Previous Article in Journal
A Multimodal Affective Interaction Architecture Integrating BERT-Based Semantic Understanding and VITS-Based Emotional Speech Synthesis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

A Novel ECC-Based Method for Secure Image Encryption

1
Mathematics, Computer Science and Applications TEAM, ENSA, Tangier 90000, Morocco
2
Normandie University, UNICAEN, CNRS, LMNO, 14000 Caen, France
*
Author to whom correspondence should be addressed.
Algorithms 2025, 18(8), 514; https://doi.org/10.3390/a18080514 (registering DOI)
Submission received: 13 July 2025 / Revised: 12 August 2025 / Accepted: 13 August 2025 / Published: 14 August 2025
(This article belongs to the Section Combinatorial Optimization, Graph, and Network Algorithms)

Abstract

As the Internet of Things (IoT) expands, ensuring secure and efficient image transmission in resource-limited environments has become crucial and important. In this paper, we propose a lightweight image encryption scheme based on Elliptic Curve Cryptography (ECC), tailored for embedded and IoT applications. In this scheme, the image data blocks are mapped into elliptic curve points using a decimal embedding algorithm and shuffled to improve resistance to tampering and noise. Moreover, an OTP-like operation is applied to enhance the security while avoiding expensive point multiplications. The proposed scheme meets privacy and cybersecurity requirements with low computational costs. Classical security metrics such as entropy, correlation, NPCR, UACI, and key sensitivity confirm its strong robustness. Rather than relying solely on direct comparisons with existing benchmarks, we employ rigorous statistical analyses to objectively validate the encryption scheme’s robustness and security. Furthermore, we propose a formal security analysis that demonstrates the resistance of the new scheme to chosen-plaintext attacks and noise and cropping attacks, while the GLCM analysis confirms the visual encryption quality. Our scheme performs the encryption of a 512×512 image in only 0.23 s on a 1 GB RAM virtual machine, showing its efficiency and suitability for real-time IoT systems. Our method can be easily applied to guarantee the security and the protection of lightweight data in future smart environments.
Keywords: security; elliptic curve cryptography; message mapping; image encryption; statistical tests; lightweight cryptography; sensitivity analysis; Internet of Things; secure communication security; elliptic curve cryptography; message mapping; image encryption; statistical tests; lightweight cryptography; sensitivity analysis; Internet of Things; secure communication

Share and Cite

MDPI and ACS Style

Lahraoui, Y.; Lazaar, S.; Amal, Y.; Nitaj, A. A Novel ECC-Based Method for Secure Image Encryption. Algorithms 2025, 18, 514. https://doi.org/10.3390/a18080514

AMA Style

Lahraoui Y, Lazaar S, Amal Y, Nitaj A. A Novel ECC-Based Method for Secure Image Encryption. Algorithms. 2025; 18(8):514. https://doi.org/10.3390/a18080514

Chicago/Turabian Style

Lahraoui, Younes, Saiida Lazaar, Youssef Amal, and Abderrahmane Nitaj. 2025. "A Novel ECC-Based Method for Secure Image Encryption" Algorithms 18, no. 8: 514. https://doi.org/10.3390/a18080514

APA Style

Lahraoui, Y., Lazaar, S., Amal, Y., & Nitaj, A. (2025). A Novel ECC-Based Method for Secure Image Encryption. Algorithms, 18(8), 514. https://doi.org/10.3390/a18080514

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop