Efficient ECC Image Encryption Technique using Whale Optimization
DOI:
https://doi.org/10.62760/iteecs.4.4.2025.161Keywords:
Elliptic curve cryptography, Whale optimization, Image security, PSNR, MSEAbstract
IoT creates integrated communication scenarios for network elements and steps by bringing together the applied and widespread developments at the same time. This paper develops the studied the critical open challenges in reinforcing IoT security, which includes encryption technologies to provide security to transferred pictures among linked systems of both groups. The proposed method is built on a hybrid approach that employs encryption tactics as well as optimization approaches. The Whale Optimization approach was employed in this suggested image safety model encryption. The goal of using optimization procedures in the encryption developments is to choose the better favorable keys in encryption techniques, by using the proposed approach. The PSNR and MSE are used to assess the outcomes once they have been implemented and found that the recommended approach is better related to the remaining methods.
References
Y.Yang et al ., “A Survey on security and privacy issues in IoT”, IEEE Internet of Things Journal, Vol. 4, No. 5, pp. 1250-1258, 2017.
https://doi.org/10.1109/JIOT.2017.2694844
K. Gupta, S. Silakari, R. Gupta, and S. A. Khan, “An ethical way for image encryption using ECC”, 2009 First International Conference on Computational Intelligence and Communication Systems and Networks, pp. 342-345, 2009.
https://doi.org/10.1109/CICSYN.2009.33
L. D. Singh and K. M. Singh, “Image Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, Vol. 54, pp. 472–481, 2015.
https://doi.org/10.1016/j.procs.2015.06.054
K. Sowjanya and M. Dasgupta, “A ciphertext-policy Attribute based encryption scheme for wireless body area networks based on ECC”, Journal of Information Security Applications, Vol. 54, art. no. 102559, 2020.
https://doi.org/10.1016/j.jisa.2020.102559
D. R. Shashikumar, “Revisiting Security Aspects of Internet of Things for Self-Managed Devices”, International Research Journal of Engineering and Technology, Vol. 6, No. 10, pp. 1652–1659, 2019.
U. Vijay Nikhil, Z. Stamenkovic, and S. P. Raja “A study of elliptic curve cryptography and its applications”, International Journal of Image and Graphics, Vol. 25, No. 06, art. no. 2550062, 2025.
https://doi.org/10.1142/S0219467825500627
C. Pradeep, M. Rao, and B. Vikas, “Quantum Cryptography Protocols for Internet of Everything: General View”, Intelligent System Design, pp. 211–218, 2020.
https://doi.org/10.1007/978-981-15-5400-1_21
K. Shankar and P. Eswaran, “RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique,” Journal of Circuits, Systems and Computers, Vol. 25, No. 11, pp. 1–23, 2016.
https://doi.org/10.1142/S0218126616501383
R. Kaur and E. K. Singh, “Image Encryption Techniques: A Selected Review”, IOSR Journal of Computer Engineering, Vol. 9, No. 6, pp. 80–83, 2013.
https://doi.org/10.9790/0661-0968083
R. Srilakshmi, “Dual Server based Security Protocol in MANET using Elliptic Curve Cryptography: A Cluster Head Selection Scenario”, International Journal of Advanced Trends in Computer Science and Engineering, Vol. 8, No. 4, pp. 1621–1629, 2019.
https://doi.org/10.30534/ijatcse/2019/87842019
K. Shah, A. Bhadauria, P. Thakkar, J. Shah and H. Kaur, “Advancements in Elliptic Curve Cryptography: A Review of Theory and Applications”, 2024 Parul International Conference on Engineering and Technology (PICET), Vadodara, India, pp. 1-6, 2024.
https://doi.org/10.1109/PICET60765.2024.10716041
U. Hayat and N. A. Azam, “A novel image encryption scheme based on an elliptic curve”, Signal Processing, Vol. 155, pp. 391-402, 2019.
https://doi.org/10.1016/j.sigpro.2018.10.011
D. H. Je, J. S. Lee, Y. Park, and S. W. Seo, “Computation and storage efficient key tree management protocol for secure multicast communications”, Computer Communications, Vol. 33, No. 2, pp. 136–148, 2010.
https://doi.org/10.1016/j.comcom.2009.08.007
N. Kettaf, H. Abouaissa, and P. Lorenz, “An efficient heterogeneous key management approach for secure multicast communications in ad hoc networks”, Telecommunication Systems, Vol. 37, pp. 29–36, 2008.
https://doi.org/10.1007/s11235-008-9074-4
S. Toughi, M. H. Fathi, and Y. A. Sekhavat, “An Image Encryption Scheme Based on Elliptic Curve Pseudo Random and Advanced Encryption System”, Signal Processing, Vol. 141, pp. 217-227, 2017.
https://doi.org/10.1016/j.sigpro.2017.06.010
X. Zhang, K. Chen, J. Ding, Y. Yang, W. Zhang and N. Yu, "Provably Secure Public-Key Steganography Based on Elliptic Curve Cryptography," IEEE Transactions on Information Forensics and Security, Vol. 19, pp. 3148-3163, 2024.
https://doi.org/10.1109/TIFS.2024.3361219
A. Joshi and A. K. Mohapatra, “A novel lightweight authentication protocol for body area networks based on elliptic-curve cryptography”, Journal of Information and Optimization Sciences, Vol. 41, No. 7, pp. 1645–1672, 2020.
https://doi.org/10.1080/02522667.2020.1799511
K. Sanjay, and D. Sharma “A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm”, Artificial Intelligence Review, Vol. 57, No. 4, art. no. 87, 2024.
https://doi.org/10.1007/s10462-024-10719-0
B. Arpita, D. S. Laiphrakpam, A. Agrawal, and R. Patgiri “Secret image encryption based on chaotic system and elliptic curve cryptography”, Digital Signal Processing, Vol. 129, art. no. 103639, 2022.
https://doi.org/10.1016/j.dsp.2022.103639
S. Kang, C. Ji, and M. Hong, “Secure collaborative key management for dynamic groups in mobile networks”, Journal of Applied Mathematics, Vol. 2014, No. 1, art.no. 601625, pp. 1-10, 2014.
https://doi.org/10.1155/2014/601625
V. Kumar, R. Kumar, and S. K. Pandey, “A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem”, Journal of King Saud University- Computer and Information Sciences, Vol. 32, No. 9, pp.1081–1094, 2020.
https://doi.org/10.1016/j.jksuci.2017.12.014
L. Veltri, S. Cirani, S. Busanelli, and G. Ferrari, “A novel batch-based group key management protocol applied to the Internet of Things”, Ad Hoc Networks, Vol. 11, No. 8, pp. 2724–2737, 2013.
https://doi.org/10.1016/j.adhoc.2013.05.009
M. Bilal and S. G. Kang, “A secure key agreement protocol for dynamic group”, Cluster Computing, Vol. 20, pp. 2779–2792, 2017.
https://doi.org/10.1007/s10586-017-0853-0
Y. R. Chen and W. G. Tzeng, “Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members”, Computer Communications, Vol. 98, pp. 31–42, 2017.
https://doi.org/10.1016/j.comcom.2016.08.001
J. A. Á.Bermejo, N. Antequera, and J. A. L.Ramos, “Hierarchical approaches for multicast based on Euclid’s algorithm”, The Journal of Supercomputing, Vol. 65, No. 3, pp. 1164–1178, 2013.
https://doi.org/10.1007/s11227-013-0923-x
S. J. Begum and T. Purusothaman, “Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication”, Mobile Networks and Applications, Vol. 21, pp. 550–560, 2016.
https://doi.org/10.1007/s11036-015-0649-5
S. Kumari, M. Karuppiah, A. K. Das, X. Li, F. Wu, and V. Gupta, “Design of a secure anonymity preserving authentication scheme for session initiation protocol using elliptic curve cryptography”, Journal of Ambient Intelligence and Humanized Computing, Vol. 9, pp. 643–653, 2018.
https://doi.org/10.1007/s12652-017-0460-1
A. M. Shaheen, T. R. Sheltami, T. M. Al-Kharoubi, and E. Shakshuki, “Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT”, Journal of Ambient Intelligence and Humanized Computing, Vol. 10, pp. 4733–4750, 2019.
https://doi.org/10.1007/s12652-018-0850-z
M. Kumar, D. C. Mishra, and R. K. Sharma, “A first approach on an RGB image encryption”, Optics and Lasers in Engineering, Vol. 52, pp. 27–34, 2014.
https://doi.org/10.1016/j.optlaseng.2013.07.015
K. Shankar and P. Eswaran, “An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm”, Artificial Intelligence and Evolutionary Computations in Engineering Systems, Vol. 394, pp. 705 - 714, 2016.
https://doi.org/10.1007/978-81-322-2656-7_64
K. Shankar and P. Eswaran, “ECC based image encryption scheme with aid of optimization technique using differential evolution algorithm”, International Journal of Applied Engineering Research, Vol. 10, No. 55, pp. 1841–1845, 2015.
U. Shamsher, J. Zheng, N. Din, M. T. Hussain, F. Ullah, and M. Yousaf “Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey”, Computer Science Review, Vol. 47, art. no. 100530, 2023.
https://doi.org/10.1016/j.cosrev.2022.100530
A. A. Khaliq, A. Anjum, A. B. Ajmal, J. L. Webber, A. Mehbodniya and S. Khan, "A Secure and Privacy Preserved Parking Recommender System Using Elliptic Curve Cryptography and Local Differential Privacy”, IEEE Access, Vol. 10, pp. 56410-56426, 2022.
https://doi.org/10.1109/ACCESS.2022.3175829
K. Shankar, M. Elhoseny, E. Perumal, M. Ilayaraja, and K. Sathesh Kumar “An efficient image encryption scheme based on signcryption technique with adaptive elephant herding optimization”, Cybersecurity and Secure Information Systems, pp. 31-42, 2019.
https://doi.org/10.1007/978-3-030-16837-7-3
R. Srilakshmi “Elliptic Curve Cryptography-Based Security Protocol of MANET under Dynamic Cluster Head Selection Environment”, International Journal of Emerging Trends in Engineering Research, Vol. 8, No. 2, pp. 447–454, 2020.
https://doi.org/10.30534/ijeter/2020/32822020
C. Shanmuganathan et al, “Enabling security in MANETs using an efficient cluster based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm”, Emerging Telecommunication Technologies, Vol. 34, No. 3, 2023.
https://doi.org/10.1002/ett.4717
M. A. Basset, D. E. Shahat, I. E.henawy, A. K. Sangaiah, and S. H. Ahmed, “A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem”, Mobile Networks and Applications, Vol. 23, No. 4, pp. 723–733, 2018.
https://doi.org/10.1007/s11036-018-1005-3
W. Z. Sun, J. S. Wang, and X. Wei, “An improved whale optimization algorithm based on different searching paths and perceptual disturbance”, Symmetry, Vol. 10, No. 6, pp. 1–31, 2018.
https://doi.org/10.3390/sym10060210
M. Kaur and D. Singh, “Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption”, Multidimensional Systems and Signal Processing, Vol. 32, No. 1, pp. 281–301, 2021.
https://doi.org/10.1007/s11045-020-00739-8
A. Mullai and K. Mani, “Enhancing the security in RSA and elliptic curve cryptography based on addition chain using simplified Swarm Optimization and Particle Swarm Optimization for mobile devices”, International Journal of Information Technology, Vol. 13, No. 2, pp. 551-564, 2021.
Additional Files
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Samat Iderus, Nuramalina Bohari

This work is licensed under a Creative Commons Attribution 4.0 International License.
This Journal and its metadata are licenced under a