Aggregated Encryption Time in Milliseconds.
<div><p>The Internet is experiencing a significant increase in multimedia traffic volume, highlighting the growing importance of managing and securing multimedia content efficiently. Classical or traditional security solutions are suitable for those applications that have sufficient comp...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , , , , |
| Published: |
2025
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1852021840818470912 |
|---|---|
| author | Abid Mehmood (13822340) |
| author2 | Abdul Nasir Khan (17904217) Iynkaran Natgunanathan (14701924) Arslan Shafique (13363419) Iftikhar Ahmed Khan (5679773) Atta ur Rehman Khan (18405640) |
| author2_role | author author author author author |
| author_facet | Abid Mehmood (13822340) Abdul Nasir Khan (17904217) Iynkaran Natgunanathan (14701924) Arslan Shafique (13363419) Iftikhar Ahmed Khan (5679773) Atta ur Rehman Khan (18405640) |
| author_role | author |
| dc.creator.none.fl_str_mv | Abid Mehmood (13822340) Abdul Nasir Khan (17904217) Iynkaran Natgunanathan (14701924) Arslan Shafique (13363419) Iftikhar Ahmed Khan (5679773) Atta ur Rehman Khan (18405640) |
| dc.date.none.fl_str_mv | 2025-03-26T17:32:38Z |
| dc.identifier.none.fl_str_mv | 10.1371/journal.pone.0320046.g005 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/figure/Aggregated_Encryption_Time_in_Milliseconds_/28671258 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Biophysics Microbiology Cell Biology Space Science Environmental Sciences not elsewhere classified Biological Sciences not elsewhere classified Chemical Sciences not elsewhere classified Information Systems not elsewhere classified sufficient computing resources resilient image encryption requires adequate protection multimedia traffic volume mean square error cipher processing time traditional security solutions evaluated using security effective security solution performance requirements compared encrypts digital data current research efforts comprehensive analysis reveals lightweight properties simultaneously balance lightweight design strong security measures robust cryptographic system performance measures research addresses digital images sensitivity analysis histogram analysis lightweight cryptosystem enhanced lightweight xlink "> significant increase sensitive information growing importance existing state existing gap constrained nature collectively meets area lack |
| dc.title.none.fl_str_mv | Aggregated Encryption Time in Milliseconds. |
| dc.type.none.fl_str_mv | Image Figure info:eu-repo/semantics/publishedVersion image |
| description | <div><p>The Internet is experiencing a significant increase in multimedia traffic volume, highlighting the growing importance of managing and securing multimedia content efficiently. Classical or traditional security solutions are suitable for those applications that have sufficient computing resources. However, the rise of IoTs and its applications opens new directions for researchers to provide lightweight security solutions. Many IoT applications send critical image data over the Internet, which requires adequate protection. Traditional security solutions are not suitable due to the resource-constrained nature of the environments. An effective security solution is necessary for such environments that balance lightweight design with strong security measures. Current research efforts in this area lack the ability to provide both secure and lightweight properties simultaneously. Therefore, a robust and lightweight cryptosystem is needed to secure the sensitive information of digital images. This research addresses the existing gap by proposing a lightweight and robust cryptographic system that encrypts digital data in less processing time without compromising security. The proposed image encryption technique is evaluated using security and performance measures, such as cipher processing time, histogram analysis, entropy, correlation, mean square error and sensitivity analysis. Moreover, the comprehensive analysis reveals the proposed image encryption technique effectively and collectively meets all the security and performance requirements compared to existing state-of-the-art lightweight image encryption techniques.</p></div> |
| eu_rights_str_mv | openAccess |
| id | Manara_a71eb28d660edb97ef2e4f7182ef2dcd |
| identifier_str_mv | 10.1371/journal.pone.0320046.g005 |
| network_acronym_str | Manara |
| network_name_str | ManaraRepo |
| oai_identifier_str | oai:figshare.com:article/28671258 |
| publishDate | 2025 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Aggregated Encryption Time in Milliseconds.Abid Mehmood (13822340)Abdul Nasir Khan (17904217)Iynkaran Natgunanathan (14701924)Arslan Shafique (13363419)Iftikhar Ahmed Khan (5679773)Atta ur Rehman Khan (18405640)BiophysicsMicrobiologyCell BiologySpace ScienceEnvironmental Sciences not elsewhere classifiedBiological Sciences not elsewhere classifiedChemical Sciences not elsewhere classifiedInformation Systems not elsewhere classifiedsufficient computing resourcesresilient image encryptionrequires adequate protectionmultimedia traffic volumemean square errorcipher processing timetraditional security solutionsevaluated using securityeffective security solutionperformance requirements comparedencrypts digital datacurrent research effortscomprehensive analysis revealslightweight properties simultaneouslybalance lightweight designstrong security measuresrobust cryptographic systemperformance measuresresearch addressesdigital imagessensitivity analysishistogram analysislightweight cryptosystemenhanced lightweightxlink ">significant increasesensitive informationgrowing importanceexisting stateexisting gapconstrained naturecollectively meetsarea lack<div><p>The Internet is experiencing a significant increase in multimedia traffic volume, highlighting the growing importance of managing and securing multimedia content efficiently. Classical or traditional security solutions are suitable for those applications that have sufficient computing resources. However, the rise of IoTs and its applications opens new directions for researchers to provide lightweight security solutions. Many IoT applications send critical image data over the Internet, which requires adequate protection. Traditional security solutions are not suitable due to the resource-constrained nature of the environments. An effective security solution is necessary for such environments that balance lightweight design with strong security measures. Current research efforts in this area lack the ability to provide both secure and lightweight properties simultaneously. Therefore, a robust and lightweight cryptosystem is needed to secure the sensitive information of digital images. This research addresses the existing gap by proposing a lightweight and robust cryptographic system that encrypts digital data in less processing time without compromising security. The proposed image encryption technique is evaluated using security and performance measures, such as cipher processing time, histogram analysis, entropy, correlation, mean square error and sensitivity analysis. Moreover, the comprehensive analysis reveals the proposed image encryption technique effectively and collectively meets all the security and performance requirements compared to existing state-of-the-art lightweight image encryption techniques.</p></div>2025-03-26T17:32:38ZImageFigureinfo:eu-repo/semantics/publishedVersionimage10.1371/journal.pone.0320046.g005https://figshare.com/articles/figure/Aggregated_Encryption_Time_in_Milliseconds_/28671258CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/286712582025-03-26T17:32:38Z |
| spellingShingle | Aggregated Encryption Time in Milliseconds. Abid Mehmood (13822340) Biophysics Microbiology Cell Biology Space Science Environmental Sciences not elsewhere classified Biological Sciences not elsewhere classified Chemical Sciences not elsewhere classified Information Systems not elsewhere classified sufficient computing resources resilient image encryption requires adequate protection multimedia traffic volume mean square error cipher processing time traditional security solutions evaluated using security effective security solution performance requirements compared encrypts digital data current research efforts comprehensive analysis reveals lightweight properties simultaneously balance lightweight design strong security measures robust cryptographic system performance measures research addresses digital images sensitivity analysis histogram analysis lightweight cryptosystem enhanced lightweight xlink "> significant increase sensitive information growing importance existing state existing gap constrained nature collectively meets area lack |
| status_str | publishedVersion |
| title | Aggregated Encryption Time in Milliseconds. |
| title_full | Aggregated Encryption Time in Milliseconds. |
| title_fullStr | Aggregated Encryption Time in Milliseconds. |
| title_full_unstemmed | Aggregated Encryption Time in Milliseconds. |
| title_short | Aggregated Encryption Time in Milliseconds. |
| title_sort | Aggregated Encryption Time in Milliseconds. |
| topic | Biophysics Microbiology Cell Biology Space Science Environmental Sciences not elsewhere classified Biological Sciences not elsewhere classified Chemical Sciences not elsewhere classified Information Systems not elsewhere classified sufficient computing resources resilient image encryption requires adequate protection multimedia traffic volume mean square error cipher processing time traditional security solutions evaluated using security effective security solution performance requirements compared encrypts digital data current research efforts comprehensive analysis reveals lightweight properties simultaneously balance lightweight design strong security measures robust cryptographic system performance measures research addresses digital images sensitivity analysis histogram analysis lightweight cryptosystem enhanced lightweight xlink "> significant increase sensitive information growing importance existing state existing gap constrained nature collectively meets area lack |