Enhancing Image Security in IoT Environments Using a Modified Vigenère Cipher Algorithm

Authors

  • Salah Abdulghani Alabady Computer Engineering Department, College of Engineering, University of Mosul – 41002, Iraq https://orcid.org/0000-0001-9687-2724
  • Thabita Fawaz Shawkat Computer Engineering Department, College of Engineering, University of Mosul – 41002, Iraq
  • Amina Waad Adrees Computer Engineering Department, College of Engineering, University of Mosul – 41002, Iraq
  • Dani Zuhair Elias Computer Engineering Department, College of Engineering, University of Mosul – 41002, Iraq

DOI:

https://doi.org/10.62760/iteecs.5.1.2026.141

Keywords:

Internet of Things, Image Encryption, Vigenère Cipher, Multimedia Security, Symmetric Key Cryptography, Privacy Protection

Abstract

The Internet of Things (IoT) represents a technologically optimistic future where objects will be connected to the internet and make intelligent collaborations with other objects anywhere, anytime. The described technical architecture of the IoT has an impact on the security and privacy of the involved stakeholders. Privacy includes the concealment of personal information as well as the ability to control what happens with this information. By security we mean the degree of resistance to, or protection of the IoT infrastructure and applications. Many of these devices are easy targets for intrusion. The IoT enables the exchange of multimedia data in a wide variety of applications. Therefor Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks. The security of multimedia data in digital distribution networks is commonly provided by encryption, which is the mathematical process that transforms a plaintext message into unintelligible ciphertext (confused). Vigenère cipher algorithm method is used for securing data in the form of digital images; this paper proposes a method to encrypt an image based on one of the primitive text encryption algorithms Vigenère Cipher. The results show that the original Vigenère algorithm is not good and not suitable for image encryption. On the other hand the proposed algorithm shows there are improvements in the process of encoding images (black / white and color images) using a symmetric key, same key is used for both encryption and decryption.

References

S. A. Kumar, T. Vealey and H. Srivastava, “Security in Internet of Things: Challenges, Solutions and Future Directions”, 2016 49th Hawaii International Conference on System Sciences (HICSS), Koloa, HI, USA, pp. 5772 - 5781, 2016. https://doi.org/10.1109/HICSS.2016.714

N. A. Al-Romema, A. S. Mashat, and I. Albidewi, "New chaos-based image encryption scheme for RGB components of color image”, Computer Science and Engineering, Vol. 2, No. 5, pp. 77-85, 2012. [Cross Ref]

V. V. K. Reddy and S. Bhukya, “Encrypt and decrypt image using vigenere cipher”, International Journal of Pure and Applied Mathematics, Vol. 118, No. 24, pp. 1 - 8, 2018. [Cross Ref]

E. A. Jameel and S. A. Fadhel, “Digital Image Encryption Techniques: Article Review”, Technium, Vol. 4, No. 2, pp. 24 - 35, 2022. https://doi.org/10.47577/technium.v4i2.6026

A. Susanto, T. H. Khotimah, M. T. Sumadi, J. Warsito, and R. Rihartanto, “Image encryption using vigenere cipher with bit circular shift”, International Journal of Engineering and Technology, Vol. 7, No. 2, pp. 62 - 64, 2018. [Cross Ref]

R. Darari, E. Winarko, and A. Damayanti, “Encryption and decryption application on images with hybrid algorithm Vigenere and RSA”, Contemporary Mathematics and Applications, Vol. 2, No. 2, pp. 109 - 117, 2020. https://doi.org/10.20473/conmatha.v2i2.23855

O. F. Mohammad, M. Shafry, M. S. M. Rahim, S. Rafeeq, R. M. Zeebaree, and F. Y. H. Ahmed, “A survey and analysis of the image encryption methods”, International Journal of Applied Engineering Research, Vol. 12, No. 23, pp. 13265-13280, 2017. [Cross Ref]

Y. A. Gerhana, E. Insanudin, U. Syarifudin and M. R. Zulmi, “Design of digital image application using vigenere cipher algorithm”, 2016 4th International Conference on Cyber and IT Service Management, Bandung, Indonesia, pp. 1 - 5, 2016. https://doi.org/10.1109/CITSM.2016.7577571

Q. A. Kester “A cryptosystem based on Vigenère cipher with varying key”, International Journal of Advanced Research in Computer Engineering & Technology, Vol. 1, No. 10, pp. 108 - 113, 2012. [Cross Ref]

K. Senthil, K. Prasanthi and R. Rajaram, “A modern avatar of Julius Ceasar and Vigenere cipher”, 2013 IEEE International Conference on Computational Intelligence and Computing Research, Enathi, India, pp. 1-3, 2013. https://doi.org/10.1109/ICCIC.2013.6724170

B. Purnama and A. H. H. Rohayani “A new modified caesar cipher cryptography method with legibleciphertext from a message to be encrypted”, Procedia Computer Science, Vol. 59, pp. 195 - 204, 2015. https://doi.org/10.1016/j.procs.2015.07.552

A. Saraswat, C. Khatri, Sudhakar, P. Thakral, and P. Biswas, “An extended hybridization of vigenére and caesar cipher techniques for secure communication”, Procedia Computer Science, Vol. 92, pp. 355 - 360, 2016. https://doi.org/10.1016/j.procs.2016.07.390

N. Uniyal, G. Dobhal, and P. Semwal, “Enhanced security of encrypted text by KDMT: Key-domain maximization technique”, International Journal of Recent Technology and Engineering, Vol. 8, No. 5, pp. 1385 - 1388, 2020. http://www.doi.org/10.35940/ijrte.E6326.018520

K. I. Rahmani, N. Wadhwa, and V. Malhotra, “Alpha Qwerty Cipher: An Extended Vigenere Cipher”, Advanced Computing, Vol. 3, No. 3, pp. 107 - 118, 2012. https://doi.org/10.5121/acij.2012.3311

A. A. Soofi, I. Riaz, and U. Rasheed, “An enhanced vigenere cipher for data security”, International Journal of Scientific & Technology Research, Vol. 5, No. 3, pp. 141 - 145, 2016. [Cross Ref]

O. E. Omolara, A. I. Oludare, and S. E. Abdulahi, “Developing a modified Hybrid Caesar cipher and Vigenere cipher for secure Data Communication”, Computer Engineering and Intelligent Systems, Vol. 5, No. 5, pp. 34 - 46, 2014. [Cross Ref]

Y. Song, Z. Zhu, W. Zhang, H. Yu and Y. Zhao, “Efficient and Secure Image Encryption Algorithm Using a Novel Key-Substitution Architecture”, IEEE Access, Vol. 7, pp. 84386 - 84400, 2019. https://doi.org/10.1109/ACCESS.2019.2923018

A. Subandi, M. S. Ladia, R. W. Sembiring, M. Zarlis and S. Efendi “Vigenere cipher algorithm modification by adopting RC6 key expansion and double encryption process”, IOP Conference Series: Materials Science and Engineering, Vol. 420, art. no. 012119, 2018. https://doi.org/10.1088/1757-899X/420/1/012119

R. S. Kartha and V. Paul, “Survey: recent modifications in Vigenere Cipher”, IOSR Journal of Computer Engineering, Vol. 16, No. 2, pp. 49 - 53, 2014. [Cross Ref]

S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data security using vigenère cipher and goldbach codes algorithm”, International Journal of Engineering Research & Technology, Vol. 6, No. 1, pp. 360 - 363, 2017. [Cross Ref]

A. A. M. Aliyu and A. Olaniyan “Vigenere cipher: trends, review and possible modifications”, International Journal of Computer Applications, Vol. 135, No. 11, pp. 46 - 50, 2016. https://doi.org/10.5120/ijca2016908549

D. Gyasi-Nyarko, E. Freeman, M. M. Ujakpa, W. Amponsah and S. O. Amoako, “A Systematic Review of Public Key Cryptography: Implementation, Challenges and Future Opportunities”, 2025 IST-Africa Conference (IST-Africa), Nairobi, Kenya, pp. 1 - 15, 2025. https://doi.org/10.23919/IST-Africa67297.2025.11060567

P. Garg, A. Gupta, Y. P. Singh, and P. Goyal. “End-to-End Encryption: Evolution, Barriers, and Emerging Trends”, Deep Quantum Neural Networks: AI for 6G/7G Communication Systems, pp. 113 - 127, 2026. https://doi.org/10.1007/978-981-95-1683-4_8

P. Baniya, A. Agrawal, K. Abid, J. Nath, B. K. Chaudhary and B. Kunwar, “The Internet of Things: Security Challenges and Opportunities”, 2024 3rd International conference on Power Electronics and IoT Applications in Renewable Energy and its Control (PARC), Mathura, India, pp. 153 - 158, 2024. https://doi.org/10.1109/PARC59193.2024.10486356

Additional Files

Published

2026-03-17

How to Cite

Alabady, S. A., Shawkat, T. F., Adrees, A. W., & Elias, D. Z. (2026). Enhancing Image Security in IoT Environments Using a Modified Vigenère Cipher Algorithm. International Transactions on Electrical Engineering and Computer Science, 5(1), 44–52. https://doi.org/10.62760/iteecs.5.1.2026.141

Issue

Section

Articles

Most read articles by the same author(s)

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.