
A Novel Image Encryption Approach for IoT Applications
Author(s) -
Wasan A. Alawsi,
Hadab Khalid Obayes,
Saba Mohammed Hussain
Publication year - 2022
Publication title -
webology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.259
H-Index - 18
ISSN - 1735-188X
DOI - 10.14704/web/v19i1/web19107
Subject(s) - encryption , computer science , steganography , image (mathematics) , least significant bit , cover (algebra) , internet of things , computer security , theoretical computer science , artificial intelligence , engineering , mechanical engineering , operating system
The rapid developments observed in the field of Internet of Things (IoT), along with the recently increasing dependence on this technology in home and financial applications, have made it necessary to pay attention to the security of information sent through these IoT applications. The present article proposes a new encryption method for important messages that are sent via IoT applications. The proposed method provides four levels of security for the confidential message (in this case, an image). The first level is represented by applying the Conformal Mapping on the secret image. The second level is represented by encoding the resulting image from the first level using the encryption and decryption (RSA) method, while the third level is the use of Less Significant Bit (LSB) as the hiding method to hide the message inside the cover image. The compression of the stego image using GZIP is the last level of security. The peak signal-to-noise (PNSR) metric was used to measure the quality of the resulting image after the steganography process. The results appear promising and acceptable. Therefore, it is suggested that this method can be applied to send secret messages through applications of special importance across the IoT.