This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Open AccessArticle
A Novel ECC-Based Method for Secure Image Encryption
1
Mathematics, Computer Science and Applications TEAM, ENSA, Tangier 90000, Morocco
2
Normandie University, UNICAEN, CNRS, LMNO, 14000 Caen, France
*
Author to whom correspondence should be addressed.
Algorithms 2025, 18(8), 514; https://doi.org/10.3390/a18080514 (registering DOI)
Submission received: 13 July 2025
/
Revised: 12 August 2025
/
Accepted: 13 August 2025
/
Published: 14 August 2025
Abstract
As the Internet of Things (IoT) expands, ensuring secure and efficient image transmission in resource-limited environments has become crucial and important. In this paper, we propose a lightweight image encryption scheme based on Elliptic Curve Cryptography (ECC), tailored for embedded and IoT applications. In this scheme, the image data blocks are mapped into elliptic curve points using a decimal embedding algorithm and shuffled to improve resistance to tampering and noise. Moreover, an OTP-like operation is applied to enhance the security while avoiding expensive point multiplications. The proposed scheme meets privacy and cybersecurity requirements with low computational costs. Classical security metrics such as entropy, correlation, NPCR, UACI, and key sensitivity confirm its strong robustness. Rather than relying solely on direct comparisons with existing benchmarks, we employ rigorous statistical analyses to objectively validate the encryption scheme’s robustness and security. Furthermore, we propose a formal security analysis that demonstrates the resistance of the new scheme to chosen-plaintext attacks and noise and cropping attacks, while the GLCM analysis confirms the visual encryption quality. Our scheme performs the encryption of a image in only 0.23 s on a 1 GB RAM virtual machine, showing its efficiency and suitability for real-time IoT systems. Our method can be easily applied to guarantee the security and the protection of lightweight data in future smart environments.
Share and Cite
MDPI and ACS Style
Lahraoui, Y.; Lazaar, S.; Amal, Y.; Nitaj, A.
A Novel ECC-Based Method for Secure Image Encryption. Algorithms 2025, 18, 514.
https://doi.org/10.3390/a18080514
AMA Style
Lahraoui Y, Lazaar S, Amal Y, Nitaj A.
A Novel ECC-Based Method for Secure Image Encryption. Algorithms. 2025; 18(8):514.
https://doi.org/10.3390/a18080514
Chicago/Turabian Style
Lahraoui, Younes, Saiida Lazaar, Youssef Amal, and Abderrahmane Nitaj.
2025. "A Novel ECC-Based Method for Secure Image Encryption" Algorithms 18, no. 8: 514.
https://doi.org/10.3390/a18080514
APA Style
Lahraoui, Y., Lazaar, S., Amal, Y., & Nitaj, A.
(2025). A Novel ECC-Based Method for Secure Image Encryption. Algorithms, 18(8), 514.
https://doi.org/10.3390/a18080514
Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details
here.
Article Metrics
Article metric data becomes available approximately 24 hours after publication online.