superiors the existing and related research works. The simulation results indicates a 100% perfect match between the original and decrypted. The performance evaluating of the proposed technique proves its robustness, low complexity and high reliability, where the original and extracted message similarity is 100%. The advanced wireless networks require reliable graded complexity security tools with various levels capabilities, therefore, the proposed adapted complexity/levels security system is suitable and applicable for 5G/beyond networks.https://doi.org/10.1038/s41598-025-10022-05G and beyond networksSecurityLoss-less steganographyEncryption techniquesData hiding techniquesLayered-security adaptation
spellingShingle Tarek Srour
Mohsen A. M. El-Bendary
Mostafa Eltokhy
Atef E. Abouelazm
Triple-layered security system: reliable and secured image communications over 5G and beyond networks
Scientific Reports
5G and beyond networks
Security
Loss-less steganography
Encryption techniques
Data hiding techniques
Layered-security adaptation
title Triple-layered security system: reliable and secured image communications over 5G and beyond networks
title_full Triple-layered security system: reliable and secured image communications over 5G and beyond networks
title_fullStr Triple-layered security system: reliable and secured image communications over 5G and beyond networks
title_full_unstemmed Triple-layered security system: reliable and secured image communications over 5G and beyond networks
title_short Triple-layered security system: reliable and secured image communications over 5G and beyond networks
title_sort triple layered security system reliable and secured image communications over 5g and beyond networks
topic 5G and beyond networks
Security
Loss-less steganography
Encryption techniques
Data hiding techniques
Layered-security adaptation
url https://doi.org/10.1038/s41598-025-10022-0
work_keys_str_mv AT tareksrour triplelayeredsecuritysystemreliableandsecuredimagecommunicationsover5gandbeyondnetworks
AT mohsenamelbendary triplelayeredsecuritysystemreliableandsecuredimagecommunicationsover5gandbeyondnetworks
AT mostafaeltokhy triplelayeredsecuritysystemreliableandsecuredimagecommunicationsover5gandbeyondnetworks
AT atefeabouelazm triplelayeredsecuritysystemreliableandsecuredimagecommunicationsover5gandbeyondnetworks