A Secure Cooperative Image Super-Resolution Transmission with Decode-and-Forward Relaying over Rayleigh Fading Channels
DOI:
https://doi.org/10.4108/eetinis.v11i4.6193Keywords:
Image communication, Deep learning, Image super-resolution, Random linear network coding, Cooperative communications, Wireless relay networksAbstract
In addition to susceptibility to performance degradation due to hardware malfunctions and environmental influences, wireless image transmission poses risks of information exposure to eavesdroppers. This paper delves into the image communications within wireless relay networks (WRNs) and proposes a secure cooperative relaying (SCR) protocol over Rayleigh fading channels. In this protocol, a source node (referred to as Alice) transmits superior-resolution (SR) images to a destination node (referred to as Bob) with the assistance of a mediating node (referred to as Relay) operating in decode-and-forward mode, all while contending with the presence of an eavesdropper (referred to as Eve). In order to conserve transmission bandwidth, Alice firstly reduces the size of the original SR images before transmitting them to Relay and Bob. Subsequently, random linear network coding (RLNC) is employed by both Alice and Relay on the downscaled poor-resolution (PR) images to obscure the original images from Eve, thereby bolstering the security of the image communications. Simulation results demonstrate that the proposed SCR protocol surpasses both secure relaying transmission without a direct link and secure direct transmission without relaying links.
Additionally, a slight reduction in image quality can be achieved by increasing the scaling factor for saving transmission bandwidth. Furthermore, the results highlight the SCR protocol’s superior effectiveness at Bob’s end when compared to Eve’s, which is due to Eve’s lack of access to the RLNC coefficient matrices and reference images utilised by Alice and Relay in the RLNC process. Finally, the evaluation of reference images, relay allocations and diversity reception over Rayleigh fading channels confirms the effectiveness of the SCR protocol for secure image communications in the WRNs.
Downloads
References
[1] A. Sendonaris, E. Erkip, and B. Aazhang, “User cooperation diversity. part i. system description,” IEEE transactions on communications, vol. 51, no. 11, pp. 1927–1938, 2003. DOI: https://doi.org/10.1109/TCOMM.2003.818096
[2] A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,” IEEE communications Magazine, vol. 42, no. 10, pp. 74–80, 2004. DOI: https://doi.org/10.1109/MCOM.2004.1341264
[3] R. Ahlswede, N. Cai, S.-Y. Li, and R. W. Yeung, “Network information flow,” IEEE Transactions on information theory, vol. 46, no. 4, pp. 1204–1216, 2000. DOI: https://doi.org/10.1109/18.850663
[4] R. H. Louie, Y. Li, and B. Vucetic, “Practical physical layer network coding for two-way relay channels: performance analysis and comparison,” IEEE Transactions on Wireless Communications, vol. 9, no. 2, pp. 764–777, 2010. DOI: https://doi.org/10.1109/TWC.2010.02.090314
[5] Q.-T. Vien, T. A. Le, H. X. Nguyen, and T. Le-Ngoc, “A physical layer network coding based modify-and-forward with opportunistic secure cooperative transmission protocol,” Mobile Networks and Applications, vol. 24, pp. 464–479, 2019. DOI: https://doi.org/10.1007/s11036-018-1157-1
[6] T. Ho, M. Médard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, “A random linear network coding approach to multicast,” IEEE Transactions on information theory, vol. 52, no. 10, pp. 4413–4430, 2006. DOI: https://doi.org/10.1109/TIT.2006.881746
[7] R. Koetter and M. Médard, “An algebraic approach to network coding,” IEEE/ACM transactions on networking, vol. 11, no. 5, pp. 782–795, 2003. DOI: https://doi.org/10.1109/TNET.2003.818197
[8] M. Ju and I.-M. Kim, “Error performance analysis of bpsk modulation in physical-layer network-coded bidirectional relay networks,” IEEE transactions on Communications, vol. 58, no. 10, pp. 2770–2775, 2010. DOI: https://doi.org/10.1109/TCOMM.2010.082010.090256
[9] D. Nguyen, T. Tran, T. Nguyen, and B. Bose, “Wireless broadcast using network coding,” IEEE Transactions on Vehicular technology, vol. 58, no. 2, pp. 914–925, 2008. DOI: https://doi.org/10.1109/TVT.2008.927729
[10] E. Soljanin, “Lecture notes-network multicast with network coding,” IEEE Signal Processing Magazine, vol. 25, no. 5, p. 109, 2008. DOI: https://doi.org/10.1109/MSP.2008.927302
[11] L. Lima, M. Médard, and J. Barros, “Random linear network coding: A free cipher?” in 2007 IEEE International Symposium on Information Theory. IEEE, 2007, pp. 546–550. DOI: https://doi.org/10.1109/ISIT.2007.4557282
[12] H.-T. Duong, C. V. Phan, Q.-T. Vien, and T. T. Nguyen, “A secure cooperative transmission of image super-resolution in wireless relay networks,” Electronics, vol. 12, no. 18, p. 3764, 2023. DOI: https://doi.org/10.3390/electronics12183764
[13] G. M. Davis and J. M. Danskin, “Joint source and channel coding for image transmission over lossy packet networks,” in Applications of Digital Image Processing XIX, vol. 2847. SPIE, 1996, pp. 376–387. DOI: https://doi.org/10.1117/12.258246
[14] K. Stuhlmuller, N. Farber, M. Link, and B. Girod, “Analysis of video transmission over lossy channels,” IEEE Journal on selected areas in communications, vol. 18, no. 6, pp. 1012–1032, 2000. DOI: https://doi.org/10.1109/49.848253
[15] Z. Zhang, Q. Sun, W.-C. Wong, J. Apostolopoulos, and S. Wee, “An optimized content-aware authentication scheme for streaming jpeg-2000 images over lossy networks,” IEEE Transactions on Multimedia, vol. 9, no. 2, pp. 320–331, 2007. DOI: https://doi.org/10.1109/TMM.2006.886281
[16] Z. Wang, J. Chen, and S. C. Hoi, “Deep learning for image super-resolution: A survey,” IEEE transactions on pattern analysis and machine intelligence, vol. 43, no. 10, pp. 3365–3387, 2020. DOI: https://doi.org/10.1109/TPAMI.2020.2982166
[17] Y. K. Ooi and H. Ibrahim, “Deep learning algorithms for single image super-resolution: a systematic review,” Electronics, vol. 10, no. 7, p. 867, 2021. DOI: https://doi.org/10.3390/electronics10070867
[18] W. Yang, X. Zhang, Y. Tian, W. Wang, J.-H. Xue, and Q. Liao, “Deep learning for single image super-resolution: A brief review,” IEEE Transactions on Multimedia, vol. 21, no. 12, pp. 3106–3121, 2019. DOI: https://doi.org/10.1109/TMM.2019.2919431
[19] Z. Li, J. Yang, Z. Liu, X. Yang, G. Jeon, and W. Wu, “Feedback network for image super-resolution,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 3867–3876. DOI: https://doi.org/10.1109/CVPR.2019.00399
[20] J.-H. Kim and J.-S. Lee, “Deep residual network with enhanced upscaling module for super-resolution,” in Proceedings of the IEEE conference on computer vision and pattern recognition workshops, 2018, pp. 800–808. DOI: https://doi.org/10.1109/CVPRW.2018.00124
[21] C. Dong, C. C. Loy, K. He, and X. Tang, “Learning a deep convolutional network for image super-resolution,” in Computer Vision–ECCV 2014: 13th European Conference, Zurich, Switzerland, September 6-12, 2014, Proceedings, Part IV 13. Springer, 2014, pp. 184–199. DOI: https://doi.org/10.1007/978-3-319-10593-2_13
[22] W.-S. Lai, J.-B. Huang, N. Ahuja, and M.-H. Yang, “Deep laplacian pyramid networks for fast and accurate super-resolution,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 624–632. DOI: https://doi.org/10.1109/CVPR.2017.618
[23] S. G. Haris, Muhammad and N. Ukita, “Deep back-projection networks for super-resolution,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 1664–1673. DOI: https://doi.org/10.1109/CVPR.2018.00179
[24] J. Kim, J. K. Lee, and K. M. Lee, “Accurate image super-resolution using very deep convolutional networks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, Las Vegas, NV, USA, 27-30 June 2016, pp. 1646–1654. DOI: https://doi.org/10.1109/CVPR.2016.182
[25] J. Pan, N. Ye, H. Yu, T. Hong, S. Al-Rubaye, S. Mumtaz, A. Al-Dulaimi, and I. Chih-Lin, “Ai-driven blind signature classification for iot connectivity: A deep learning approach,” IEEE Transactions on Wireless Communications, vol. 21, no. 8, pp. 6033–6047, 2022. DOI: https://doi.org/10.1109/TWC.2022.3145399
[26] Q.-T. Vien, T. Nguyen, and H. Nguyen, “A lightweight secure image super resolution using network coding,” 2021. DOI: https://doi.org/10.5220/0010212406530660
[27] Y. Zhao, Y. Li, X. Dong, and B. Yang, “Low-frequency noise suppression method based on improved dncnn in desert seismic data,” IEEE Geoscience and Remote Sensing Letters, vol. 16, no. 5, pp. 811–815, 2018. DOI: https://doi.org/10.1109/LGRS.2018.2882058
[28] K. Zhang, W. Zuo, Y. Chen, D. Meng, and L. Zhang, “Beyond a gaussian denoiser: Residual learning of deep cnn for image denoising,” IEEE transactions on image processing, vol. 26, no. 7, pp. 3142–3155, 2017. DOI: https://doi.org/10.1109/TIP.2017.2662206
[29] T. Rahim, S. Khan, M. A. Usman, and S. Y. Shin, “Exploiting de-noising convolutional neural networks (dncnns) for an efficient watermarking scheme: a case for information retrieval,” IETE Technical Review, vol. 38, no. 2, pp. 245–255, 2021. DOI: https://doi.org/10.1080/02564602.2020.1721342
[30] D. M. Guerrini, Fabrizio and R. Leonardi, “Minimal information exchange for secure image hash-based geometric transformations estimation,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3482–3496, 2020. DOI: https://doi.org/10.1109/TIFS.2020.2990793
[31] M. Kaur and V. Kumar, “A comprehensive review on image encryption techniques,” Archives of Computational Methods in Engineering, vol. 27, no. 1, pp. 15–43, 2020. DOI: https://doi.org/10.1007/s11831-018-9298-8
[32] H. Peng, B. Yang, L. Li, and Y. Yang, “Secure and traceable image transmission scheme based on semitensor product compressed sensing in telemedicine system,” IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2432–2451, 2019. DOI: https://doi.org/10.1109/JIOT.2019.2957747
[33] C.-K. Chan and L.-M. Cheng, “Hiding data in images by simple lsb substitution,” Pattern recognition, vol. 37, no. 3, pp. 469–474, 2004. DOI: https://doi.org/10.1016/j.patcog.2003.08.007
[34] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM systems journal, vol. 35, no. 3.4, pp. 313–336, 1996. DOI: https://doi.org/10.1147/sj.353.0313
[35] E. Franz, A. Jerichow, S. Möller, A. Pfitzmann, and I. Stierand, “Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at best,” in Information Hiding: First International Workshop Cambridge, UK, May 30–June 1, 1996 Proceedings 1. Springer, 1996, pp. 7–21. DOI: https://doi.org/10.1007/3-540-61996-8_28
[36] P.-Y. Po-Yueh, H.-J. Lin et al., “A dwt based approach for image steganography,” International Journal of Applied Science and Engineering, vol. 4, no. 3, pp. 275–290, 2006.
[37] A. I. Hashad, A. S. Madani, and A. E. M. A. Wahdan, “A robust steganography technique using discrete cosine transform insertion,” in 2005 International Conference on Information and Communication Technology. IEEE, 2005, pp. 255–264.
[38] J. Qin, Y. Luo, X. Xiang, Y. Tan, and H. Huang, “Coverless image steganography: a survey,” IEEE access, vol. 7, pp. 171 372–171 394, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2955452
[39] K. Shankar and M. Elhoseny, Secure image transmission in wireless sensor network (WSN) applications. Springer, 2019. DOI: https://doi.org/10.1007/978-3-030-20816-5
[40] A. Hore and D. Ziou, “Image quality metrics: Psnr vs. ssim,” in 2010 20th international conference on pattern recognition. IEEE, 2010, pp. 2366–2369. DOI: https://doi.org/10.1109/ICPR.2010.579
[41] S. Zhang, S. C. Liew, and P. P. Lam, “Hot topic: Physical-layer network coding,” in Proceedings of the 12th annual international conference on Mobile computing and networking, 2006, pp. 358–365. DOI: https://doi.org/10.1145/1161089.1161129
[42] Q.-T. Vien, H. X. Nguyen, B. G. Stewart, J. Choi, and W. Tu, “On the energy–delay tradeoff and relay positioning of wireless butterfly networks,” IEEE Transactions on Vehicular Technology, vol. 64, no. 1, pp. 159–172, 2014. DOI: https://doi.org/10.1109/TVT.2014.2321229
[43] N. Cai and R. W. Yeung, “Secure network coding,” in Proceedings IEEE International Symposium on Information Theory,. IEEE, 2002, p. 323.
[44] T. Cui, T. Ho, and J. Kliewer, “On secure network coding with nonuniform or restricted wiretap sets,” IEEE Transactions on Information Theory, vol. 59, no. 1, pp. 166–176, 2012. DOI: https://doi.org/10.1109/TIT.2012.2216936
[45] A. S. Khan and I. Chatzigeorgiou, “Opportunistic relaying and random linear network coding for secure and reliable communication,” IEEE Transactions on Wireless Communications, vol. 17, no. 1, pp. 223–234, 2017. DOI: https://doi.org/10.1109/TWC.2017.2764891
[46] S. E. Tajbakhsh, J. P. Coon, and G. Chen, “Network coding for physical layer secrecy,” IEEE Wireless Communications Letters, vol. 7, no. 4, pp. 642–645, 2018. DOI: https://doi.org/10.1109/LWC.2018.2806452
[47] M. Grubinger, P. Clough, H. Müller, and T. Deselaers, “The iapr tc-12 benchmark: A new evaluation resource for visual information systems,” in International work-shop ontoImage’2006 Language Resources for Content-Based Image Retrieval, held in conjunction with LREC’06, Genoa, Italy,, vol. 2, pp 13-23, 22-May 2006.
[48] T. Porter and T. Duff, “Compositing digital images,” in Proceedings of the 11th annual conference on Computer graphics and interactive techniques, 1984, pp. 253–259. DOI: https://doi.org/10.1145/800031.808606
[49] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE transactions on image processing, vol. 13, no. 4, pp. 600–612, 2004. DOI: https://doi.org/10.1109/TIP.2003.819861
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2024 EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
This work is licensed under a Creative Commons Attribution 3.0 Unported License.
This is an open-access article distributed under the terms of the Creative Commons Attribution CC BY 3.0 license, which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.