Open Access
ARTICLE
Secure IoT Data Transmission Using MPEG Derived Motion Vectors and Dual Encryption Techniques
Sara H. Elsayed1, Rodaina Abdelsalam1, Mahmoud A. Ismail Shoman2, Raed Alotaibi3,*, Omar Reyad4,5,*
1 Faculty of Computers and Information Technology, EELU, Giza, Egypt
2 Faculty of Computers and Artificial Intelligence, Cairo University, Giza, Egypt
3 Applied College, Shaqra University, Shaqra, Saudi Arabia
4 College of Computing and Information Technology, Shaqra University, Shaqra, Saudi Arabia
5 Faculty of Computers and Artificial Intelligence, Sohag University, Sohag, Egypt
* Corresponding Author: Raed Alotaibi. Email:
; Omar Reyad. Email:
(This article belongs to the Special Issue: Security and Privacy in IoT: Cross-Domain Approaches and Cryptographic Innovations)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.079018
Received 13 January 2026; Accepted 23 February 2026; Published online 06 March 2026
Abstract
In today’s digitally connected world, where cyber threats are becoming increasingly complex, finding modern and secure text encryption solutions that maintain maximum runtime performance while offering high-level protection is more crucial. The deployment of sophisticated security paradigms is often accompanied by a significant escalation in computational overhead. Thus, the fundamental objective resides in the mitigation of computational overhead while maintaining an uncompromising security posture. Internet of Things (IoT) devices require strong security measures for data transmission. Also, protecting communication channels against illegal access and eavesdropping has become crucial due to the exponential expansion of the IoT. The IoT implementations frequently have weak, unencrypted data streams that are susceptible to manipulation and interception. In order to overcome this, the proposed work incorporates lightweight protection using Moving Picture Experts Group (MPEG) derived motion vectors and dual encryption techniques to guarantee message confidentiality and integrity via limited IoT networks. The proposed method starts with resizing MPEG video frames to dimensions [1080, 1920]. After extracting motion vectors from two successive video frames, scale the obtained vectors to 1000. The exclusive OR (XOR) procedure is applied to the combined motion vectors. A one-dimensional (1D) vector is then produced. The initial elliptic curve Diffie-Hellman (ECDH) private key is created using a mapping of a hash function. The public keys, shared secret keys, and a second private key are also created. The shared secret key is used to generate the Advanced Encryption Standard (AES) main key. After that, the created AES is used to encrypt and decrypt text messages ranging in length from 10 to 300 bytes. Several evaluation metrics, including mean square error (MSE), peak signal to noise ratio (PSNR), correlation coefficient (CC), avalanche Effect (AE), and compression ratio (CR) values, are evaluated between the original and ciphertext. The presented method has demonstrated optimal performance in terms of encryption and decryption times as well as public and private key generation. Thus, improving the IoT application’s overall security condition by guaranteeing that only authorized endpoints can decrypt and read the data, and showing minimal latency overhead as compared to insecure transmission. This suggests that it is a highly effective solution for secure text communication, offering lightweight encryption suitable for a wide range of resource-constrained and real-time applications.
Keywords
MPEG; motion vectors; encryption; decryption; IoT; ECDH; AES; MES; PSNR; CC; AE; CR