EIP: Efficient image protection scheme
Haider, T.
ORCID: 0000-0002-9224-4576, Sattar, K. A.
ORCID: 0009-0002-4700-4255, Komninos, N.
ORCID: 0000-0003-2776-1283 & Hayat, U.
ORCID: 0000-0002-1373-7701 (2026).
EIP: Efficient image protection scheme.
Journal of Information Security and Applications, 99,
article number 104436.
doi: 10.1016/j.jisa.2026.104436
Abstract
Image protection schemes face critical challenges, including high computational overhead, vulnerability to differential attacks, and susceptibility to known-plaintext and chosen-plaintext attacks. Many existing methods struggle to balance security and efficiency, limiting their practicality in real-time and resource-constrained environments. To address these challenges, we propose a novel image protection scheme that integrates NIST-approved elliptic curve P-256, SHA-256 hashing, and the improved Josephus sequence. Our approach ensures secure and efficient key generation, making it well-suited for low-resource applications. We rigorously evaluate the proposed scheme through comprehensive security and performance analysis, including correlation, histogram, entropy, differential attack resilience, computational efficiency, key sensitivity, key spacing, and plaintext attack resistance. Results demonstrate that our scheme outperforms state-of-the-art existing methods in security robustness while achieving notably low computational time. Furthermore, our security evaluation confirms that the protected images achieve near-optimal theoretical values across standard cryptographic benchmarks. In terms of efficiency, our scheme exhibits processing speed while maintaining security performance, making it a strong candidate for secure and real-time image protection applications.
| Publication Type: | Article |
|---|---|
| Additional Information: | © 2026. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/ |
| Publisher Keywords: | Elliptic curve cryptography, Cryptographic hash function, Improved Josephus sequence Security |
| Subjects: | H Social Sciences > HN Social history and conditions. Social problems. Social reform Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
| Departments: | School of Science & Technology School of Science & Technology > Department of Computer Science |
| SWORD Depositor: |
This document is not freely accessible until 6 March 2027 due to copyright restrictions.
Available under License Creative Commons Attribution Non-commercial No Derivatives.
To request a copy, please use the button below.
Request a copyExport
Downloads
Downloads per month over past year
Metadata
Metadata