1. Introduction
Cooperative wireless communications have attracted growing interest with emerging technologies for data transmission with higher reliability and security. By leveraging a shared wireless medium, communication between two end users can be achieved collaboratively with the help of intermediary users, also known as a relay nodes [
1]. The cooperative communication techniques have been adopted in various wireless network models where the relay nodes can be used to not only extend network coverage with enhanced system throughput, but also improve signal quality with higher spatial diversity gains [
2].
Over relay networks, relay nodes do not simply store the data received from source nodes, but they can process the data prior to forwarding them to destination nodes. Specifically, the network coding (NC) concept, which was originally proposed in [
3], has been applied at the relay nodes to improve the throughput of wireless relay networks [
4,
5]. The incoming data packets from the source nodes can be subjected to random linear NC (RLNC) operations by the relay nodes. The destination nodes can retrieve the data of the source nodes if there are enough mixed data packets and they are aware of the linear coefficients [
6]. A variety of NC-based protocols have also been developed for typical relay channel models, such as relay-assisted bidirectional channels [
7], broadcast channels [
8] and multicast channels [
9]. Additionally, RLNC can protect the communication [
10] by limiting the degrees of freedom (decoding abilities) that the eavesdropper(s) receive.
Considering image communications over wireless relay networks (WRNs), the image data from a source node can be delivered to a destination node either directly or after two hops through a relay node (for example, source-to-relay and relay-to-destination links). Inspired by the benefit of cooperative diversity, a cooperative communication method exploiting both relaying and direct links is considered in this work to enhance the performance of the image communications in the WRNs. Although RLNC and traditional relaying protocols can be used for image communication, there are a number of data privacy and transmission bandwidth concerns that need to be taken into consideration. In this research, we present a secure cooperative communication protocol that is inspired by image super-resolution (ISR) and RLNC in order to not only hide the picture but also reduce the bandwidth used for image communications in WRNs. The following is a summary of the paper’s main contributions:
With the aid of a relaying user, a secure cooperative relaying (SCR) protocol is proposed for image communications between Alice and Bob in WRNs. The original high-resolution (HR) photograph at Alice is first downscaled using the suggested technique in order to conserve transmission bandwidth. Prior to being sent to both the relaying user and Bob, this low-resolution (LR) image that has been downscaled is mixed with a reference image using RLNC encoding to hide the actual image from Eve, a potential spy. The received image is decoded, combined with RLNC, and sent to Bob at the relaying user. Bob can decode and recover the original HR image [
11] from both Alice and the relay by using RLNC decoding and ISR. The novel feature of the proposed approach is
how it effectively integrates and ties the advantages of the RLNC and ISR into a single framework for image communications in WRNs with limited transmission bandwidth.
The proposed SCR protocol’s effectiveness is assessed and compared with that of two other schemes:
secure direct transmission (SDT), which was investigated in [12], where Alice sends the RLNC-encoded image directly to Bob without the assistance of any relaying user, and secure relaying transmission (SRT), where Alice sends the RLNC-encoded image to Bob only via a relaying user given no direct link between Alice and Bob. The SCR protocol outperforms both the SDT and SRT systems, according to simulation results. Because both Alice and the relaying user used RLNC, it was demonstrated that Bob performed far better than Eve. It is also demonstrated that the original HR image may be downscaled to a much lower resolution image before transmission to conserve transmission bandwidth while still offering equivalent performance at various scales and far higher performance than Eve.
It is demonstrated that the direct link, or the Alice–Bob link, and relaying links, or the Alice–Relay and Relay–Bob links, have significant effects on performance when taking into account the effects of communication interactions between Alice, Bob, Eve and the relaying user. It is shown that the proposed SCR system outperforms the SDT and SRT protocols. Given the high quality of the relaying links, the SRT protocol performs better than the SDT protocol, whereas the SDT protocol excels when the direct link is of greater quality than the relaying links. This demonstrates the advantage of using the relay for improved performance in the proposed SCR approach.
The rest of this paper is organised as follows: Firstly,
Section 2 presents the related works as bases and motivation for our work.
Section 3 describes the system model of typical image communications in a WRN with the existence of wiretap links. The proposed SCR protocol for secure ISR over WRNs is presented in
Section 4, followed by simulation results in
Section 5 to validate the performance of the proposed SCR protocol and compare it with the counterpart protocols. Finally,
Section 6 concludes this paper by outlining its main contributions with suggestions for future works.
2. Related Works
ISR has utilized generalization abilities of deep learning approaches to learn a mapping between the LR and HR images in order to produce an HR image from an LR version [
11,
13,
14]. Multiple ISR architectures following this approach, have been developed, such as super-resolution convolutional neural network [
15], Laplacian pyramid SR [
16], deep back-projection networks [
17], super-resolution feedBack networks [
18], very deep super resolution (VDSR) [
19] and deep residual network [
20]. In an effort to improve performance, a deep learning (DL)-based aggregation has been deployed, such as the reliability-aware neural network (RANN) [
21] for signature categorization, etc. Among these methods, the VDSR was shown to reproduce an HR image from its LR versions achieving a high performance with a high running speed. Specifically, there are 64 filters in each convolutional layer along with rectified linear units in the VDSR framework. Due to its advanced architecture, the VDSR has been adopted in different areas, such as network security [
22], machinery [
23], seismic analysis [
24] and image communications [
25]. It is worth noticing that the LR images with reduced dimensions save the transmission bandwidth considerably.
Regarding to the image communications, privacy should be taken into account. Techniques for image protection fall under two approaches: information concealment and cryptography. Watermarking and steganography are two categories of information concealment methods. In cryptography, a plain image is first scrambled using a hash or an encryption algorithm, and then, at the recipient, a ciphered image is used to recover the secret image using a decryption function. To protect images with limited common information, a secure image hash-based geometric modification approach was specifically suggested in [
26]. The image security can be further enhanced with transformation methods, such as scaling, shifting and rotation. Numerous encryption methods have been examined in [
27]. In watermarking, digital information is inserted into a cover image. Digital information can be visible or invisible and is typically employed to protect copyright or authenticate images. In [
28], to secure the telemedicine picture transmission, an optimized semi-tensor product with compressed sensing and a digital watermarking method was developed, obtaining high decodability over various environments such as white Gaussian noise, Poisson noise and impulsive noise.
Along with encryption method, there exists another method to conceal information within other non-secret data, which is well known as steganography [
29,
30]. Although two approaches have different techniques, they both have the same aim to protect the data from undesired users. Steganography is, however, more favorable due to its low complexity compared with encryption methods which require encryption and decryption algorithms at both ends. Stenography can be applied for hiding text, image, audio and video, among which the images with a number of redundant bits are selected as the most suitable for steganography. A simple technique employing least significant bit was proposed in [
31], where the last bit of each pixel is exploited to store the data bit in the secret message. The image can be further concealed by transforming from the spatial to frequency domain with discrete cosine transform [
32] and discrete wavelet transform [
33]. Over different frequency bands, the image can be modified so that the change is not recognized. However, the hidden image in this technique must be smaller than the cover image, which may restrict its application. In contrast to traditional image steganography, coverless steganography embeds secret data directly into the characteristics of the cover image, such as its edge, texture, pixel brightness value and color, without any designations or alterations. There have been a number of significant contributions [
34] in this area.
Considering data communications over WRNs, NC has been adopted in a number of works to improve the network throughput, e.g., in [
35,
36]. A form of secure NC was originally proposed in [
37]. The authors in [
10] demonstrated that RLNC can protect communication in a network where any intermediate nodes are susceptible to wiretapping. Originally proposed in [
35], the NC implemented for the physical layer in a two-way relay wireless network can increase system throughput by 100%. Secure NC was used in [
38] to improve the security of wiretap channels and in [
5] for secure relaying with modify-and-forward in WRNs, where the relay randomly and linearly combines the decoded data with the encrypted key before forwarding to the destination using the RLNC approach. In order to increase security, latency and power consumption in WRNs, the authors of [
39] took advantage of the benefits of RLNC and relay selection procedures. Hybrid NC, where the output of the NC is separated into two sets, one of which is transmitted freely and the other of which is processed by security covert methods based on the physical layer, has been proposed in [
40] as a way to increase the security of the wireless channel.
Our work, which is inspired by these methods, proposes a secure cooperative relaying protocol over WRNs that exploits the use of the RLNC idea combined with a reference image used as coverless steganography to secure images transmitted in the network, as well as the employment of ISR to recover the original HR images at Bob from their LR versions in order to conserve transmission bandwidth at Bob and the relay.
3. System Model
With the help of a relaying user named Relay (
) and in the presence of Eve (
), who is attempting to eavesdrop on the photo, Alice (
) wants to communicate a private image to Bob (
) in a WRN.
Figure 1 shows a typical secure image communication paradigm in this scenario. Since Alice and Bob are considered to have a direct link, Alice can send Bob the image with or without the aid of a Relay. Eve is expected to be in the middle of Alice and Bob, as well as close to the Relay, as illustrated in
Figure 1. As a result, there are two wiretap connections from Alice and Relay to Eve which are colored red.
It is assumed that the image transmission between nodes and , ∈, experiences additive white Gaussian noise (AWGN) at the receiver, which degrades the image. Given that Gaussian noise is frequently used to simulate the impacts of numerous random processes from natural sources that occur in digital images, it was chosen as the best fit to represent the additive noise in the unwanted signals at the receiving node. In this work, we focus on typical three-channel, or red, green and blue, color images. Thus, an array can be utilized to represent an image of size . It is expected that Alice, Relay and Bob perfectly share channel information and decoding information via authorized channels.
In the proposed SCR protocol, the image communications between Alice and Bob can be realized in two time slots: (i) in the first time slot, Alice sends the RLNC-encoded image to both Relay and Bob; and (ii) in the second time slot, Relay decodes the received image, performs RLNC encoding and forwards the encoded image to Bob. Over the shared wireless media, Eve can overhear and try to decode the images in both time slots from Alice and Relay using the wiretap links.
4. Proposed Secure Cooperative Relaying for Image Communications
In order to improve the security of images transferred over WRNs with low transmission bandwidth, we introduce SCR protocol in this section, along with the image processing, encoding and decoding procedure.
4.1. Image Downscaling, Concealing and Transmission at Alice
To reduce transmission bandwidth use, Alice first creates an LR version of the original HR image by downscaling with bicubic interpolation (the bicubic filter is taken into consideration in this work due to its low processing complexity) and encoding it before transmission, using the same strategy as ISR [
19].
Let of size denote the original RGB image that Alice wants to send to Bob. Applying bicubic interpolation with a scaling factor , we can obtain an LR version of the original image as of size , where and . Here, denotes the ceiling operator.
In the proposed SCR protocol, RLNC is applied to encode the image at Alice by mixing the LR image, i.e.,
, with a reference image, denoted by
, which is randomly selected from a shared image datastore
. The image datastore
can be accessed by all legitimate users, i.e., Alice, Bob and Relay. Additionally, a Trust and Reputation Management (TRM) system [
41] is used to lessen the effects of errant or misbehaving nodes in the WRN. The encoded image at Alice, denoted by
, can be given by
where
,
,
of size
are RLNC coefficient matrices at Alice and ∘ denotes the element-wise multiplication, also known as the Hadamard product, of two matrices. Let
,
,
denote the coefficient in matrix
. In order to restrict the value of the image pixels of the encoded image not exceeding its range,
is in the range
and
.
Remark 1 (Impacts of RLNC coefficient matrices). Coefficients in RLNC matrices and represent the fractions of the LR image and the reference image , respectively, in the encoded image at Alice. An appropriate allocation of the RLNC coefficients would enhance the image decodability, while maintaining the security of the image communications in WRNs. Specifically, a higher , , , , results in a better decodability of image pixel, while more secure image communications can be obtained with a higher .
Remark 2 (Impacts of scaling factor). Transmission bandwidth of is saved at Alice when the original HR image is downscaled by a scaling factor of ϵ. This is due to the fact that the image size is reduced ϵ times in both directions..
The RLNC-encoded image is then sent to both Relay and Bob in the form of a modulated data packet, denoted by , over the legitimate wireless channels.
4.2. Image Decoding at Relay and Image Recovery at Bob in the First Time Slot
In the first time slot, the received signals at Relay and Bob can be written by
where
and
is an independent AWGN vector at node
with zero mean and variance of
for each entry.
The data received from Alice are decoded by Relay and Bob indicated by
,
. A deep neural network is employed to denoise the image using a pretrained DnCNN network [
24]. Let
denote the denoised image at node
. Using the shared reference image from Alice, i.e.,
, and RLNC coefficient matrices, i.e.,
and
, Relay and Bob can decode the original image as
respectively, where ⊘ denotes the element-wise division of two matrices.
Additionally, utilizing the ISR framework, which was trained using the publicly accessible IAPR TC-12 Benchmark dataset [
42], Bob recovers the full size of the original image after decoding. The hyper-parameters used for training in the proposed SCR protocol are similar to those in [
19] with batch size of 64 in 100 epochs, initial learning rate of
and different scaling factors
. The upscaled HR image recovered at Bob in the first time slot, denoted by
, can be thus obtained by
where
denotes the ISR operator to reconstruct the upscaled images with scaling factor
.
4.3. Image Concealing and Forwarding at Relay in the Second Time Slot
In the proposed SCR protocol, Relay first conceals the recovered image from Alice prior to forwarding to Bob in the second time slot.
Following the RLNC method, Relay encodes the recovered image from Alice, i.e.,
, by mixing it with a reference image, denoted by
. The reference image
at Relay is different from that at Alice, though it is also randomly selected from the same image datastore
shared between the legitimate users. It is defined as follows:
where
,
,
of size
are RLNC coefficient matrices at Relay. Denoting the coefficient in matrix
by
,
,
, the same condition is applied to restrict the value of the image pixels of the encoded image at Relay not exceeding its range, i.e.,
and
.
Then, Relay forwards the encoded image to Bob in the form of a modulated data packet, denoted by .
4.4. Image Recovery, Super Resolution and Fusion at Bob in the Second Time Slot
The received signal at Bob in the second time slot can be written by
where
is an AWGN vector at Bob with zero mean and variance of
for each entry.
In a similar way, the data received from Alice are decoded by Bob, indicated by
, and Bob denoises the image using the pretrained DnCNN network as
. Following the same approach as in the first time slot, Bob recovers the image transmitted from Relay using RLNC decoding as follows:
It is worth noticing that the reference image and the RLNC coefficient matrices employed for RLNC encoding at the Relay are shared with Bob to be able to recover the image transmitted from Relay.
Employing an ISR framework, Bob can also obtain the complete size of the original HR image that Alice sent, which is indicated by
, as
Finally, Bob combines the recovered images in both time slots by overlaying
in (
5) and
in (
9) to produce a blended image as
where
,
, denotes the fraction of the
i-th HR image in the composite image.
4.5. Image Decoding and Estimation at Eve in Both Time Slots
Because of the wireless medium’s broadcast nature, Eve may overhear the data packets carried by Alice and Relay in both time slots, despite the fact that they are not intended for them. The first and second time slots’ received signals at Eve can be written by
respectively, where
,
, is an AWGN vector at Eve in the
i-th time slot with each entry having zero mean and variance of
.
Eve begins by attempting to decipher the data from Alice and Relay as and , respectively. Next, a deep neural network with a pretrained DnCNN network is also employed to denoise both images as and .
Eve, on the other hand, is unaware of the reference images, i.e., and , in the image datastore, which are only shared with legitimate users, along with RLNC coefficient matrices, i.e., , and , , which are used at Alice and Relay for concealing the original image. In order to recover the images, Eve makes an estimate of the RLNC coefficient matrices and searches for the reference images in the datastore.
Let
,
and
,
denote the estimated RLNC coefficient matrices at Alice and Relay, respectively. The elements in the RLNC coefficient matrices at Alice and Relay can be estimated as follows:
where
,
,
,
and
denotes the estimation error of
at Eve.
Additionally, let
and
denote the reference images predicted at Eve for those used at Alice and Relay, respectively. Eve can attempt to decode the original image in the first and the second time slots, respectively, as
Then, Eve can recover the full size of the HR original image by employing ISR in the
i-th time slot,
, as
The recovered images in both time slots are consequently mixed at Eve in a similar fashion:
where
,
, represents the estimated fraction of the
i-th HR image in the composite image at Eve.
For clarity, the above steps of our proposed SCR protocol for image communications in a WRN are illustrated in
Figure 2 where there exist a legitimate direct Alice–Bob and relaying Alice–Relay–Bob links along with eavesdropping Alice–Eve and Relay–Eve links.
5. Simulation Results
We provide the simulation results of the proposed SCR protocol for secure image communications across AWGN channels in WRNs in this section. Peak signal-to-noise ratio (PSNR) and structural similarity index measure (SSIM) are two performance metrics used to evaluate the achievement of the proposed approach. (Other security analyses based on information-theoretic has been employed in [
43] to analyze the amount of leaked information based on the mutual information between the information sent by Alice and that received by Eve.) The PSNR is used to measure the quality of the recovered image at Bob, i.e.,
, with respect to the original HR image at Alice, i.e.,
, while the SSIM measures the similarity of
and
based on their visible structure.
Specifically, the PSNR, in decibels (dB), is defined as
where MSE in (
a) denotes the mean square error between
and
, and (
b) is due to the fact that RGB color images are considered of size
. The PSNR of the reconstructed image at Eve over wiretap links is also evaluated using (
19).
The restored image’s average SSIM at Bob i.e.,
, is computed by [
44]
where
,
and
represent the luminance, contrast and structure components, respectively, at pixel
. Here,
,
and
refer to the weighted combination of these three components correspondingly.
In the following, the performance of the SCR protocol is first compared to that of the SDT protocol, which utilizes just a direct Alice–Bob link, and the SRT protocol, which has only relaying Alice–Relay–Bob links. The impacts of the reference image estimated at Eve, the shared image database between legitimate users, the legitimate communication links, and the wiretap links are then evaluated sequentially to validate the benefit of the proposed SCR protocol in enhancing the security of image communications with the assistance of the relay. For both training and validation, the simulation is carried out in MATLAB. The ISR is trained using an image dataset from the IAPR TC-12 benchmark [
42], which consists of 20,000 still natural images. The scaling factor is in the range 2, 4, 6, 8, 10, the image patch size is 41 by 41, the number of patches per image is 64, and the number of convolutional layers is 20. Specifically, the image input layer consists of 64 3-by-3 filters; the middle layers are made up of 18 alternating convolutional and rectified linear unit (ReLU) layers; the penultimate layer is a convolutional layer with a single 3-by-3-by-64 filter; and the final layer is a regression layer instead of a ReLU layer to compute the MSE between the residual image and network prediction. The ISR network is trained with stochastic gradient descent and momentum optimization using the following hyper-parameter settings: the learning rate is initially set at 0.1 and is reduced by a factor of 10 every 10 epochs up to a maximum of 100 epochs; momentum is set to 0.9; and gradient clipping is enabled using the L2-norm approach to clip gradient values with a gradient threshold of 0.01. For the validation step, 20 undistorted images in
Figure 3 from the Image Processing Toolbox in MATLAB are used. It is worth noting that our research is the first approach employing the SCR with RLNC and ISR for secure image communications in WRNs.
5.1. SCR Protocol versus SRT versus SDT Protocols
Evaluating the effectiveness of the proposed SCR protocol,
Figure 4 illustrates the PSNR and SSIM as a function of the noise variance of the direct Alice–Bob link in the first time slot, i.e.,
. Three secure image communication protocols, including SDT, SRT and the proposed SCR, are considered for comparison. It is assumed that Relay is located between Alice and Bob, where the relaying Alice–Relay and Relay–Bob links experience the same noise variance, which is equal to half of the noise variance of the direct Alice–Bob link, i.e.,
. The noise variances of the wiretap Alice–Eve and Relay–Eve links are assumed to be the same as those of Alice–Bob and Relay–Bob links, respectively, i.e.,
and
. The original HR images at Alice are first downscaled by four times, i.e.,
, prior to transmission. For encoding at Alice and Relay, the elements in RLNC matrices are supposed to be in the range
and known to Bob. For comparison of different secure image communication protocols, in this subsection, Eve is assumed to be aware of the reference images used for the RLNC encoding. As shown in
Figure 4a,b, all protocols gain a greater PSNR performance at Bob up to 8 dB in the PSNR than that at Eve since Eve does not know the RLNC coefficient matrices used at Alice and Bob. In particular, the SCR protocol, for example, outperforms both the SRT and SDT protocols by 0.5 dB and 2 dB, respectively. This is due to the fact that, in the SCR protocol, Relay assists the image communications via relaying links along with the direct link between Alice and Bob, while there is only a direct Alice–Bob link in the SDT protocol and only relaying Alice–Relay and Relay–Bob links are available in the SRT protocol.
5.2. Effectiveness of SCR Protocol for Secure Image Communications
The effectiveness of the proposed SCR protocol is further illustrated in
Figure 5 where the PSNR and SSIM of different secure image communication protocols are plotted versus the noise variance
of the direct Alice–Bob link when the reference images are incorrectly estimated at Eve, i.e.,
and
. Specifically, Eve uses the 9th reference image (see
Figure 3) to decode the image received in both the first and the second time slots, while the correct reference images at Alice and Relay are the 20th and 11th images, respectively. Three protocols, including SDT, SRT and the proposed SCR, are also considered with the same simulation settings as in
Figure 4. It can be perceived in
Figure 5a,b that a significantly enhanced performance is attained at Bob compared to Eve due to the incorrect reference image estimated at Eve. Specifically, the PSNR at Bob in the SCR protocol is of up to 16 dB higher than that at Eve. Furthermore, the SCR protocol with Relay collaboration has been demonstrated to perform better than both the SRT and SDT protocols. This validates the SCR protocol’s usefulness in providing secure image communications between Alice and Bob in WRNs.
5.3. Impacts of Shared Image Dataset
The effects of the reference images are emphasized in
Figure 6, where the PSNR and SSIM are drawn against the noise variance
of the direct link between Alice and Bob with various reference images
and
chosen at Eve. When Eve decodes the overheard images from Alice and Relay for the first and second time slots, respectively, using various reference images, including the 9th, 10th, 14th and 15th images (see
Figure 3), the performance of the SCR protocol is assessed using the same simulation parameters as in
Figure 5. As seen in
Figure 6a,b, the incorrect reference image has a significant negative impact on Eve’s performance. For instance, the best PSNR that Eve can achieve with the 14th reference image over noise-free channels is 15 dB lower than that at Bob and the performance at Eve is even worse when other wrong reference images are used for decoding. Another reason for this degraded performance is that Eve does not know the RLNC coefficient matrices at Alice and Relay. This again shows the effectiveness of the proposed SCR protocol for secure image communications in WRNs.
5.4. Impacts of Scaling Factor
In order to investigate the impacts of scaling factors on the performance of secure image communications in WRNs,
Figure 7 plots the PSNR and SSIM of the proposed SCR protocol versus the noise variance
of the direct link connecting Alice and Bob in the first time slot with regard to various scaling factors, i.e.,
. Eve uses the wrong reference image for decoding and the same simulation parameters as in
Figure 5 are taken into account. The PSNR and SSIM at Bob fall as the scale grows in a low-noise environment, as shown in
Figure 7a,b, although this has little impact in a high-noise environment. In particular, when
is changed from 4 to 10, the PSNR at Bob is reduced by up to 4 dB as
and by less than 1 dB as
. This illustrates how well the proposed approach works to reduce transmission bandwidth by raising the scaling factor with just a minimal impact on the quality of the recovered image, particularly in noisy environments. Additionally, this adjustment in the scale factor’s lowering has little impact on Eve’s performance. This is because, regardless of the scaling factor, Eve cannot decode the image without knowledge of the RLNC coefficient matrices and reference images used at Alice and Relay for encoding.
5.5. Impacts of Direct Link on Secure Image Communications
Taking into account the direct link in WRNs,
Figure 8 plots the PSNR and SSIM of various secure image communication protocols as functions of the noise variance of Alice–Bob link, i.e.,
. The noise variances of Alice–Relay, Relay–Bob, Alice–Eve and Relay–Eve links are fixed as
,
and
, respectively. Three secure image communication protocols, i.e., SDT, SRT and the proposed SCR, are also considered with the same assumption that the original HR images at Alice are firstly downscaled with a scaling factor
prior to transmission and the elements in RLNC matrices for encoding at Alice and Relay are in the range
, which are known to Bob. It can be observed in
Figure 8a,b that the proposed SCR protocol achieves a better performance at Bob than the SRT protocol for the whole range of
and it is shown to be better than the SDT protocol at high
. The SDT protocol is, however, better than both the SCR and SRT protocols at low
. This reflects the practical scenario in which Relay is efficient when the direct Alice–Bob link suffers from high noise. In other words, the usage of Relay is not always necessary, especially when the direct Alice–Bob link is already of good quality.
5.6. Impacts of Relaying Links on Secure Image Communications
Both relaying links, i.e., Alice–Relay and Relay–Bob links, are crucial to enhance the performance of the image transmission from Alice to Bob with the assistance of Relay in WRNs.
Figure 9 plots the PSNR and SSIM of different protocols versus the noise variance of Alice–Relay link, i.e.,
, while the impacts of Relay–Bob link, i.e.,
, on the performance of the secure image communications are illustrated in
Figure 10. It is assumed that the noise variance of Relay–Bob link is
in
Figure 9, while that of Alice–Relay link is
dB in
Figure 10. In both figures, the noise variances of other links are
,
and
, whereas other parameters are similarly set as those in
Figure 8. It can be observed in
Figure 9 and
Figure 10 that a better performance is achieved with the proposed SCR protocol compared to the SRT protocol at high
and high
. Meanwhile, the SDT scheme is shown to be independent of the quality of the relaying links as Relay is not involved in communications between Alice and Bob. Specifically, an enhancement of 1 dB and 2 dB in PSNR can be achieved with the SCR protocol compared to the SRT protocol when
and
, respectively. This is due to the fact that the direct link can collaborate with the relaying links to decode the image at Bob in the SCR protocol when the relaying links suffer from high noise.
5.7. Impacts of Wiretap Links on Secure Image Communications
Considering the scenario when Eve may experience different wiretap channels,
Figure 11 and
Figure 12 sequentially plot the PSNR and SSIM of different secure image protocols against the noise variances of the Alice–Eve link and Relay–Eve link, respectively. In both figures, the noise variances of Alice–Bob, Alice–Relay and Relay–Bob links are set as
,
and
, respectively. For wiretap channels, the noise variance of the Relay–Eve link is
, while the Alice–Eve link in
Figure 12 experiences a noise with
. It can be seen in both
Figure 11 and
Figure 12 that the performance at Eve is not much affected by the variation in noise variances of the wiretap links. Specifically, the PSNR at Eve with the SCR protocol reduces 0.5 dB and 0.2 dB when
and
increase from 0 to 0.2, while there is only a slight change in the performance of the SRT and SDT protocols. In fact, Eve is not aware of the RLNC coefficient matrices nor the reference images used at Alice and Relay; consequently, an enhanced quality of wiretap links does not help improve the decoding performance at Eve.