City Research Online

EIP: Efficient image protection scheme

Haider, T. ORCID: 0000-0002-9224-4576, Sattar, K. A. ORCID: 0009-0002-4700-4255, Komninos, N. ORCID: 0000-0003-2776-1283 & Hayat, U. ORCID: 0000-0002-1373-7701 (2026). EIP: Efficient image protection scheme. Journal of Information Security and Applications, 99, article number 104436. doi: 10.1016/j.jisa.2026.104436

Abstract

Image protection schemes face critical challenges, including high computational overhead, vulnerability to differential attacks, and susceptibility to known-plaintext and chosen-plaintext attacks. Many existing methods struggle to balance security and efficiency, limiting their practicality in real-time and resource-constrained environments. To address these challenges, we propose a novel image protection scheme that integrates NIST-approved elliptic curve P-256, SHA-256 hashing, and the improved Josephus sequence. Our approach ensures secure and efficient key generation, making it well-suited for low-resource applications. We rigorously evaluate the proposed scheme through comprehensive security and performance analysis, including correlation, histogram, entropy, differential attack resilience, computational efficiency, key sensitivity, key spacing, and plaintext attack resistance. Results demonstrate that our scheme outperforms state-of-the-art existing methods in security robustness while achieving notably low computational time. Furthermore, our security evaluation confirms that the protected images achieve near-optimal theoretical values across standard cryptographic benchmarks. In terms of efficiency, our scheme exhibits processing speed while maintaining security performance, making it a strong candidate for secure and real-time image protection applications.

Publication Type: Article
Additional Information: © 2026. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/
Publisher Keywords: Elliptic curve cryptography, Cryptographic hash function, Improved Josephus sequence Security
Subjects: H Social Sciences > HN Social history and conditions. Social problems. Social reform
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Departments: School of Science & Technology
School of Science & Technology > Department of Computer Science
SWORD Depositor:
[thumbnail of main_R2.pdf] Text - Accepted Version
This document is not freely accessible until 6 March 2027 due to copyright restrictions.
Available under License Creative Commons Attribution Non-commercial No Derivatives.

To request a copy, please use the button below.

Request a copy

Export

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Downloads

Downloads per month over past year

View more statistics

Actions (login required)

Admin Login Admin Login