Open Access
ARTICLE
Novel Image Encryption and Compression Scheme for IoT Environment
1 Department of Natural and Applied Sciences, College of Community-Aflaj, Prince Sattam bin Abdulaziz University, Saudi Arabia
2 Department of Computer Science, College of Science & Art at Mahayil, King Khalid University, Saudi Arabia
3 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Saudi Arabia
4 Department of Computer and Self Development, Preparatory Year Deanship, Prince Sattam bin Abdulaziz University, AlKharj, Saudi Arabia
* Corresponding Author: Anwer Mustafa Hilal. Email:
Computers, Materials & Continua 2022, 71(1), 1443-1457. https://doi.org/10.32604/cmc.2022.021873
Received 18 July 2021; Accepted 30 August 2021; Issue published 03 November 2021
Abstract
Latest advancements made in the processing abilities of smart devices have resulted in the designing of Intelligent Internet of Things (IoT) environment. This advanced environment enables the nodes to connect, collect, perceive, and examine useful data from its surroundings. Wireless Multimedia Surveillance Networks (WMSNs) form a vital part in IoT-assisted environment since it contains visual sensors that examine the surroundings from a number of overlapping views by capturing the images incessantly. Since IoT devices generate a massive quantity of digital media, it is therefore required to save the media, especially images, in a secure way. In order to achieve security, encryption techniques as well as compression techniques are employed to reduce the amount of digital data, being communicated over the network. Encryption Then Compression (ETC) techniques pave a way for secure and compact transmission of the available data to prevent unauthorized access. With this background, the current research paper presents a new ETC technique to accomplish image security in IoT environment. The proposed model involves three major processes namely, IoT-based image acquisition, encryption, and compression. The presented model involves optimal Signcryption Technique with Whale Optimization Algorithm (NMWOA) abbreviated as ST-NMWOA. The optimal key generation of signcryption technique takes place with the help of NMWOA. Besides, the presented model also uses Discrete Fourier Transform (DFT) and Matrix Minimization (MM) algorithm-based compression technique. Extensive set of experimental analysis was conducted to validate the effective performance of the proposed model. The obtained values infer that the presented model is superior in terms of both compression efficiency and data secrecy in resource-limited IoT environment.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.