Open Access iconOpen Access



Novel Image Encryption and Compression Scheme for IoT Environment

Mesfer Al Duhayyim1, Fahd N. Al-Wesabi2, Radwa Marzouk3, Manar Ahmed Hamza4, Anwer Mustafa Hilal4,*, Majdy M. Eltahir2

1 Department of Natural and Applied Sciences, College of Community-Aflaj, Prince Sattam bin Abdulaziz University, Saudi Arabia
2 Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Saudi Arabia
3 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Saudi Arabia
4 Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia

* Corresponding Author: Anwer Mustafa Hilal. Email: email

Computers, Materials & Continua 2022, 71(1), 1443-1457.


Latest advancements made in the processing abilities of smart devices have resulted in the designing of Intelligent Internet of Things (IoT) environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assisted environment since it contains visual sensors that examine the surroundings from a number of overlapping views by capturing the images incessantly. Since IoT devices generate a massive quantity of digital media, it is therefore required to save the media, especially images, in a secure way. In order to achieve security, encryption techniques as well as compression techniques are employed to reduce the amount of digital data, being communicated over the network. Encryption Then Compression (ETC) techniques pave a way for secure and compact transmission of the available data to prevent unauthorized access. With this background, the current research paper presents a new ETC technique to accomplish image security in IoT environment. The proposed model involves three major processes namely, IoT-based image acquisition, encryption, and compression. The presented model involves optimal Signcryption Technique with Whale Optimization Algorithm (NMWOA) abbreviated as ST-NMWOA. The optimal key generation of signcryption technique takes place with the help of NMWOA. Besides, the presented model also uses Discrete Fourier Transform (DFT) and Matrix Minimization (MM) algorithm-based compression technique. Extensive set of experimental analysis was conducted to validate the effective performance of the proposed model. The obtained values infer that the presented model is superior in terms of both compression efficiency and data secrecy in resource-limited IoT environment.


Cite This Article

M. Al Duhayyim, F. N. Al-Wesabi, R. Marzouk, M. Ahmed Hamza, A. Mustafa Hilal et al., "Novel image encryption and compression scheme for iot environment," Computers, Materials & Continua, vol. 71, no.1, pp. 1443–1457, 2022.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1441


  • 863


  • 0


Share Link