1. Introduction
The security of personal information, particularly medical images, is crucial when it comes to data sharing. Various encryption and cryptographic frameworks have been developed to provide confidentiality to patient information on computer systems, as well as to secure transfer channels over the network [
1,
2]. In other words, digital images form sensitive data that need to be stored and transmitted carefully. When operating in an IoT environment, the transfer and storage of digital images require the implementation of secure algorithms and efficient methods that minimize both memory usage and computational overhead [
3,
4,
5].
Image encryption depends on two approaches to construct cipher images and decrease the correlation between adjacent pixels: confusion and diffusion [
6]. Confusion is often achieved by substituting each pixel in a digital image using a secret key-controlled substitution map to hide the values of the plaintext image [
7]. Diffusion implies that if a single pixel is modified in the image, then about half of the pixels in the cipher image should change; diffusion supports a decrease in the correlation among adjacent pixels in the image.
The quality of image encryption relies on a set of parameters and metrics to evaluate the security and efficiency of the encryption algorithm. Some of them used to evaluate the diffusion characteristics include the Number of Pixel Change Rate (NPCR), mean square error (MSE) and peak signal-to-noise ratio (PSNR) [
8]. Furthermore, computational time is an additional factor to consider, which implies the need for a lightweight encryption approach [
1,
3,
9,
10].
Much of existing research [
1,
2,
3,
6,
9,
10,
11,
12,
13] has utilized lightweight encryption specifically designed for medical images because it (1) allows fast access to emergency diagnosis while maintaining security, (2) preserves the integrity of DICOM (Digital Imaging and Communications in Medicine) metadata, (3) meets strict healthcare privacy requirements and laws (HIPAA/GDPR), and (4) optimizes performance for high-resolution medical scans in hospital systems [
5,
14]. However, expected results do not cover the three CIA principles (confidentiality, integrity, authenticity) alongside encryption speed in their strategy [
15]. To meet this requirement, this work proposes a lightweight image encryption algorithm that considers the three CIA principles in addition to the speed of encryption. The lightweight image encryption algorithm employs interblock encryption, which divides the image into blocks and encrypts the non-diagonal blocks with the diagonal blocks using interlocking encryption proposed in [
16], while diagonal blocks are secured using an enhanced AES-CBC scheme to effectively uphold the CIA principles [
17].
Our research aims to answer the following research questions:
Is there an efficient algorithm that provides fast and secure encryption for medical images in IoT? We propose a novel combination of two algorithms—one optimized for lightweight performance and another designed to preserve image integrity and authenticity—to address this challenge.
Can interblock encryption techniques reduce computational overhead and encryption time while maintaining robust security metrics? We evaluated this through comprehensive testing scenarios that compared different block-based encryption approaches.
Does our enhanced encryption approach preserve image authenticity better than existing methods? We analyze this through rigorous security metric evaluations.
Does our method of combining interconnected block encryption with optimized AES-CBC operations significantly reduce processing time compared to whole-image encryption? We demonstrate this through comparative-time measurements that focus on diagonal block processing.
The significant contributions of this work are summarized as follows:
A multi-phase cryptographic method was designed for medical images (encryption and authentication). This multiphase method combines two algorithms: the first is used for fast image encryption, and the second concerns image authentication.
This combination of algorithms encrypts only part of the image (diagonal blocks) using AES instead of encrypting the whole image while preserving the security of the other block with an enhanced AES-CBC that preserves data authentication.
Our method minimizes the limitations of the two previous approaches by adding an authentication tag while reducing the time required by the enhanced AES-CBC.
The performance of the proposed method was analyzed in terms of histogram consistency analysis, information entropy (IE), (NPCR), (UACI), (MSE), (PSNR), and time complexity (TC).
The remainder of this paper is organized as follows. In
Section 1, related works are reviewed, and in
Section 3, the proposed methodology is presented. Then,
Section 4 presents the performance analysis and evaluation of the proposed methodology, and the comparison of the results obtained with the existing methods is discussed in
Section 5. Finally,
Section 6 concludes the findings and results of our research.
2. Related Works
Extensive research has been conducted on lightweight encryption and how it affects the privacy of images in transit between nodes in IoT. The following literature review examines a range of image encryption methodologies, specifically lightweight mechanisms that are designed to enhance security without imposing excessive computational overhead.
An improved AES algorithm was developed to meet the lightweight and dynamic requirements of IoT devices, enhancing efficiency while maintaining security, as detailed in [
5]. This improved algorithm delivers enhanced security and lightweight computation for encrypting images and text. Key generation appears in two steps: first, using a sensitive chaotic procedure, and second, using a three-dimensional Lorenzo function [
5]. Additionally, ref. [
14] integrated a Henon map, with the AES algorithm encrypting plain images. The Henon map generated a random key for the encryption phase, improving security and resisting more attacks. The results indicated that their method performs well when encrypting images.
Based on the first attempt adopted, ref. [
18] proposed a chaotic system-based image encryption scheme. Researchers such as [
19,
20] presented an efficient image encryption algorithm that integrates the logistic map, the AES S-box, and permutation techniques [
19] using SHA-2, using plaintext images (initialization vector and pre-shared key) to generate the initial parameters of the logistic map. Then, a logistic map is chaotically used to create random numbers, which is the core of permutation and substitution. The authors evaluated their method using 18 metrics: correlation coefficient, entropy, mean square error, peak signal-to-noise ratio, maximum deviation, irregular deviation, unified average changing intensity, keyspace and key sensitivity analysis. The experimental results demonstrated that their proposed algorithm is
times faster than other encryption methods. In contrast, a two-dimensional parametric polynomial chaotic system (2D-PPCS) was proposed to solve weaknesses in existing chaotic systems for engineering applications [
21].
Similarly, some approaches designed an Image Encryption Approach Based on a 4D Hyperchaotic Map (4DHCM) and DNA Encoding Methods [
22,
23]. Another study [
4] presented a lightweight cryptosystem to encrypt medical images. This approach is based on Henon’s chaotic map, Chen’s chaotic system, and Brownian motion. In [
7], they studied the chaotic-based lightweight imaging technique. Based on two chaotic maps, Arnold and Logistic, for lightweight image encryption, they investigated various sets of images, such as medical, underwater, and texture images. Investigations have produced the most significant entropy of
for medical images (chest radiographs), and the average encryption and decryption times have been
and
.
In [
24], an image encryption method that uses compressive sensing and a modified seven-dimensional hyperchaotic map (MSD) were introduced to produce more secure and complex secret keys. Ultimately, creating encrypted images involves performing diffusion and permutation on compressed images in row and column formats, utilizing the secret keys generated from the MSD. The authors Feng et al. [
25] proposed MIEA-PRHM, an innovative image encryption algorithm that integrates pixel reorganization with dual hyperchaotic maps to improve both security and computational efficiency. The scheme demonstrates high encryption throughput and strong robustness, making it suitable for real-time image protection applications. A robust image encryption scheme was proposed using a novel 2D hyperchaotic map (2D-SQPM) integrated with a pixel fusion technique, significantly enhancing the complexity and security of the encryption process. This method [
26] proves to be highly effective in protecting sensitive image data in high-security environments.
The work in [
10] presents an efficient and lightweight encryption technique designed to protect secure images in the healthcare sector. The method utilizes two permutation processes and assumes a 256-bit encryption framework, dividing the binary representation of the image into 16 sub-blocks of 16 bits each for processing.
The study [
27] introduces a two-dimensional memristor-enhanced polynomial hyperchaotic map (2D-MPHM) integrated into a multichannel image encryption algorithm (MIEA-MPHM). This combination achieves high security and efficiency, with an average encryption rate of 87.2798 Mbps, making it suitable for real-time applications. Another study using the stream cipher in [
9] proposed an image encryption scheme that uses a non-linear feedback shift register (NLFSR) with DNA calculations. The process begins with the permutation of the image, which is achieved using a pseudorandom sequence generated by an NLFSR-based keystream generator. This is followed by substituting the values of the pixels through DNA calculations in CBC mode. Ref. [
12] proposed a secure transmission method that utilizes the idea of compressed sensing (CS) for IoT environments. They used compressed sensing and reconstruction tools for efficient image encryption. The suggested approach delivers low computational cost.
Most of these studies focus on reducing encryption time while neglecting many of the NIST security metrics for differential attacks. Our study aims to reduce the time required for encryption and authentication without compromising key NIST metrics.
5. Discussion
This section evaluates the proposed encryption algorithm in comparison to existing methods, focusing on key performance indicators. Metrics such as PSNR, NPCR, UACI, entropy, and time complexity are analyzed to highlight improvements in both security and efficiency. The following
Table 6 presents the comparison of the evaluation with previos work.
Comparison of various algorithms reveals notable differences in performance metrics, including PSNR, NPCR, UACI, entropy, and time complexity. Most existing algorithms, such as those of [
4,
7], demonstrate varying degrees of effectiveness, with PSNR values ranging from 7.74 to 9.808 for image sizes of 512 × 512. In contrast, the proposed model presents a more comprehensive view of implementation in various block sizes. In particular, with a block size of 32, the suggested method obtains a PSNR of 9.0851 and an excellent NPCR of 99.8074, which presents high protection against differential attacks. Furthermore, the entropy measure E = 7.7298 also suggests satisfactorily distributed outputs, which would mean that the randomness of the resultant encrypted images is increased.
It is further understood that the time complexity of the proposed model is reasonable since it took 81 ms to encrypt a 512 × 512 image and 41 ms for a 256 × 256 image with a block size of 16. These performance metrics put into perspective the potential weaknesses that the technique has in terms of high-quality encryption and low computational costs. Overall, the proposed model demonstrates considerable performance metrics, making it suitable for implementation in lightweight image encryption schemes without the problems posed by existing algorithms. Furthermore, our approach, with some additional tuning and optimization, could enhance its PSNR, UACI, and entropy performance, further boosting its competitiveness.
6. Conclusions and Future Works
This research highlights the importance of lightweight and secure encryption techniques that uphold the core principles of confidentiality, integrity, and availability (CIA) for safeguarding medical images. A novel two-phase cryptographic system was proposed, where the first phase encrypts non-diagonal blocks using XOR operations with diagonal blocks to achieve fast and efficient encryption. The second phase applies an enhanced AES in Cipher Block Chaining (AES-CBC) mode to the diagonal blocks, ensuring robust data authentication and enhancing overall security. This combination provides a balanced approach that reduces computational overhead while maintaining a high level of protection.
The proposed method significantly advances state-of-the-art image encryption by introducing a selective encryption scheme that targets only parts of the image, thereby reducing processing time without compromising security. This hybrid approach minimizes the limitations of traditional full-image encryption methods by incorporating authentication tags and optimizing the usage of AES-CBC. The system was rigorously evaluated through various performance metrics, including histogram consistency, adjacent pixel correlation analysis, information entropy NPCR, UACI, MSE, PSNR, and time complexity. The results demonstrate that the proposed approach outperforms existing solutions in terms of reliability, efficiency, and suitability for medical applications based on IoT. Future work may explore extending this methodology using stream cipher alternatives or lightweight algorithms such as PRESENT to further improve performance and adaptability in constrained environments.