A Randomized Non-overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

dc.contributor.authorAqeel, Muhammad
dc.contributor.authorJaffar, Arfan
dc.contributor.authorFaheem, Muhammad
dc.contributor.authorAshraf, Muhammad Waqar
dc.contributor.authorIqbal, Nadeem
dc.contributor.authorYousaf, Shahid
dc.contributor.authorDiab, Hossam
dc.contributor.orcidhttps://orcid.org/0000-0003-4628-4486
dc.date.accessioned2026-01-27T10:13:00Z
dc.date.issued2025
dc.description.abstractThe rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit. Among various data types, digital images often carry highly sensitive information, making their protection against breaches essential. This study introduces a novel image encryption algorithm specifically designed to bolster the security of images in resource-constrained IoT ecosystems. Leveraging the randomness of a 5D multi-wing hyperchaotic map, the proposed method employs pairs of non-overlapping rectangles to induce confusion by swapping the pixels they encompass. Repeated iterations of this operation achieve significant confusion effects, enhancing encryption strength. To validate the robustness of the proposed algorithm, standard benchmark images were utilized, and rigorous security metrics — including information entropy, correlation coefficient, histogram uniformity, and resistance to differential attacks — were analyzed. Results demonstrate that the algorithm not only ensures strong protection against unauthorized access but also maintains low computational complexity, making it ideal for IoT applications. This research provides a foundational step toward ensuring the confidentiality and integrity of visual data in an increasingly interconnected digital world.en
dc.description.notification© 2025 The Author(s). Engineering Reports published by John Wiley & Sons Ltd. This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited. http://creativecommons.org/licenses/by/4.0/
dc.description.reviewstatusfi=vertaisarvioitu|en=peerReviewed|
dc.identifier.urihttps://osuva.uwasa.fi/handle/11111/19701
dc.identifier.urnURN:NBN:fi-fe202601279317
dc.language.isoen
dc.publisherJohn Wiley & Sons
dc.relation.doihttps://doi.org/10.1002/eng2.13099
dc.relation.funderVaasan yliopistofi
dc.relation.funderUniversity of Vaasaen
dc.relation.funderTeknologian tutkimuskeskus VTTfi
dc.relation.funderVTT Technical Research Centre of Finlanden
dc.relation.ispartofjournalEngineering reports
dc.relation.issn2577-8196
dc.relation.issue1
dc.relation.urlhttps://doi.org/10.1002/eng2.13099
dc.relation.urlhttps://urn.fi/URN:NBN:fi-fe202601279317
dc.relation.volume7
dc.rightshttps://creativecommons.org/licenses/by/4.0/
dc.source.identifierWOS:001409619600004
dc.source.identifier2-s2.0-85215290806
dc.source.identifier2d41b786-5d87-4c43-af1b-45aef3b1943c
dc.source.metadataSoleCRIS
dc.subjectchaos
dc.subjectcyber security
dc.subjectdecryption
dc.subjectencryption
dc.subjectimage processing
dc.subjectIoT
dc.subjectsecret key
dc.subject.disciplinefi=Tietotekniikka tekn|en=Information Technology tech|
dc.titleA Randomized Non-overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications
dc.type.okmfi=A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä (vertaisarvioitu)|en=A1 Journal article (peer-reviewed)|
dc.type.publicationarticle
dc.type.versionpublishedVersion

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
nbnfi-fe202601279317.pdf
Size:
27.92 MB
Format:
Adobe Portable Document Format

Kokoelmat