A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit. Among various data types, digital images often carry highly sensitive information, making their protection against breaches essential. This study intr...

Full description

Saved in:
Bibliographic Details
Main Authors: Muhammad Aqeel, Arfan Jaffar, Muhammad Faheem, Muhammad Waqar Ashraf, Nadeem Iqbal, Shahid Yousaf, Hossam Diab
Format: Article
Language:English
Published: Wiley 2025-01-01
Series:Engineering Reports
Subjects:
Online Access:https://doi.org/10.1002/eng2.13099
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832576657359110144
author Muhammad Aqeel
Arfan Jaffar
Muhammad Faheem
Muhammad Waqar Ashraf
Nadeem Iqbal
Shahid Yousaf
Hossam Diab
author_facet Muhammad Aqeel
Arfan Jaffar
Muhammad Faheem
Muhammad Waqar Ashraf
Nadeem Iqbal
Shahid Yousaf
Hossam Diab
author_sort Muhammad Aqeel
collection DOAJ
description ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit. Among various data types, digital images often carry highly sensitive information, making their protection against breaches essential. This study introduces a novel image encryption algorithm specifically designed to bolster the security of images in resource‐constrained IoT ecosystems. Leveraging the randomness of a 5D multi‐wing hyperchaotic map, the proposed method employs pairs of non‐overlapping rectangles to induce confusion by swapping the pixels they encompass. Repeated iterations of this operation achieve significant confusion effects, enhancing encryption strength. To validate the robustness of the proposed algorithm, standard benchmark images were utilized, and rigorous security metrics —including information entropy, correlation coefficient, histogram uniformity, and resistance to differential attacks —were analyzed. Results demonstrate that the algorithm not only ensures strong protection against unauthorized access but also maintains low computational complexity, making it ideal for IoT applications. This research provides a foundational step toward ensuring the confidentiality and integrity of visual data in an increasingly interconnected digital world.
format Article
id doaj-art-ef8bb8568e39442f909e5b16ba62400e
institution Kabale University
issn 2577-8196
language English
publishDate 2025-01-01
publisher Wiley
record_format Article
series Engineering Reports
spelling doaj-art-ef8bb8568e39442f909e5b16ba62400e2025-01-31T00:22:49ZengWileyEngineering Reports2577-81962025-01-0171n/an/a10.1002/eng2.13099A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) ApplicationsMuhammad Aqeel0Arfan Jaffar1Muhammad Faheem2Muhammad Waqar Ashraf3Nadeem Iqbal4Shahid Yousaf5Hossam Diab6Department of Computer Science & IT Superior University Lahore PakistanDepartment of Computer Science & IT Superior University Lahore PakistanSchool of Technology and Innovations University of Vaasa Vaasa FinlandDepartment of Computer Engineering Bahauddin Zakariya University Multan PakistanDepartment of Computer Science & IT The University of Lahore Lahore PakistanDepartment of Computer Science & IT The University of Lahore Lahore PakistanMath and Computer Science Department Faculty of Science, Menoufıa University Menoufıa EgyptABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit. Among various data types, digital images often carry highly sensitive information, making their protection against breaches essential. This study introduces a novel image encryption algorithm specifically designed to bolster the security of images in resource‐constrained IoT ecosystems. Leveraging the randomness of a 5D multi‐wing hyperchaotic map, the proposed method employs pairs of non‐overlapping rectangles to induce confusion by swapping the pixels they encompass. Repeated iterations of this operation achieve significant confusion effects, enhancing encryption strength. To validate the robustness of the proposed algorithm, standard benchmark images were utilized, and rigorous security metrics —including information entropy, correlation coefficient, histogram uniformity, and resistance to differential attacks —were analyzed. Results demonstrate that the algorithm not only ensures strong protection against unauthorized access but also maintains low computational complexity, making it ideal for IoT applications. This research provides a foundational step toward ensuring the confidentiality and integrity of visual data in an increasingly interconnected digital world.https://doi.org/10.1002/eng2.13099chaoscyber securitydecryptionencryptionimage processingIoT
spellingShingle Muhammad Aqeel
Arfan Jaffar
Muhammad Faheem
Muhammad Waqar Ashraf
Nadeem Iqbal
Shahid Yousaf
Hossam Diab
A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
Engineering Reports
chaos
cyber security
decryption
encryption
image processing
IoT
title A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
title_full A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
title_fullStr A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
title_full_unstemmed A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
title_short A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
title_sort randomized non overlapping encryption scheme for enhanced image security in internet of things iot applications
topic chaos
cyber security
decryption
encryption
image processing
IoT
url https://doi.org/10.1002/eng2.13099
work_keys_str_mv AT muhammadaqeel arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT arfanjaffar arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT muhammadfaheem arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT muhammadwaqarashraf arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT nadeemiqbal arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT shahidyousaf arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT hossamdiab arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT muhammadaqeel randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT arfanjaffar randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT muhammadfaheem randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT muhammadwaqarashraf randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT nadeemiqbal randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT shahidyousaf randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications
AT hossamdiab randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications