A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit. Among various data types, digital images often carry highly sensitive information, making their protection against breaches essential. This study intr...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2025-01-01
|
Series: | Engineering Reports |
Subjects: | |
Online Access: | https://doi.org/10.1002/eng2.13099 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832576657359110144 |
---|---|
author | Muhammad Aqeel Arfan Jaffar Muhammad Faheem Muhammad Waqar Ashraf Nadeem Iqbal Shahid Yousaf Hossam Diab |
author_facet | Muhammad Aqeel Arfan Jaffar Muhammad Faheem Muhammad Waqar Ashraf Nadeem Iqbal Shahid Yousaf Hossam Diab |
author_sort | Muhammad Aqeel |
collection | DOAJ |
description | ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit. Among various data types, digital images often carry highly sensitive information, making their protection against breaches essential. This study introduces a novel image encryption algorithm specifically designed to bolster the security of images in resource‐constrained IoT ecosystems. Leveraging the randomness of a 5D multi‐wing hyperchaotic map, the proposed method employs pairs of non‐overlapping rectangles to induce confusion by swapping the pixels they encompass. Repeated iterations of this operation achieve significant confusion effects, enhancing encryption strength. To validate the robustness of the proposed algorithm, standard benchmark images were utilized, and rigorous security metrics —including information entropy, correlation coefficient, histogram uniformity, and resistance to differential attacks —were analyzed. Results demonstrate that the algorithm not only ensures strong protection against unauthorized access but also maintains low computational complexity, making it ideal for IoT applications. This research provides a foundational step toward ensuring the confidentiality and integrity of visual data in an increasingly interconnected digital world. |
format | Article |
id | doaj-art-ef8bb8568e39442f909e5b16ba62400e |
institution | Kabale University |
issn | 2577-8196 |
language | English |
publishDate | 2025-01-01 |
publisher | Wiley |
record_format | Article |
series | Engineering Reports |
spelling | doaj-art-ef8bb8568e39442f909e5b16ba62400e2025-01-31T00:22:49ZengWileyEngineering Reports2577-81962025-01-0171n/an/a10.1002/eng2.13099A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) ApplicationsMuhammad Aqeel0Arfan Jaffar1Muhammad Faheem2Muhammad Waqar Ashraf3Nadeem Iqbal4Shahid Yousaf5Hossam Diab6Department of Computer Science & IT Superior University Lahore PakistanDepartment of Computer Science & IT Superior University Lahore PakistanSchool of Technology and Innovations University of Vaasa Vaasa FinlandDepartment of Computer Engineering Bahauddin Zakariya University Multan PakistanDepartment of Computer Science & IT The University of Lahore Lahore PakistanDepartment of Computer Science & IT The University of Lahore Lahore PakistanMath and Computer Science Department Faculty of Science, Menoufıa University Menoufıa EgyptABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit. Among various data types, digital images often carry highly sensitive information, making their protection against breaches essential. This study introduces a novel image encryption algorithm specifically designed to bolster the security of images in resource‐constrained IoT ecosystems. Leveraging the randomness of a 5D multi‐wing hyperchaotic map, the proposed method employs pairs of non‐overlapping rectangles to induce confusion by swapping the pixels they encompass. Repeated iterations of this operation achieve significant confusion effects, enhancing encryption strength. To validate the robustness of the proposed algorithm, standard benchmark images were utilized, and rigorous security metrics —including information entropy, correlation coefficient, histogram uniformity, and resistance to differential attacks —were analyzed. Results demonstrate that the algorithm not only ensures strong protection against unauthorized access but also maintains low computational complexity, making it ideal for IoT applications. This research provides a foundational step toward ensuring the confidentiality and integrity of visual data in an increasingly interconnected digital world.https://doi.org/10.1002/eng2.13099chaoscyber securitydecryptionencryptionimage processingIoT |
spellingShingle | Muhammad Aqeel Arfan Jaffar Muhammad Faheem Muhammad Waqar Ashraf Nadeem Iqbal Shahid Yousaf Hossam Diab A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications Engineering Reports chaos cyber security decryption encryption image processing IoT |
title | A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications |
title_full | A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications |
title_fullStr | A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications |
title_full_unstemmed | A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications |
title_short | A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications |
title_sort | randomized non overlapping encryption scheme for enhanced image security in internet of things iot applications |
topic | chaos cyber security decryption encryption image processing IoT |
url | https://doi.org/10.1002/eng2.13099 |
work_keys_str_mv | AT muhammadaqeel arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT arfanjaffar arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT muhammadfaheem arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT muhammadwaqarashraf arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT nadeemiqbal arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT shahidyousaf arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT hossamdiab arandomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT muhammadaqeel randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT arfanjaffar randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT muhammadfaheem randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT muhammadwaqarashraf randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT nadeemiqbal randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT shahidyousaf randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications AT hossamdiab randomizednonoverlappingencryptionschemeforenhancedimagesecurityininternetofthingsiotapplications |