A Lightweight Cryptographic Solution for Enhanced Image Security
Received: 24 April 2025 | Revised: 25 June 2025 and 13 July 2025 | Accepted: 16 July 2025 | Online: 6 October 2025
Corresponding author: Qasem Abu Al-Haija
Abstract
Protecting the confidentiality of images is considered critical for all industries. Encryption stands out as the foremost protective strategy for image security. However, various image dimensions and quality concerns challenge conventional encryption methods in balancing the security objective, substantial computational resources, and image quality. This paper presents a lightweight cryptographic approach designed to match the robustness of traditional encryption schemes while minimizing the computational and time requirements to be more suitable for real-time applications and IoT environments. The proposed approach extracts the three Most Significant Bit (MSB) planes from the original image. Then, it applies a permutation on each bit plane using a chaotic logistic map to generate the key used as new indices for effective permutation of pixel locations. A set of performance metrics, such as the Correlation Coefficient (CC), Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and CPU and RAM utilization, is used in the evaluation process. The results indicate that the proposed approach outperforms the traditional Advanced Encryption Standard (AES) in terms of computational efficiency and overhead. A 2% reduction in CPU and RAM utilization and a 96% decrease in extraction time were achieved while maintaining comparable security based on MSE, PSNR, and CC to AES. This improvement in efficiency is achieved while maintaining an acceptable level of security, which makes it more suitable for resource-constrained IoT devices.
Keywords:
cryptography, histogram, Coefficient Correlation (CC), Mean Square Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Advanced Encryption Standard (AES)Downloads
References
V. K. P. Kalubandi, H. Vaddi, V. Ramineni, and A. Loganathan, "A novel image encryption algorithm using AES and visual cryptography," in 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, India, Oct. 2016, pp. 808–813.
A. Kadir, M. Aili, and M. Sattar, "Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections," Optik, vol. 129, pp. 231–238, Jan. 2017.
L. Liu and S. Miao, "A new image encryption algorithm based on logistic chaotic map with varying parameter," SpringerPlus, vol. 5, no. 1, Mar. 2016, Art. no. 289.
B. Mondal, "Cryptographic Image Scrambling Techniques," in Cryptographic and Information Security, 1st ed., S. Ramakrishnan, Ed. Boca Raton, FL, USA: CRC Press, 2018, pp. 37–65.
Z. Mu and H. Liu, "Research on digital media image encryption algorithm based on Logistic chaotic map," in 2020 International Conference on Robots & Intelligent System (ICRIS), Sanya, China, Nov. 2020, pp. 108–111.
G. Spasova and M. Karova, "A New Secure Image Encryption Model Based on Symmetric Key," in 2021 International Conference on Biomedical Innovations and Applications (BIA), Varna, Bulgaria, Jun. 2022, pp. 107–110.
A. Shafique and J. Ahmed, "A Color Image Encryption Algorithm Based on Chaotic Map and Discrete Wavelet Transform," in 2022 Global Conference on Wireless and Optical Technologies (GCWOT), Malaga, Spain, Feb. 2022, pp. 1–5.
S. Saudagar et al., "Image Encryption based on Advanced Encryption Standard (AES)," in 2023 International Conference for Advancement in Technology (ICONAT), Goa, India, Jan. 2023, pp. 1–4.
H. Wang, Q. Wang, L. Yu, and J. Zhao, "Image Encryption Algorithm Based on Double Scrambling," in 2019 IEEE International Conference on Mechatronics and Automation (ICMA), Tianjin, China, Aug. 2019, pp. 2201–2205.
A. Hennache, M. L. Hennache, and S. M. A. Ghaly, "Improving the RSA Encryption for Images by Introducing DNA Sequence Encoding," Engineering, Technology & Applied Science Research, vol. 14, no. 6, pp. 17786–17791, Dec. 2024.
S. J. Edan, M. N. Rasoul, and A. A. Aljarrah, "RSA-based Encryption Algorithm for Digital Images," in 2022 Iraqi International Conference on Communication and Information Technologies (IICCIT), Basrah, Iraq, Sep. 2022, pp. 303–308.
N. Sofian, A. Wicaksana, and S. Hansun, "LSB Steganography and AES Encryption for Multiple PDF Documents," in 2019 5th International Conference on New Media Studies (CONMEDIA), Bali, Indonesia, Oct. 2019, pp. 100–105.
E. S. Atwal and U. Kumar, "A Comparative Analysis of Different Encryption Algorithms: RSA, AES, DSS for Data Security." Preprints.org, Apr. 26, 2021.
A. Chaouch, B. Bouallegue, and O. Bouraoui, "Software application for simulation-based AES, RSA and elliptic-curve algorithms," in 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), Monastir, Tunisia, Mar. 2016, pp. 77–82.
Z. Man, J. Li, X. Di, Y. Sheng, and Z. Liu, "Double image encryption algorithm based on neural network and chaos," Chaos, Solitons & Fractals, vol. 152, Nov. 2021, Art. no. 111318.
Y. Alghamdi, A. Munir, and J. Ahmad, "A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution," Entropy, vol. 24, no. 10, Sep. 2022, Art. no. 1344.
S. A. Abead and N. H. M. Ali, "Lightweight Block and Stream Cipher Algorithm: A Review," Journal of Applied Engineering and Technological Science (JAETS), vol. 5, no. 2, pp. 860–874, Jun. 2024.
P. Kumari and B. Mondal, "Lightweight encryption scheme based on a new NLFSR," Multimedia Tools and Applications, vol. 83, no. 24, pp. 64919–64943, Jul. 2024.
Downloads
How to Cite
License
Copyright (c) 2025 Mohammad Alnabhan, Ali El-Qasass, Mohammad Atoum, Qasem Abu Al-Haija, Ahmad Habboush

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.