Aggregated Encryption Time in Milliseconds.

<div><p>The Internet is experiencing a significant increase in multimedia traffic volume, highlighting the growing importance of managing and securing multimedia content efficiently. Classical or traditional security solutions are suitable for those applications that have sufficient comp...

Full description

Saved in:
Bibliographic Details
Main Author: Abid Mehmood (13822340) (author)
Other Authors: Abdul Nasir Khan (17904217) (author), Iynkaran Natgunanathan (14701924) (author), Arslan Shafique (13363419) (author), Iftikhar Ahmed Khan (5679773) (author), Atta ur Rehman Khan (18405640) (author)
Published: 2025
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1852021840818470912
author Abid Mehmood (13822340)
author2 Abdul Nasir Khan (17904217)
Iynkaran Natgunanathan (14701924)
Arslan Shafique (13363419)
Iftikhar Ahmed Khan (5679773)
Atta ur Rehman Khan (18405640)
author2_role author
author
author
author
author
author_facet Abid Mehmood (13822340)
Abdul Nasir Khan (17904217)
Iynkaran Natgunanathan (14701924)
Arslan Shafique (13363419)
Iftikhar Ahmed Khan (5679773)
Atta ur Rehman Khan (18405640)
author_role author
dc.creator.none.fl_str_mv Abid Mehmood (13822340)
Abdul Nasir Khan (17904217)
Iynkaran Natgunanathan (14701924)
Arslan Shafique (13363419)
Iftikhar Ahmed Khan (5679773)
Atta ur Rehman Khan (18405640)
dc.date.none.fl_str_mv 2025-03-26T17:32:38Z
dc.identifier.none.fl_str_mv 10.1371/journal.pone.0320046.g005
dc.relation.none.fl_str_mv https://figshare.com/articles/figure/Aggregated_Encryption_Time_in_Milliseconds_/28671258
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Biophysics
Microbiology
Cell Biology
Space Science
Environmental Sciences not elsewhere classified
Biological Sciences not elsewhere classified
Chemical Sciences not elsewhere classified
Information Systems not elsewhere classified
sufficient computing resources
resilient image encryption
requires adequate protection
multimedia traffic volume
mean square error
cipher processing time
traditional security solutions
evaluated using security
effective security solution
performance requirements compared
encrypts digital data
current research efforts
comprehensive analysis reveals
lightweight properties simultaneously
balance lightweight design
strong security measures
robust cryptographic system
performance measures
research addresses
digital images
sensitivity analysis
histogram analysis
lightweight cryptosystem
enhanced lightweight
xlink ">
significant increase
sensitive information
growing importance
existing state
existing gap
constrained nature
collectively meets
area lack
dc.title.none.fl_str_mv Aggregated Encryption Time in Milliseconds.
dc.type.none.fl_str_mv Image
Figure
info:eu-repo/semantics/publishedVersion
image
description <div><p>The Internet is experiencing a significant increase in multimedia traffic volume, highlighting the growing importance of managing and securing multimedia content efficiently. Classical or traditional security solutions are suitable for those applications that have sufficient computing resources. However, the rise of IoTs and its applications opens new directions for researchers to provide lightweight security solutions. Many IoT applications send critical image data over the Internet, which requires adequate protection. Traditional security solutions are not suitable due to the resource-constrained nature of the environments. An effective security solution is necessary for such environments that balance lightweight design with strong security measures. Current research efforts in this area lack the ability to provide both secure and lightweight properties simultaneously. Therefore, a robust and lightweight cryptosystem is needed to secure the sensitive information of digital images. This research addresses the existing gap by proposing a lightweight and robust cryptographic system that encrypts digital data in less processing time without compromising security. The proposed image encryption technique is evaluated using security and performance measures, such as cipher processing time, histogram analysis, entropy, correlation, mean square error and sensitivity analysis. Moreover, the comprehensive analysis reveals the proposed image encryption technique effectively and collectively meets all the security and performance requirements compared to existing state-of-the-art lightweight image encryption techniques.</p></div>
eu_rights_str_mv openAccess
id Manara_a71eb28d660edb97ef2e4f7182ef2dcd
identifier_str_mv 10.1371/journal.pone.0320046.g005
network_acronym_str Manara
network_name_str ManaraRepo
oai_identifier_str oai:figshare.com:article/28671258
publishDate 2025
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Aggregated Encryption Time in Milliseconds.Abid Mehmood (13822340)Abdul Nasir Khan (17904217)Iynkaran Natgunanathan (14701924)Arslan Shafique (13363419)Iftikhar Ahmed Khan (5679773)Atta ur Rehman Khan (18405640)BiophysicsMicrobiologyCell BiologySpace ScienceEnvironmental Sciences not elsewhere classifiedBiological Sciences not elsewhere classifiedChemical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedsufficient computing resourcesresilient image encryptionrequires adequate protectionmultimedia traffic volumemean square errorcipher processing timetraditional security solutionsevaluated using securityeffective security solutionperformance requirements comparedencrypts digital datacurrent research effortscomprehensive analysis revealslightweight properties simultaneouslybalance lightweight designstrong security measuresrobust cryptographic systemperformance measuresresearch addressesdigital imagessensitivity analysishistogram analysislightweight cryptosystemenhanced lightweightxlink ">significant increasesensitive informationgrowing importanceexisting stateexisting gapconstrained naturecollectively meetsarea lack<div><p>The Internet is experiencing a significant increase in multimedia traffic volume, highlighting the growing importance of managing and securing multimedia content efficiently. Classical or traditional security solutions are suitable for those applications that have sufficient computing resources. However, the rise of IoTs and its applications opens new directions for researchers to provide lightweight security solutions. Many IoT applications send critical image data over the Internet, which requires adequate protection. Traditional security solutions are not suitable due to the resource-constrained nature of the environments. An effective security solution is necessary for such environments that balance lightweight design with strong security measures. Current research efforts in this area lack the ability to provide both secure and lightweight properties simultaneously. Therefore, a robust and lightweight cryptosystem is needed to secure the sensitive information of digital images. This research addresses the existing gap by proposing a lightweight and robust cryptographic system that encrypts digital data in less processing time without compromising security. The proposed image encryption technique is evaluated using security and performance measures, such as cipher processing time, histogram analysis, entropy, correlation, mean square error and sensitivity analysis. Moreover, the comprehensive analysis reveals the proposed image encryption technique effectively and collectively meets all the security and performance requirements compared to existing state-of-the-art lightweight image encryption techniques.</p></div>2025-03-26T17:32:38ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0320046.g005https://figshare.com/articles/figure/Aggregated_Encryption_Time_in_Milliseconds_/28671258CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/286712582025-03-26T17:32:38Z
spellingShingle Aggregated Encryption Time in Milliseconds.
Abid Mehmood (13822340)
Biophysics
Microbiology
Cell Biology
Space Science
Environmental Sciences not elsewhere classified
Biological Sciences not elsewhere classified
Chemical Sciences not elsewhere classified
Information Systems not elsewhere classified
sufficient computing resources
resilient image encryption
requires adequate protection
multimedia traffic volume
mean square error
cipher processing time
traditional security solutions
evaluated using security
effective security solution
performance requirements compared
encrypts digital data
current research efforts
comprehensive analysis reveals
lightweight properties simultaneously
balance lightweight design
strong security measures
robust cryptographic system
performance measures
research addresses
digital images
sensitivity analysis
histogram analysis
lightweight cryptosystem
enhanced lightweight
xlink ">
significant increase
sensitive information
growing importance
existing state
existing gap
constrained nature
collectively meets
area lack
status_str publishedVersion
title Aggregated Encryption Time in Milliseconds.
title_full Aggregated Encryption Time in Milliseconds.
title_fullStr Aggregated Encryption Time in Milliseconds.
title_full_unstemmed Aggregated Encryption Time in Milliseconds.
title_short Aggregated Encryption Time in Milliseconds.
title_sort Aggregated Encryption Time in Milliseconds.
topic Biophysics
Microbiology
Cell Biology
Space Science
Environmental Sciences not elsewhere classified
Biological Sciences not elsewhere classified
Chemical Sciences not elsewhere classified
Information Systems not elsewhere classified
sufficient computing resources
resilient image encryption
requires adequate protection
multimedia traffic volume
mean square error
cipher processing time
traditional security solutions
evaluated using security
effective security solution
performance requirements compared
encrypts digital data
current research efforts
comprehensive analysis reveals
lightweight properties simultaneously
balance lightweight design
strong security measures
robust cryptographic system
performance measures
research addresses
digital images
sensitivity analysis
histogram analysis
lightweight cryptosystem
enhanced lightweight
xlink ">
significant increase
sensitive information
growing importance
existing state
existing gap
constrained nature
collectively meets
area lack