Next Article in Journal
Heterogeneity Challenges of Federated Learning for Future Wireless Communication Networks
Previous Article in Journal
A Zero-Trust Multi-Processor Reporter-Verifier Design of Edge Devices for Firmware Authenticity in Internet of Things and Blockchain Applications
Previous Article in Special Issue
Robust Distributed Collaborative Beamforming for WSANs in Dual-Hop Scattered Environments with Nominally Rectangular Layouts
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs

by
Tarek Srour
1,
Mohsen A. M. El-Bendary
1,
Mostafa Eltokhy
1,*,
Atef E. Abouelazm
2,
Ahmed A. F. Youssef
3 and
Ali M. El-Rifaie
3,*
1
Department of Electronics Technology, Faculty of Technology and Education, Helwan University, Cairo 11792, Egypt
2
Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menofia University, Menouf 32871, Egypt
3
College of Engineering and Technology, American University of the Middle East, Egaila 54200, Kuwait
*
Authors to whom correspondence should be addressed.
J. Sens. Actuator Netw. 2025, 14(2), 36; https://doi.org/10.3390/jsan14020036
Submission received: 16 January 2025 / Revised: 27 February 2025 / Accepted: 7 March 2025 / Published: 31 March 2025

Abstract

:
The resource limitations of Low-Power Wireless Networks (LP-WNs), such as Wireless Sensor Networks (WSNs), Wireless Actuator/Sensor Networks (WA/SNs), and Internet of Things (IoT) outdoor applications, restrict the utilization of the error-performance-enhancing techniques and the use of the powerful and robust security tools. Therefore, these LP-WN applications require special techniques to satisfy the requirements of a low data loss rate and satisfy the security requirements while considering the accepted level of complexity and power efficiency of these techniques. This paper focuses on proposing a power-efficient, robust cryptographic algorithm for the WA/SNs. The lower-complexity cryptographic algorithm is proposed, based on merging the data composition tools utilizing data transforms and chaos mapping techniques. The decomposing tool is performed by the various data transforms: Discrete Cosine Transform (DCT), Discrete Cosine Wavelet (DWT), Fast Fourier Transform (FFT), and Walsh Hadamard Transform (WHT); the DWT performs better with efficient complexity. It is utilized to separate the plaintext into the main portion and side information portions to reduce more than 50% of complexity. The main plaintext portion is ciphered in the series of cryptography to reduce the complexity and increase the security capabilities of the proposed algorithm by two chaos mappings. The process of reduction saves complexity and is employed to feed the series of chaos cryptography without increasing the complexity. The two chaos mappings are used, and two-dimensional (2D) chaos logistic maps are used due to their high sensitivity to noise and attacks. The chaos 2D baker map is utilized due to its high secret key managing flexibility and high sensitivity to initial conditions and plaintext dimensions. Several computer experiments are demonstrated to evaluate the robustness, reliability, and applicability of the proposed complexity-efficient crypto-system algorithm in the presence of various attacks. The results prove the high suitability of the proposed lower-complexity crypto-system for WASN and LP-WN applications due to its robustness in the presence of attacks and its power efficiency.

1. Introduction

With the widespread use of wireless network applications in various fields, the need to overcome constraints is increasing. These constraints decrease the utilization of error control schemes and the robust security techniques [1]. Due to crucial applications such as military, medical, healthcare, and environmental monitoring applications, these applications require the provision of sufficient security level for the network and the transferred information [2,3]. The computational complexity of the security algorithms limits its suitability for the limited resources of wireless networks. Outdoor applications suffer from various challenges due to the resource limitations and the different cyber-attacks. Hence, the suitable security algorithms for the crucial applications must be lower in complexity, flexible in security levels management, and power-efficient [4].
By reviewing the recently published related research papers that focus on the balance between proposing security tools and techniques that are flexible and efficient, and considering the power and computational complexity, it is found that these papers are few, considering the essential issues of complexity and power efficiency in the proposed security techniques for the real-time and outdoor applications of the Object-Oriented Wireless Networks (OOWNs) and Internet of Things (IoT) [5,6,7]. Due to the restrictions of WN applications in the various fields of open environments, such as environmental monitoring, healthcare, and the Internet of Medical Things (IoMT), the side of complexity must be considered in the utilization of data and network security tools as well as the error performance improving tools [8]. The role of security and error control techniques cannot be ignored in the various applications to satisfy the accepted level of data safety and error performance. The computational complexity is defined as the total executed arithmetic and logic operations included in the security algorithms. Hence, the CC is related directly to the power complexity. In the past five years (2019–2024), the researchers’ contributions are not sufficient for this research point [9,10,11,12,13,14,15,16].
The available resources limit the outdoor applications of the Wireless Sensing-based Networks (WSNs) and Internet of Things (IoT). Also, they restrict the utilization of powerful security techniques and error control schemes. Most WSN applications require a long life for the network nodes. The computational complexity of the system is directly related to the amount of consumed power. It is also considered the main utilizing challenge of the channel coding and the powerful security tools in Low-Power Wireless Networks, such as the Object-Oriented Wireless Network (WSN) and Wireless Body Area Network (WBAN), for example [17,18]. This research paper investigates the methods of enhancing the power efficiency of the limited resources of wireless networks, in addition to the balancing of the power efficiency of the proposed security algorithm and achieving a perfect security level to satisfy the requirements and combat various cyber-attacks.
The main tools of power-efficient security algorithms are the data transformation techniques that are used to partition the information into two main portions: the crucial section, which carries the main features, and the second portion, which is the side information [19]. The various data transformation techniques are utilized to evaluate and choose the more suitable techniques based on the results of the preliminary experiments. The features of the proposed algorithm are mentioned in the Main Contributions subsection.

Main Contributions

In this subsection, the main contributions of the presented research paper are presented. The proposed security algorithm is constructed based on chaos mapping and data transforms to achieve the required security level for the classified plaintext and to enhance the power efficiency of the security algorithm. The data transforms are employed to execute the securing processes in different domains and improve the complexity of the algorithm by reducing the amount of the processed plaintext using the decomposing process. The proposed security algorithm provides the optional multi-layered security without increasing the complexity of the algorithm, as clarified in the operation mechanism of the proposed approach. The high flexibility of the proposed algorithm is due to its interaction with the various conditions based on the type of plaintext, the classification degree, the available energy “battery level”, and the environment of the communications.
The existing techniques suffer from some of the limitations and drawbacks. The main limitation of the real-time applications is the longer consumed time of cryptographic algorithms in the encryption and decryption processes [20,21]. Also, the several recent related research works do not consider the time complexity in the evaluation of their proposed algorithms [22,23]. Also, the time complexity is considered a metric through measuring the processing time, which is very essential in real-time applications. The time complexity of the proposed work is compared with the recent related work in an additional table, and real-time IoT applications are considered in [24,25].
The proposed security algorithm achieves security requirements and power/complexity efficiency trade-off via a simple and effective mechanism. In the next generation of security algorithms, the complexity and power of the approach will be the main players in the efficiency of the security techniques, and the power-efficient security algorithms will be the major approaches of Energy-Saving Security Algorithms (ESSAs). The applicability and robustness of the proposed security algorithm are evaluated in the results and experiments using colored and grayscale images considering various attacks. The Gaussian noise, salt and pepper, and speckle attacks are considered in the simulation experiments to evaluate the proposed power-efficient crypto-system algorithm [26]. As clarified in the results, the proposed algorithm has lower complexity and robustness in the presence of various attacks/noise.
Also, the proposed power-efficient security algorithm provides a multi-layered security approach. The security of plaintext is performed in the spatial and frequency domains. The flexible power-efficient security algorithm provides multi-layers based on many conditions such as the available energy resource, the nature of networks and nodes, etc. Also, data transforms are utilized to decrease the complexity, as described in the proposed security algorithm discussion. The power efficiency of the proposed crypto-system is concluded from the decomposing process due to data transform utilization. This decomposition process reduces the original payload/plaintext from a size of 1024 × 1024 to 256 × 256; the complexity of the first dimension is 16 times the last payload size. The security and its levels can be controlled and determined based on the requirements. In the revised manuscript, the computational complexity is considered in a comparison with the recent related work, and the time complexity is added as a metric in the evaluation of the proposed crypto-system, as clarified in the following section. The correlation coefficient (Cr), mean square error (MSE), peak signal-to-noise ratio (PSNR), structural similarity (SSIM), time complexity (TC), and attacks presence are used as metrics for evaluating the proposed crypto-algorithm [27].
The rest of this paper is organized as follows: Section 2 presents the preliminaries to describe the techniques used. Section 3 presents the recent related research works. Section 4 describes the operation mechanism of the proposed power-efficient and lower-complexity multi-layered security algorithm. Section 5 presents the objective metrics that are used for evaluating the proposed technique. Section 6 presents a discussion of the computer simulation experiment results. Section 7 presents various comprehensive comparisons of the proposed algorithm with the existing and related works in different scenarios. The final conclusions are presented in Section 8.

2. Preliminaries

In this section, the utilized techniques for constructing the proposed lower-complexity security algorithm are presented.

2.1. Data Transforms

The data transforms employed in this powerful and robust security algorithm perform two functions: the plaintext decomposition extracts the important portion and reduces the complexity degree. The data transforms are also used to execute the cryptographic process in various spatial and frequency domains, to increase the reliability and robustness of the proposed security algorithm compared to existing approaches, by limiting the complexity due to the multi-layered security [28].
The different data transforms are tested and evaluated to choose the most suitable for achieving the trade-off of security and accepted level of complexity in order to meet the requirements of limited resources of the outdoor applications such as the IoT, WSN, and WBAN [29].
Figure 1 shows the mechanism of DWT for five levels of transformation. Every level/stage can be considered as a complexity reducer and a separate layer of security by unique Skey.
The DCT, WHT, FFT, and DWT are tested due to the complexity of all these data transform techniques being very close, as clarified in Equations (4)–(7). The detailed decomposition of the DWT helps in the construction of the cryptographic algorithm and in eliminating the huge increase in the complexity [17].
Example of algorithm operation and complexity reduction:
The L(ɳ) contains the main information of the plaintext, where ɳ = Ψ/2 and Ψ = M/2.
The H(ɳ), LΨ(ɳ), and HΨ(ɳ) are the side information of the plaintext. The ciphering of these portions is neglected due to complexity reduction and lower intelligence in these sections.

2.2. Chaos Mapping

This section is devoted to defining and clarifying the second technique, which is employed for constructing the proposed crypto-algorithm. The chaotic encryption is a widely used tool for image encryption; it utilizes the chaotic maps such as baker, logistic, and cat maps to build cryptography algorithms. The chaos mapping term is defined as the cryptographic approach based on one or more chaotic maps. It is used for performing the ciphering process. In the proposed algorithm, there are two chaos maps utilized: the logistic and baker maps. The first map is employed due to its high sensitivity towards any tampering, noise, and attacks. The baker chaos mapping is employed due to its sensitivity to the secret keys and its robustness and resistance to the attacks. It interacts with the multi-layered crypto-system perfectly [30].
The most applicable chaotic maps are the 2D baker and logistic maps. The ciphering based on baker chaos mapping is performed on the plaintext/payload and the per-encrypted portion, while the logistic based ciphering is executed on the n-ciphered text in the last stage of the algorithm [31].
The baker map is defined as a two-dimensional chaotic map. It transforms a square matrix into itself after operations similar to randomization. The baker map can be considered an efficient tool to randomize a square matrix of data. The baker map is described mathematically, as shown in the following Equation (1) [32,33].
B x ,   y = 2 x , y / 2 0   x < 1 / 2 2 x 1 , y / 2 + 1 / 2 1 2     x < 1
The generalized form of a baker chaos map is the simplified form, as presented in [34]. The more complex chaos baker map is formulated in 2D, as in Equation (2), as follows:
B ɳ ,   ψ = N n i ɳ M i + ψ + m o d M m i ,   n i N ψ ψ   m o d M m i + M i
The generalized and discretized versions are shown in Figure 2a. The discredited map can be represented for an M × M matrix, as shown in Figure 2b, which represents a 2D chaotic encryption of an 8 * 8 matrix. The baker map encryption is dependent on the stretch-and-fold concept. This means that the plain image is randomly distributed in the encrypted image [35].
The logistic map is defined as a chaotic map; it has two formats for application as a tool in data encryption, which are 1D LM and 2D LM. The latter is considered in our research. The 2D logistic map is a discrete dynamic system; it is described and presented as an efficient tool to encrypt the digital images in several research papers, such as in [36,37]. Equation (3) gives the mathematical formula of the 2D logistic map [38]. This chaos map is highly sensitive towards noises and attacks; it is used as a perfect detection tool to detect any tiny tampering in the original data. Due to its sensitivity, the LM chaos-mapping-based ciphering in the proposed algorithm is only performed as a last level of the security layer.
L x i + 1 ,   y i + 1 = r 3 y i + 1 x i 1 x i r ( 3 x i + 1 + 1 ) y i   ( 1 y i )
The (xi, yi) represents the point at the ith iteration. Further, (xi, yi) and r are the initial values and the system parameter of this map, respectively. The previous equation defining the 2D logistic map is complicated, and is a complex dynamical system.
Due to the behavior of chaos mapping, it is suitable to use as an efficient data randomizing tool, as proposed previously in a number of research papers [30,31,32,33,34,35,36,37,38]. This type of chaotic map has high capability to resist the noise and tampering in the cipher version. The different noise/attacks are employed, such as Gaussian noise, salt and pepper, and speckle attacks, for evaluation of the performance of the proposed chaos-mapping- and transforms-based crypto-system in the presence of the various noises/attacks [39,40,41].

2.3. Key Management of Chaos Mapping

The secret key management in the baker mapping case can be presented through its mechanism operation [36]. In Figure 2b, the original plaintext/payload and the encrypted version/cipher text are given for the square matrix of 8 × 8 dimension. The baker map operation depends on the dimension of the input data/payload, which determines the length of the secret key (Skey). Figure 2b gives the operation mechanism of the baker map for 8 × 8 matrixes and the Skey = (2, 4, 2). The secret key is controlled and determined based on the size of the managed plaintext. The degree of confusion effectiveness can be controlled by the contents and elements of the secret key.
The amount of payload/plaintext determines the Skey, and the contents of the Skey control and determine the power of the randomization and encryption process.
The generation steps of secret keys for constructing the keys pool can be expressed as follows:
For the image pixels’ dimensions (m, n, x) for RBG images, the image must be a two-dimensional image and converted to grayscale mode images (M × M), as in Equation (4).
I [M, N] = immersive (I (m, n, x)
It is reshaped to a square matrix for generalization of the format to a square (Equation (5)).
I(Square) = reshape(I[M, N], Sqrt(M × N)Sqrt(M × N)]
The key elements must be equal to the Sqrt (M*N):
Skey = (e1, e2, e3, e4, ----------en). =Squar_root(M × N)
To generate the key automatically, there are two processes: the systematic auto-key, as in Equation (1), and the semi-systematic auto-key generation, as in Equation (7). For the systematic key generation, simple examples are given in Equations (5) and (6).
The systematic auto-key Gen=
T h e A u t o . G e n . S y s . K e y s = s r ( m n ) z , s r ( m n ) z , s r ( m n ) z , . , s r ( m n ) z
Listed are the employed secret keys (Skeys) that are utilized in this proposed work for encryption of the classified images in the various simulation experiments.
  • Camera man (1024 × 1024) secret keys:
Skey1 = [23, 25, 10, 6, 23, 25, 10, 6, 23, 25, 10, 6, 23, 25, 10, 6].
Skey2 = [35, 15, 14, 35, 15, 14, 35, 15, 14, 15, 35, 14].
Skey3 = [32, 16, 4, 8, 8, 4, 64, 8, 16, 32, 32, 16, 16].
Skey4 = [32, 32, 32, 16, 16, 32, 4, 4, 16, 4, 4, 16, 16, 32].
  • Girl secret keys:
Skey1 = [64, 32, 32, 32, 32, 64].
Skey2 = [50, 44, 26, 8, 8, 26, 44, 50].
Skey3 = [64, 32, 64, 32, 64].
Skey4 = [25, 25, 5, 73, 73, 5, 25, 25].
  • Sailboat secret keys:
Skey1 = [40, 10, 25, 25, 30, 20].
Skey2 = [50, 5, 10, 30, 20, 30, 5].
Skey3 = [20, 5, 15, 10, 35, 15, 50].
Skey4 = [10, 40, 40, 10, 10, 40].
  • Cable Car secret keys:
Skey1 = [10, 55, 32, 40, 13].
Skey2 = [35, 5, 10, 10, 15, 25, 50].
Skey3 = [15, 35, 15, 20, 10, 5, 15, 30, 5].
Skey4 = [25, 15, 10, 35, 15, 40, 10].

3. Literature Review

In this section, our survey focuses on the recently published and existing security algorithms that consider the power efficiency of the presented security approaches. Also, similar objectives are considered in the presented comprehensive comparison of the proposed work with the state-of-art related works in Section 7.
As mentioned in the Section 1, the most existing and recent published related works ignore the two important factors, the computational complexity analysis and the power efficiency of the proposed security algorithms, as well as the provided security level and layers. Most of the presented related work focuses on the proposed techniques and their applicability in-the outdoor applications of WSN and IoT. This section of the literature review includes the related works of image/visual data security techniques. In the following are the most closed related security algorithms that consider the two vital issues without enough analysis.
Approaches of securing data on WSNs are proposed in [42,43]. In [42], the proposed approach relies on integrating asymmetric elliptic curve cryptography (ECC) and symmetric advanced encryption system (AES) techniques to provide a high level of security for data on the network. In this approach, the cluster head encrypts the data received from the subnodes based on the encryption keys generated from ECC and symmetric AES techniques. The encrypted data are sent to the main station. The main station decrypts the encrypted data relying on private encryption keys in order to retrieve the original data before the encryption process. Figure 3 illustrates the proposed approach for securing data in the WSNs. In [43], the authors discussed data security in WSNs. The authors presented an evaluation of four different types of algorithms used for data encryption. These algorithms are Rectangle, Fantomas, Camellia, and AES. The evaluations included the performance of the algorithms in execution times, throughput, and energy consumption in encrypting and decrypting data. The results showed that the Rectangle and Fantomas algorithms performed better in WSNs.
This research presents an approach for data encryption in WSNs applications. The proposed approach relies on the dynamic salt key for data encryption. The proposed approach includes three stages: the first stage is the creation of the encryption salt key, the second stage is the encryption of the data using the encryption key, and the third stage is the decryption of the encrypted data at the main station of the network. The proposed approach provides a level of security for the data with low energy consumption and low computational complexity. Figure 4 illustrates the data encryption scheme for the proposed approach [44].
The concepts of combing techniques or multi-layered security tools are presented in [45,46]. In [45], they presented a multi-level encryption system to secure data on WSNs. The proposed system combines symmetric algorithm AES and asymmetric algorithm ECC encryption of data. Data are encrypted at two levels, the first using AES encryption and the second using ECC encryption. The encrypted data are reduced in size using the Lempel–Ziv–Welch (LZW) image compression encoding technique. The proposed system provided time savings for encryption compared to some other systems. In [46], the authors provided data security algorithms for WSNs. The proposed security algorithms were constructed based on the suitability of the encryption data on WSNs. The evaluations included the performance of the algorithms in PDR, throughput, and energy consumption.
In [47], the authors suggested an approach for securing data transfer over the WSN applications. The approach relies on the Exceptional Key-based Node Validation for Secure Data Transmission-asymmetric encryption technique (EKbNV-SDT-AC) to encrypt data on the network. The proposed approach generates secret keys and distributes them on each node in WSNs. Each node encrypts data using a special secret key. The encrypted data are sent to the WSN main station. Figure 5 illustrates the proposed approach scheme for securing data in the WSNs.
The authors in [48] presented an approach to improve the routing and security of the transferred data on WSN application scenarios. The proposed approach relies on the Trust-Analysis-Based Energy Efficient and Safe Routing (TABEESR) protocol for routing network and securing data. Also, the proposed approach relies on public static agreement keys for encrypting data. Figure 6 illustrates the proposed approach for routing and securing data in the WSNs. In [49], the authors presented an evaluation of three different types of algorithms used for encrypting the transferred information. These utilized algorithms are block ciphers, stream ciphers, and hybrid ciphers. The evaluations included the performance of the algorithms in terms of the computational complexity of these techniques.
Securing of the colored images’ transmission over the WSNs utilizing a multi-level of encryption technique was proposed in [50]. The proposed encryption approach integrates three different levels of encryption, relying on three different encryption techniques. The techniques used in the proposed system are One-dimension Empirical Mode Decomposition 1D (EMC), 2D-DWT, and a 1D modified version of the logistic map (1D MVL). The system divides the colored image into three channels. Each channel is encrypted using different encryption levels. The three channels are combined again after the different encryption levels to produce the encrypted image. Figure 7 illustrates the proposed system diagram for encrypting colored images on WSNs, showing the symbol of the XOR logic function in the various processes of the combined cryptographic technique.
A data security approach in a healthcare application was presented in [51], to protect the reading data of the medical monitoring sensors. The proposed approach relies on the integration of different techniques for encrypting sensor data. This integration of various techniques provided a high level of security for the data on the network. The proposed approach combines AES and Rivest–Shamir–Adleman (RSA) techniques to secure data from medical monitoring sensors. Figure 8 illustrates the proposed approach diagram for securing medical sensor data. In [52], the authors presented an approach for securing data for smart home healthcare. The proposed approach combines AES and RSA techniques to secure data for smart home healthcare.
The security of WSNs was considered in [53]. This research discussed an algorithm for securing the transferred information over WSN applications scenarios. The proposed algorithm relies on the management of data routing and encryption on the network. The proposed algorithm uses hybrid energy-efficient distributed protocol for data routing. In the proposed algorithm, encryption keys are generated using a pseudo-random number generator. Data are encrypted on the network through cipher block chaining–Rivest Cipher 5. The proposed algorithm provides a high level of security for data on the network. Figure 9 illustrates the proposed algorithm scheme for securing data.
In [54], the authors provided an encryption approach to enhance the WSN security and provide a wireless secured link. The proposed cryptographic approach relies on the management of data routing and encryption on the network. The proposed approach improved the Low-Energy Adaptive Clustering Hierarchical (LEACH) routing protocol responsible for data routing over the WSNs scenarios. Also, the proposed approach provided data security on the network by managing the distribution of encryption keys among nodes, relying on the elliptic curve cryptography technique. In [55], the authors presented a survey about security, attacks, and security threats in real life based on WSNs. Also, the authors provided a solution to improve security on WSNs by adopting a handshaking mechanism with the alpha method.

4. The Methodology of the Lower-Complexity Crypto-System

The lower-complexity security algorithm based on the data composition and chaos mapping techniques is described in this section. The proposed algorithm is designed for and devoted to the limited-resource wireless network applications due to their resource limitations, such as Wireless Actuator Sensor Networks (WASNs), the outdoor applications of IOT and its medial functions, etc. Figure 10 and Figure 11 clarify the construction and mechanism operation of the algorithm.

4.1. Encryption Algorithm Steps

In the following, the processes and multimedia handling stages are listed to clarify the smoothing and robustness of the proposed crypto-algorithm.
The marking process is described stepwise, and is also described briefly in the block diagram shown in Figure 11.
Notes: In the following steps of the cryptography algorithm, the plaintext term means the original data (original classified image), while the side information/header term means the LH, HL, and HH partitions of the DWT transform technique. These terms are replaced by “payload and “header” terms.
The steps of the encryption process are described as follows in a step-by step manner to be more readable and understandable:
Step#1
  • The classified RBG image (IRGB) is converted to a grayscale image
*Grayscale image is directed processed as input to step two.
IGR = ICon (RGB).
  • Gr stands for grayscale images and SD stands for square dimensions.
Generating square image ISD = IGr (M*M).
Step#2
  • The ISD decomposition transforms tech as a stage (1) processing.
DWT (ISD) = {LL1, LH1, HL1, HH1}.
*LL, LH, HL, and HH are symbols that represent the output of the DWT transform.
L refers to low band, H refers to high band.
1 refers to the stages of decomposition and method of controlling the complexity.
The dimensions refer to the amount of complexity.
The components of LL1 dimensions (M/2*M/2).
LL1Dim (M/2, M/2).
  • LL1_Org is separated to decompose the process individually.
Org refers to the original main partition of the original classified image.
Step#3
  • DWT2(LL1_Org) = {LL2, LH2, HL2, HH2}
The LL2Dim (M/4, M/4).
M: the Dim of the original plaintext.
Step#4
Repetition of Step#3 can be performed for more iterations to increase the reduction in the complexity and extension of secret keys to subsections.
Suppose: after N repetition,
  • The LLNDim(M/2N, M/2N).
Ex: Let the Org. dimensions of payload/plaintext be {Dim (1024 × 1024)} and the number of iterations is two (N = 2).
Therefore, LL2Dim (256 × 256)—the amount of data will be manipulated by the chaos mapping cryptography in the frequency domain (FD).
If the number of iteration is doubled to four (N = 4):
The LL4 Dim (64 × 64), as shown the iterations, reduces the original processed payload to one-fourth of the case (N = 2).
Then:
Step#5
LLnS* = {LL*n, LH*n, HL*n, HH*n}.
The nS refers to the number of stages.
The components are segmented into two segments.
The main portion/payload = {LL*}.
The inside information/header = {LH*, HL*, HH*}.
  • The encryption process can be performed at every stage or the lower dimensions.
Step#6
The encryption process is performed to manipulate the last payload size for ensuring the lower level of complexity.
LL*nS_EncI = BM (LL*nS), using Equation (2).
* The nS refers to the number of stages (nS): the decomposition times by DWT.
*EncI is contained from two sections. Enc is the abbreviation of “encryption”; it refers to the produced encrypted version, and I (number) refers to the number of the encryption process.
Step#7
To increase the confidentiality, the process can be repeated in cascaded behavior with the variations in secret keys.
Repeating the encryption with various Skeys:
Notes:
Jsan 14 00036 i001
The accepted number of stages is restricted by the Org. Dim of the plaintext/payload, due to the direct relation of the power and varieties of Skey and the Dim of the plaintext/payload.
Jsan 14 00036 i001
Enc-I, Enc-II, Enc-III, etc., denote the stage of encryption, and may equal the decomposing stages or not; this is optional in the algorithm.
Jsan 14 00036 i001
The generated Skey is executed based on the new Dim of the processed plaintext.
Jsan 14 00036 i001
Stage 2 of the encryption (optional) uses the different Skey or the same one, or relays the encryption to another decomposing process for more simplicity.
Jsan 14 00036 i001
Example of the two optional processes:
In the following, description, two optional processes can be used to manipulate the payload for achieving the requirements of security and accepted level of complexity. These two approaches of data manipulation involve the encryption and data transform tools for data decomposition via different roles, as in the following examples: LL*1S_EncI = BM (LL*1Org) First Enc. {this first encrypting process}.
The encrypted payload can be encrypted again (directly) or manipulated by DWT to be decomposed to subpayload; hence, the main payload (produced LL) will be manipulated by the second encryption process only to satisfy the lower complexity in the computation and time.
In the second Enc., there are two ways:
LL*2S_EncII = BM (LL*1S_EncI).
**First type on manipulating (direct encryption of encrypted payload)
OR
DWT (LL*1S_EncI) = {LLE1, LHE1, HLE1, HHE1} (Decomposition2)
E1 means the production of the 1st encryption stage.
(Decomposing the encrypted payload to decrease its size in FD).
The main produced payload portion (LLE1) will be manipulated in the second encryption process as follows:
LL*2S_EncII = BM (LL {LL*1S_EncI}) (encryption of generated LLE1).
The repetition is as required.
LL*nS_Enc_O = BM (LL*nS_Enc_n)(Direct encryption) by n times (N refers to the number of repetition process)
OR
LL*nS_Enc_O=BM (LL {LL*(n-1) S_Enc_n-1}) {decomposition and encryption of decomposed payload) n times, where O refers to the order of required open process.
Figure 10 shows the stages of the cryptographic algorithm with the various data transforms merging. Due to the complexity survey of the different data transform techniques, which are utilized in the proposed algorithm to decompose the original plaintext, it is found that the computational complexities of them are close. Hence, based on the preload experiments, the DWT is the most suitable to achieve the high quality extracted decipher text and complexity reduction.
The product of stage 1 in the proposed algorithm will be the data input to the optional next stage, which is given in Figure 10. In this additional stage, there are two powerful points: one is employing the number of rounds after transforming the pre-encrypted data, the second is the round of chaos-based crypto-system containing one or more rounds using highly sensitive logistic map (LM)-based cryptography in the form of one-dimensional (1D) LM and two-dimensional processing 2D LM to catch and detect any tiny tampering.
Figure 11 clarifies the crypto-algorithm complexity utilizing the DWT transform, where a single * refers to the output portions of the decomposing process, and a double ** represents the cascaded cryptographic process on the (LL*) portion only, after the decomposition process. The multi-stage ciphering can be executed on the plaintext with the same complexity order due to the decomposition of the classified plaintext and separation of the main portion from the side information portions. As shown in the previous Figure 9, Figure 10 and Figure 11, the partitioning/decomposition of the plaintext/payload reduces the manipulated number of data to one-fourth of the size. The complexity of the proposed algorithm decreases with the increase in the level of security due to the Skey segmenting and cascaded multi-layered crypto-algorithm. In Section 6, an example of the complexity efficiency of the proposed algorithm is presented in a simple numerical comparison between the classic and proposed approach for manipulating the same image size.

4.2. The Complexity Analysis of the Proposed Algorithm

The different tools of the data transforms are utilized to employ the most suitable one, and the DCT and DWT are commonly used. The DWT is more suitable than the DCT and WHT transforms due to the dimension results of them. Therefore, the DWT-based approach is used for ciphering the digital image and protecting the plaintext from the various attacks, with high power efficiency and reduction in the complexity [56,57,58]. In the following, the complexities of the various data transform techniques are presented in Equation (8).
C D C T = O N 2 N o . A . & L . O p s
The reduced required operations are calculated using Equation (9) as follows:
C M D C T = O N l o g N N o . A . & L . O p s
The computational complexity of DWT is expressed by Equation (10):
C D W T = O N 2 N u m b e r o f O p e r a t i o n s
The computational complexity of WHT is expressed by Equation (11):
C W H T = O m l o g 2 m N u m b e r o f O p e r a t i o n s
As shown, from these previous equations, the complexities of the different techniques are very close, especially the DCT and DWT. Practically, and based on the computerized experiments, the DWT-based power/complexity efficient crypto-system is effective and robust due to the varieties of the side information.

5. The Objective Metrics: Performance Evaluations

The efficiency, reliability, applicability, and complexity measurements of the proposed cascaded lower-complexity crypto-system are performed, evaluating the processing time, quality of the extracted/decrypted image, and number of rounds. Also, the presence of noise/attacks is considered in the evaluation scenario. A special group of computer-based simulation experiments were executed to measure the resistance of the proposed lower-complexity crypto-algorithm and its applicability in the presence of noise/attacks.
This section defines the different performance metrics, which are used for evaluating the robustness and reliability of the proposed cascaded–interactive cryptographic algorithm depending on time complexity, extracted image quality, decrypted image quality, attack resistance, and attack sensitivity. Many metric tools are employed for measuring the similarities of the original image and the extracted/decrypted image. Also, the efficiency of the presented crypto-stego algorithm is evaluated through the classified image quality. The used metrics are described in [27,59,60] as follows:
  • Correlation Coefficient (Cr):
It is one of the best metrics to evaluate the degree of closeness between the two functions. This metric can be used to determine the extent to which two images are close to each other, as given in Equation (12).
C r = C o r r ( F ( x ,   y ) ,   f ( X ,   Y )
Thus, it gives a direct measure of the proposed algorithm efficiency. The most efficient algorithms produce images with correlation ratios closer to unity.
  • Mean Square Error (MSE):
MSE is one of the most important image quality evaluation metrics, and it can be defined as the average of the squares of the differences between the intensities of two examined images. It can be mathematically represented as in Equation (13):
M S E = 1 M N i = 1 M j = 1 N ( f i , j f i . j ) 2
where f (i, j) is the original image and f′ (i, j) is the marked image. Higher values of MSE mean that the image is of poor quality.
  • Peak Signal-to-Noise Ratio (PSNR):
The PSNR can be formulated mathematically as in Equation (14):
P S N R d B = 10 log 255 2 M S E
A higher value of PSNR is better.
  • Structural Similarity (SSIM):
The SSIM is a recently proposed image fidelity measure which has proved highly effective in measuring the fidelity of signals. The human visual system is highly sensitive to structural distortions and easily compensates for nonstructural distortions. The main function of the SSIM is to simulate this functionality; it is calculated as follows:
Let x = {xi|i = 1, 2, ..., N} and y = {yi|i = 1, 2, ..., N} be the original and the test image signals, respectively. Then, the SSIM can be expressed as in Equation (15):
S S I M x , y = 2 μ x μ y + C 1 ( 2 σ x y + C 2 ) μ x 2 + μ y 2 + C 1 ( σ x 2 + σ y 2 + C 2 )
  • The Computational and Time Complexity (CC&TE):
The fifth metric tool is the complexity of the proposed crypto-system compared to the related and existing security techniques. The complexity term refers to three related concepts: the computational complexity, which deals with the number of operations for executing the crypto-system to encrypt and decrypt the plaintext; the time complexity (TE), which deals with the execution time of the crypto-system algorithms; and the power complexity, which deals with the amount of power required to perform the algorithms of the crypto-system. These three terms are joint and related. In this paper, the time complexity is measured to evaluate the processing time of the encryption algorithms of the proposed lower-complexity crypto-system.

6. Computer Simulation Result Discussion

The different computer-based simulation experiments were performed to demonstrate the performance of the Multi DWT and N-round chaos-based cascaded cryptographic approaches. Simulation tests were run using Windows 10 and MATLAB version 2017.
The simulation experiments were implemented on a set of different images, both in terms of size and grayscale (black and white) and RBG colored images to evaluate the applicability of the proposed technique. Figure 12 illustrates the utilized images in the computer simulation experiments, including the grayscale and RBG images.
The selected testing images for the simulation experiments were chosen to achieve the applicability, where they included the standard and nonstandard images with variations in both two types for evaluating the proposed crypto-algorithm. The WSN and outdoor IOT applications carry the scalar data and images; the proposed crypto-algorithm is suitable for both scalar data and images. The image encryption requires high computation; this issue is manipulated through the decomposition process to reduce the processed payload by 4 times and to decrease the computational complexity by 16 times.

6.1. Preparation of Simulation and Parameter Setting

This section defines the environment of the simulation experiments. The parameter setting of the simulation is defined to help the researchers and readers understand and make logical comparisons. Table 1 tabulates the different parameter settings of the simulation and their values and natures.
Table 1 is added to tabulate the experimental simulation environment. Also, the similar objectives are considered in the presented comprehensive comparison of the proposed work with the state-of-art related works.

6.2. The Applicability Measurement of the Multi DWT and N-Round Chaos-Based Cascaded Cryptographic Approach Using Grayscale Images: Four-Cascaded Skeys (N = 4)

In this section, the experiments are demonstrated to measure the applicability of the Multi DWT and four-cascaded cryptographic algorithm using grayscale images within the four different Skeys. In these experiments, the various images, standard and nonstandard, are utilized, where the different metrics are used to evaluate the quality of the extracted plaintext after the Multi DWT and four-cascaded process.
Table 2 and Figure 13 show the results of the simulation experiments on four encryption keys for different images of size 1024 * 1024. The results presented in the table illustrate the robustness of the Multi DWT and N-round chaos-based cascaded cryptographic approach. We observe a significant difference between plaintext and cipher-text in the camera man image and the girl image
In the camera man image, the correlation coefficient between plaintext and cipher-text is 0.0030, while in the girl image, the correlation coefficient between plaintext and cipher-text is 0.0079. These are values less than 1, indicating the robustness of the encryption for Multi DWT and N-round chaos-based cascaded cryptographic approaches.
The results of experiments and the metric values demonstrate the effectiveness of the proposed lossless cascaded cryptographic approach based on decomposition/cryptography techniques in recovering data with the lossless technique. As observed in both images, the Cr between plaintext and decrypted text is 1.
Based on the results of the computerized experiments, it is clarified that the multi-merged secret keys for the 4L-DWT have the same complexity; in the case of reduction of these levels, the complexity is decreased by 25% with every level-DWT reduction. Therefore, based on the circumstances of the data communications on the WA/SN or on the outdoor IOT application scenarios, the amount of suitable complexity can be determined according to the level of DWT utilization.

6.3. Attacks Presence Consideration {Grayscale Images}

In this section, we present the results of the simulation experiments for the Multi DWT and N-round chaos-based cascaded cryptographic approach in the presence of different attacks. The simulation experiments were conducted on a number of different grayscale images.
Two images were used to test the robustness of the algorithm and its resistance of the noise. The noises were applied with various values, as shown in the results.
The three different image attacks, Gaussian noise, salt and pepper, and speckle attacks, were applied with the different values of α 0.1, 0.01, and 0.001. These attacks were applied on the proposed approach. The result samples of the two different deciphered images are tabulated in Table 3, Table 4 and Table 5 for α = 0.1, α = 0.01, and α = 0.001, respectively.
As shown in Figure 14 and Table 3, the worst-case result is {α = 0.1}; the ordinary quality metrics mentioned in Section 4 are utilized to evaluate the deciphered images. The Gaussian noise has a worse effect on the images than the salt and speckle noise. Sometimes, the effects of these noises differ from one image to another due to the values of pixels, as shown in the variations between the camera man (Cr = 0.6671) and girl (Cr = 0.4884) for Gaussian noise. For speckle noise, the metrics values are very close, as shown in the tabulated results in Table 3. Therefore, based on these results, it is clear that the proposed algorithm resists the salt and pepper and speckle noise more than the Gaussian noise.
As shown in Table 4 and Table 5, Figure 15 and Figure 16, the deciphered images have been improved, as clarified from the values of the quality metrics. From the tabulated results in Table 4, the deciphered image from the Gaussian noise is affected more, with Cr = 0.9397, compared with the Cr = 0.9762 and Cr = 0.9674 for the salt and speckle noise, respectively, in the same scenario. The effects of these noises differ from one image to another, as shown in the results of experiments, due to the values of pixels, as shown in the variations between the camera man (Cr = 0.9397) and girl (Cr = 0.8748) for Gaussian noise. In the case of salt and pepper noise, the metric values are very close, as shown in the tabulated results in Table 5. Therefore, it is clear that the proposed Multi DWT and N-round chaos crypto-algorithm performs better with the moderate noise existence; the quality of the extracted deciphered classified image is good.
In the presence of lower noise levels, the proposed security algorithm successfully extracts the image with very high quality, as verified by the tabulated results in Table 5.

6.4. The Applicability Measurement of the Multi DWT and N-Round Chaos-Based Cascaded Cryptographic Approach Using RGB Images: Four-Cascaded Skeys (N = 4)

In this section, the experiments are demonstrated to measure the applicability of the Multi DWT and four-cascaded cryptographic algorithm using RGB images within the four different Skeys. In these experiments, the various images are utilized, where the different metrics are used to evaluate the quality of the extracted plaintext after the Multi DWT and four-cascaded process.
Table 6 and Figure 17 show the results of the simulation experiments employing four different encryption secret keys (Skeys) with different four images of size 300 × 400 × 3. The results presented in the table illustrate the strength of the Multi DWT and N-round chaos-based cascaded cryptographic approach. We observe a significant difference between plaintext and cipher-text in the sailboat image and the cable car image.
In the sailboat image, the correlation coefficient between the plaintext and cipher-text is 0.1596, while in the cable car image, the correlation coefficient between plaintext and cipher-text is 0.0571; these values of correlation indicate and prove the robustness of the encryption for the Multi DWT and N-round chaos-based cascaded cryptographic approach.
The results also demonstrate the effectiveness of the Multi DWT and N-round chaos-based cascaded cryptographic approach in recovering the ciphered images. Hence, it can been considered a lossless cascaded cryptographic technique. We observe in both images that the correlation coefficient between the plaintext and decrypted text is 1. This indicates the efficiency of the Multi DWT and N-round chaos-based cascaded cryptographic approach in recovering data without any loss.
The computer-based experiments were demonstrated to evaluate the applicability of the proposed lower-complexity chaos-DWT cryptographic algorithm utilizing the different RBG and grayscale images. As clarified in Section 2, which presents a description of the proposed approach, and confirmed in the preliminary experiments, the main portion of the decomposed plaintext represents 25% of the entire decomposed file and carries the most important data of the plaintext. Therefore, the series of the chaos mapping series cryptography algorithm can be performed on the plaintext four times without extending the complexity. Also, the complexity and consumed power can be limited/reduced by decreasing the levels/times of decomposition of the plaintext. For example, supposing the decomposing level is 16 DWT, the complexity of the processes of the proposed algorithm reduces if the cryptography is executed in a series in the last four stages of the decomposed files. In this proposed scenario, the complexity of the chaos mapping cryptography algorithm can be calculated by the following Equation (16):
C D e c . 16 = O ( O r i g i n a l A l g . ) / 2 L
where L represents the number of level decomposition; it can also express the amount of complexity reduction.
According to the previous results and analysis, the proposed chaos mapping decomposition crypto-system can be applied for the hashing environment applications of the IoT and LP-WN, such as WSNs, WBANs, and WA/SNs, due to the variations of the application’s scenarios based on the nature of the application environment.

6.5. Attacks Presence Consideration {RBG Images}

In the following, the previous computer experiments are repeated for evaluation of the performance of the algorithm utilizing the RBG classified images. The results of these experiments are tabulated in Table 7, Table 8 and Table 9 and Figure 18, Figure 19 and Figure 20.
As clarified from the results of the proposed multi DWT and crypto-system on the RBG images, the presence of noise has a weak effect on the extracted deciphered images due to the greater values of the metrics compared to the values in the previous experiments with the same scenarios of testing and noise type presence.
In Figure 21, the quality of decrypted grayscale/RBG images is inspected in the presence of Poisson attacks. As clarified in the metrics values, the proposed crypto-system performs better in the presence of Poisson attacks than the previous attacks, as tabulated in Table 9 and Table 10. As shown in the results of this experiment, the metrics of the deciphered grayscale images are Cr = 0.9999, PSNR = 63.36, SSIM = 0.9995, and MSE = 0.4833 for the camera man image; and Cr = 1, PSNR = 76.29, SSIM = 1 and MSE = 0.0246 for the girl image. For the results of the RBG images, the metrics’ values are PSNR = 50.920, Cr = 0.9976, SSIM = 0.9904, and MSE = 2.9088 for the sailboat image. The metrics of the deciphered sailboat image are as follows: PNR = 45.752, Cr = 0.9970, SSIM = 0.9508, and MSE = 9.5736. The results prove the superiority of the proposed crypto-technique and its reliability for ciphering the grayscale and RBG images in the presence of attacks. The grayscale images perform better in the presence of Poisson attacks than the colored images.
Therefore, the results of the previous experiments conclude the robustness of the crypto-system with the grayscale and RBG images, while it performs better with colored images. Also, the presence of different noises does not prevent the successful extraction of the deciphered image after several rounds of encryption. Hence, the proposed Multi DWT-N-round crypto-system is robust, reliable, and shows good resistance to noise and attacks.
The proposed crypto-system manipulates the complexity of the existing and recent related works through consideration of the real-time application requirements. It presents a flexible manner based on the decomposition process to reduce the amount of payload. The computational complexity is affected by the amount of payload and is related directly to the time consumption and the power complexity. In the following example, the complexity efficiency is presented.
For example, suppose that the plaintext is in an image with Dim (1024*124) pixels:
The complexity due to the chaos mapping = O (N*Φ).
N is the number of data elements (size of image as an example), and Φ is the number of operation due to the ciphering process. Hence, the number of operations = O ( 10 ( 2 10 2 10 ) ) = O ( 2 21 ) ; if the Φ = 10 operations only, one round is required by one Skey.
With the proposed algorithm:
Suppose that the level = 4 only, so the processed plaintext Dim (1024/4, 1024/4) = (256*256).
Therefore, when applying the ciphering only on the level 4:
The complexity = O ( 10 2 8 2 8 ) = O ( 2 17 ) , and the complexity is decreased to one-fourth of the value compared to the previous.
Let us consider the ciphering applied on the plaintext in level 3 of the DWT and level 4. The 2-ciphering process will cost the complexity half the original processing of the plaintext ciphering.

7. Comprehensive Comparison

This section presents the comprehensive comparison of the proposed algorithm within the different scenarios with respect to the existing techniques and related works. The presented comparison considers and includes the recent related works that propose the security techniques for the real-time applications of the IOT and WSNs.
In the first scenario of comparison, the different metrics are considered and the utilized techniques are tabulated in Table 10. As clarified in the tabulated results, our proposed algorithm has high-quality decrypted images and it is superior to those of the related research papers in terms of the encryption algorithm performance.
In the second scenario of comparison, the utilized metrics in our work are considered in the presence of attacks, as tabulated in Table 11. As clarified in the tabulated results, our proposed algorithm performs better in the presence of different attacks and it is superior to those of the related research papers in terms of evaluation procedures, as clear from the utilized performance metrics.
In the last scenario of comparison, the time complexities of the proposed crypto-algorithm and the related works are considered and tabulated in Table 12. Figure 22 gives a brief overview of the consumed time for the encryption process and the decrypting process of the proposed chaos-DWT crypto-algorithm for the utilized images. Our proposed algorithm has lower time complexity than the related works due to the amount of time consumed in the encryption and decryption processes, as shown in Table 12.

Practical Limitations and Future Directions

This section is devoted to a brief description of the practical limitations and drawbacks of the proposed power-efficient crypto-algorithm, along with suggested solutions. The suggested solutions will be considered in future research works.
The main limitations of our proposed work rely on the amount of processed data and the degree of secret classifications, which determine the number of iterations in the proposed works. On the other hand, the available resources in the nodes must be considered. The resources and complexity due to the security trade-off is a challenge in the proposed technique. This challenge will be considered in future work through proposing algorithms to manage the required security level with respect to the available resources and overhead computation.

8. Conclusions

This paper presents an efficient and robust cryptographic algorithm for the limited-resource LP-WNs such as WA/SNs and outdoor IOT applications. The proposed security algorithm is constructed based on a combination of the decomposing tool and chaos mapping techniques. The lower-complexity cryptographic approach utilizes the plaintext decomposition to reduce the complexity through exclusion of the side information portions of plaintext. The various data transform techniques were employed to choose the superior tool. The DWT-chaos cryptographic algorithm gives lower complexity and high power efficiency. The chaos mapping is used to perform the ciphering process in a series of stages. The 2D logistic is used due to its high sensitivity; it encrypts the main plaintext portion in the last crypto-series. The 2D chaos baker mapping is used due to its secret keys management and its sensitivity to initial conditions. The experimental results revealed that the complexity is decreased by than 50%. Also, many computer experiments were demonstrated to evaluate the robustness, reliability, and applicability of the proposed complexity-efficient crypto-system algorithm in the presence of various attacks, using RBG and grayscale images. The results prove the high suitability of the proposed lower-complexity crypto-system for WASN and LP-WN applications due to its robustness in the presence of attacks and its power efficiency. As also clarified from the results, the time complexity is lower than the related works. Hence, the proposed chaos mapping-DWT crypto-algorithm is suitable for real-time applications.

Author Contributions

All the authors participated in the manuscript preparation as follows. Conceptualization: T.S., M.E. and A.E.A. Methodology: T.S., M.A.M.E.-B., A.A.F.Y. and Ali M. ElRifaie. Validation: M.A.M.E.-B., M.E., A.E.A. and Ali M. ElRifaie. Formal analysis: M.A.M.E.-B., M.E., A.E.A. and A.A.F.Y. Investigation: T.S., M.A.M.E.-B. and A.E.A. Resources: T.S., M.A.M.E.-B., M.E. and A.E.A. Data curation: T.S., A.A.F.Y. and A.M.E.-R. Writing—original draft: T.S., M.A.M.E.-B. and A.E.A. Writing—review and editing: M.A.M.E.-B., A.A.F.Y. and A.M.E.-R. Supervision: M.E., A.E.A., A.A.F.Y. and A.M.E.-R. Funding acquisition: A.A.F.Y. and A.M.E.-R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

All authors confirm that the data and datasets regards this research are available for research reasons.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Yu, J.-Y.; Lee, E.; Oh, S.-R.; Seo, Y.-D.; Kim, Y.-G. A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. IEEE Access 2020, 8, 45304–45324. [Google Scholar] [CrossRef]
  2. Wei, W.; Peng, H.; Wang, L.; Liu, Y.; Tang, F.; Liu, L. A Secure and Efficient Data Transmission Method WITH Multilevel Concealment Function Based on Chaotic Compressive Sensing. IEEE Sens. J. 2023, 23, 6789–6800. [Google Scholar]
  3. Huda, A.; Al-Ahmadi, S.A. Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking. IEEE Access 2020, 8, 92098–92109. [Google Scholar] [CrossRef]
  4. Sadeghzadeh, M.; Farzaneh, F.; Sadeghzadeh, M.; Ghasemi, M. Low Power Cryptography Solution Based on Chaos Theory in Wireless Sensor Nodes. IEEE Access 2019, 7, 31068–31079. [Google Scholar]
  5. Suseela, G.; Asnath, A.Y.; Niranjana, G.; Kadiyala, R.; Saurabh, S.; Yoo, B. Low Energy Interleaved Chaotic Secure Image Coding Scheme for Visual Sensor Networks Using Pascal’s Triangle Transform. IEEE Access 2021, 9, 123456–123467. [Google Scholar] [CrossRef]
  6. Chen, T.-S.; Huang, K.-N.; Hwang, W.-K.; Wang, A.-Y. Low-Complexity Compressed-Sensing-Based Watermark Cryptosystem and Circuits Implementation for Wireless Sensor Networks. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2019, 27, 1234–1245. [Google Scholar] [CrossRef]
  7. Han, W.; Xu, L.; Li, W.; Xu, P.; Wang, R. Physical Layer Security Performance of Wireless Mobile Sensor Networks in Smart City. IEEE Access 2019, 7, 12345–12356. [Google Scholar]
  8. Alhawari, M.; Hakam, A. Optimum Piezo-Electric Based Energy Harvesting for Low-Power Wireless Networks with Power Complexity Considerations. Wirel. Pers. Commun. 2020, 115, 123–145. [Google Scholar]
  9. Tallat, J.; Ahmed, H.; Khan, A.; Saleem, S.; Malik, A. A Lightweight Genetic Based Algorithm for Data Security in Wireless Body Area Networks. IEEE Access 2020, 8, 123456–123467. [Google Scholar] [CrossRef]
  10. Zhang, X.; Liu, D. A Lightweight User Authentication Scheme for Multi-Gateway Based Wireless Sensor Networks Using Rabin Cryptosystem. IEEE Access 2023, 11, 1234–1245. [Google Scholar] [CrossRef]
  11. Alzahrani, M.; Tariq, M.; Saeed, N.; Younis, M. A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data. IEEE Access 2020, 8, 12345–12356. [Google Scholar] [CrossRef]
  12. Tchao, E.; Chukwu, O.C.; Lawal, A.L.; Balogun, J.B.; Chen, T.-Y.; Lo, C.-C.; Do, D.-T. An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks. IEEE Access 2023, 11, 12345–12356. [Google Scholar] [CrossRef]
  13. Guo, L.; Zhang, W.; Zhao, P.; Xie, F. Cooperative Jamming-Aided Secure Communication in Wireless Powered Sensor Networks. IEEE Trans. Dependable Secur. Comput. 2023, 20, 123–134. [Google Scholar]
  14. Sharma, D.; Kumar, P.; Muralidhara, B. Data Privacy Technique for the Data Transmitted in Wireless Body Area Network. IEEE Access 2024, 12, 12345–12356. [Google Scholar]
  15. Mathews, E.; Puthuchirakkal, V.; Thomas, M. Efficient Strategies for Signal Aggregation in Low-Power Wireless Sensor Networks with Discrete Transmission Ranges. IEEE Sens. Lett. 2023, 5, 123–134. [Google Scholar]
  16. Khashan, O.A.; Khafajah, N.M.; Alomoush, W.; Alshinwan, M. Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks. IEEE Access 2024, 12, 23290–23304. [Google Scholar]
  17. El-Bendary, M.A.M.; Abou El-Azm, A.E. Complexity Considerations: Efficient Image Transmission over Mobile Communications Channels. Multimed. Tools Appl. 2019, 78, 16345–16365. [Google Scholar]
  18. Na, W.; Zhang, S.; Zheng, Z.; Qian, J.; Fu, J.; Li, J.; Kumar, B. Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2023, 18, 1234–1245. [Google Scholar]
  19. Sabry, S.; Osama, S.; El-Bendary, M.A. Reliable Mark-Embedded Algorithm for Verifying Archived/Encrypted Image Contents in Presence of Different Attacks with FEC Utilizing Consideration. Wirel. Pers. Commun. 2021, 120, 2021–2040. [Google Scholar]
  20. Faragallah, O.; Farouk, M.; El-Sayed, H.; El-Bendary, M. Speech Cryptography Algorithms: Utilizing Frequency and Time Domain Techniques Merging. J. Ambient. Intell. Humaniz. Comput. 2024, 15, 567–580. [Google Scholar]
  21. El-Bendary, M.; Faragallah, O.; Nassar, S. An Efficient Hidden Marking Approach for Forensic and Contents Verification of Digital Images. Multimed. Tools Appl. 2023, 82, 5678–5695. [Google Scholar]
  22. Kasban, H.; Nassar, S.; El-Bendary, M. Medical Images Transmission over Wireless Multimedia Sensor Networks with High Data Rate. Analog. Integr. Circuits Signal Process. 2021, 108, 345–360. [Google Scholar]
  23. Nassar, S.; El-Bendary, M. Confidentiality Considerations: Multimedia Signals Transmission over Different Wireless Channels Utilizing Efficient Secured Model. Multimed. Tools Appl. 2022, 81, 15000–15020. [Google Scholar]
  24. Fu, X.; Li, Q.; Li, W. Modeling and Analysis of Industrial IoT Reliability to Cascade Failures: An Information-Service Coupling Perspective. Reliab. Eng. Syst. Saf. 2023, 230, 108872. [Google Scholar]
  25. Fu, X.; Wang, Y.; Yang, Y.; Postolache, O. Analysis on Cascading Reliability of Edge-Assisted Internet of Things. Reliab. Eng. Syst. Saf. 2022, 225, 107750. [Google Scholar]
  26. El-Bendary, M.; Nassar, S. Different Attacks Presence Considerations: Analyzing the Simple and Efficient Self-Marked Algorithm Performance for Highly-Sensitive Audio Signals Contents Verification. Int. J. Speech Technol. 2023, 26, 123–135. [Google Scholar]
  27. Sabry, S.; Nabil, M.; Hamdy, M.; Hala, S.; Mohsen, A.; Fathi, E.; Osama, S. Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering. Wirel. Pers. Commun. 2016, 90, 889–905. [Google Scholar]
  28. Abd-Elhafiez, W.; Yang, X.; Balobaid, A. An Image Encryption Technique Based on Discrete Wavelet Transform and Fractional Chaotic Cryptovirology. Fractals 2023, 31, 2250034. [Google Scholar]
  29. Hazzazi, M.; Rehman, M.; Shafique, A.; Aljaedi, A.; Bassfar, Z.; Usman, A. Enhancing Image Security via Chaotic Maps, Fibonacci, Tribonacci Transformations, and DWT Diffusion: A Robust Data Encryption Approach. Sci. Rep. 2024, 14, 56789. [Google Scholar]
  30. Zhang, B.; Liu, L. Chaos-Based Image Encryption: Review, Application, and Challenges. Mathematics 2023, 11, 2585. [Google Scholar] [CrossRef]
  31. Zolfaghari, B.; Koshiba, T. Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap. Appl. Syst. Innov. 2022, 5, 57. [Google Scholar] [CrossRef]
  32. Liu, X. Integrate encryption of multiple images based on a new hyperchaotic system and Baker map. Multimed. Syst. 2024, 30, 247. [Google Scholar]
  33. Mostafa, A.; Abeer, T.; Hanan, M.; Mohamed, M. Enhancing image encryption using chaotic maps: A multi-map approach for robust security and performance optimization. Clust. Comput. 2024, 27, 14611–14635. [Google Scholar]
  34. Nasr, M.; El-Shafai, W.; El-Rabaie, E.; El-Fishawy, A.; El-Hoseny, H.; Abd El-Samie, F.; Abdel-Salam, N. A robust audio steganography technique based on image encryption using different chaotic maps. Sci. Rep. 2024, 14, 22054. [Google Scholar]
  35. Osama, S.; Ensherah, A.; Walid, E.; Noha, R.; Hossam, E.; Mustafa, M.; Ibrahim, E.; Said, E.; Fathi, E. Efficient chaotic-Baker-map-based cancelable face recognition. J. Ambient. Intell. Humaniz. Comput. 2021, 14, 1837–1875. [Google Scholar]
  36. Asmaa, H.; Maisa’a, A.; Ahmed, T. Image encryption based on 2DNA encoding and chaotic 2D logistic map. J. Eng. Appl. Sci. 2023, 70, 60. [Google Scholar]
  37. Wanqing, W.; Qiao, Q. Block image encryption based on chaotic map and fractional fourier transformation. Multimed. Tools Appl. 2022, 82, 10367–10395. [Google Scholar]
  38. Nadeem, I.; Ibrar, H.; Muhammad, M.; Sagheer, A.; Shahid, Y. An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map. Multimed. Tools Appl. 2023, 82, 40345–40373. [Google Scholar]
  39. Abushhiwa, H.; Abdussalam, M. Network attacks and network security threats and preventions. Int. J. Adv. Eng. Manag. 2024, 6, 276–283. [Google Scholar]
  40. Singh, R.; Saraswat, M.; Ashok, A.; Mittal, H.; Tripathi, A.; Pandey, A.; Pal, R. From classical to soft computing based watermarking techniques: A comprehensive review. Future Gener. Comput. Syst. 2022, 141, 738–754. [Google Scholar]
  41. Naffouti, S.; Kricha, A.; Sakly, A. A sophisticated and provably gray scale image watermarking system using DWT-SVD domain. Vis. Comput. 2022, 39, 4227–4247. [Google Scholar] [CrossRef] [PubMed]
  42. Shabana, U.; Sonam, L.; Shahnawaz, A.; Shabana, M.; Kalathil, S. Cryptographic Data Security for Reliable Wireless Sensor Network. Alex. Eng. J. 2023, 72, 37–50. [Google Scholar]
  43. Uras, P.; Cüneyt, B. Enabling secure data transmission for wireless sensor networks based IoT applications. Ain Shams Eng. J. 2022, 14, 101866. [Google Scholar]
  44. Elamurugu, V.; Evanjaline, D. An Efficient and Secure Text Encryption Scheme for Wireless Sensor Network (WSN) Using Dynamic Key Approach. Int. J. Comput. Netw. Appl. 2021, 8, 788. [Google Scholar] [CrossRef]
  45. Alakananda, T.; Sateesh, K.; Ajit, K.; Alok, R. Hybrid Cryptography for Data Security in Wireless Sensor Network. Data Eng. Intell. Comput. 2021, 221–225. [Google Scholar]
  46. Ramadevi, P.; Ayyasamy, S.; Yalla, S.; Chunduru, A.; Vijayakumar, S.; Sudha, R. Security for wireless sensor networks using cryptography. Meas. Sens. 2023, 27, 100604. [Google Scholar] [CrossRef]
  47. Bhanu, P.; Nitin, S. Exceptional key based node validation for secure data transmission using asymmetric cryptography in wireless sensor networks. Meas. Sens. 2024, 29, 100661. [Google Scholar]
  48. Satheesh, M.; Ganesh, P. A public static agreement key based cryptography for secure data transmission in WSN based smart environment application. Expert Syst. Appl. 2024, 239, 120232. [Google Scholar]
  49. Fursan, T.; Ozgu, C.; Asia, O.; Ghaleb, H.; Hoda, A. Cryptography Algorithms for Enhancing IoT Security. Internet Things 2023, 23, 100790. [Google Scholar]
  50. Manish, K.; Vrushali, P. Secure communication using an adaptable multilevel RGB image encryption algorithm for wireless sensor networks. E-Prime—Adv. Electr. Eng. Electron. Energy 2024, 3, 100107. [Google Scholar]
  51. Nester, M.; Jasmine, S. Secure medical sensor monitoring framework using novel hybrid encryption algorithm driven by internet of things. Meas. Sens. 2024, 28, 100648. [Google Scholar]
  52. Olusogo, P.; Marcos, A.; Jims, M.; Alex, S.; Augustine, I.; Jumoke, P. An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security. Internet Things 2024, 25, 101071. [Google Scholar]
  53. Raad, A.; Nahla, A.; Mishall, A. A Perfect Security Key Management Method for Hierarchical Wireless Sensor Networks in Medical Environments. Electronics 2023, 12, 1011. [Google Scholar] [CrossRef]
  54. Safwan, M.; Juan, A.; Abubakar, M. A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks. Electronics 2022, 11, 2721. [Google Scholar] [CrossRef]
  55. Attique, U.; Muhammad, S.; Shoaib, Z.; Muhammad, A.; Fahad, Q.; Sumayh, S.; Irfan, U.; Nida, A. A Survey on MAC-Based Physical Layer Security over Wireless Sensor Network. Electronics 2022, 11, 2529. [Google Scholar] [CrossRef]
  56. Rajeev, R.; Abhishek, T. Image encryption using discrete orthogonal Stockwell transform with fractional Fourier transform. Multimed. Tools Appl. 2022, 81, 19935–19953. [Google Scholar]
  57. Varun, S.; Manoj, K.; Atul, C. A New Secure Data Communication Method Using Wavelet Transform. Wirel. Pers. Commun. 2024, 138, 2707–2724. [Google Scholar]
  58. Lingamallu, N.; Vijayaraghavan, V. Steganography using wavelet transform for secured data transmission. J. Ambient. Intell. Humaniz. Comput. 2023, 14, 11829–11840. [Google Scholar]
  59. Steffen, C.; Paraskevas, P.; Oswin, K.; Aasa, F. Semantic similarity metrics for image registration. Med. Image Anal. 2023, 84, 102684. [Google Scholar]
  60. Sai, P.; Nagabhushan, R. Comparative study of Structural Similarity Index (SSIM) by using different edge detection approaches on live video frames for different color models. In Proceedings of the 2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, Kerala, India, 6–7 July 2017; pp. 345–349. [Google Scholar]
  61. Razaq, A.; Maghrabi, L.; Ahmed, M.; Aslam, F.; Feng, W. Fuzzy Logic-Based Substitution-Box for Robust Medical Image Encryption in Telemedicine. IEEE Access 2024, 12, 31654–31668. [Google Scholar] [CrossRef]
  62. Yasser, I.; Khalil, A.; Mohamed, M.; Samra, A.; Khalifa, F. A Robust Chaos-Based Technique for Medical Image Encryption. IEEE Access 2021, 9, 125535–125550. [Google Scholar]
  63. Gaffar, A.; Joshi, A.; Singh, S.; Mishra, V.; Rosales, H.; Zhou, L.; Dhaka, A.; Mishra, L. A Technique for Securing Multiple Digital Images Based on 2D Linear Congruential Generator, Silver Ratio, and Galois Field. IEEE Access 2021, 9, 120203–120218. [Google Scholar] [CrossRef]
  64. Dai, L.; Chen, L.; Wang, C.; Lin, F. An Image Double Encryption Based on Improved GAN and Hyper Chaotic System. IEEE Access 2024, 12, 8895–8908. [Google Scholar]
  65. Ustun, D.; Sahinkaya, S.; Atli, N. Developing a secure image encryption technique using a novel S-box constructed through real-coded genetic algorithm’s crossover and mutation operators. Expert Syst. Appl. 2024, 238, 121449. [Google Scholar]
  66. Kumar, S.; Sharma, D. Image scrambling encryption using chaotic map and genetic algorithm: A hybrid approach for enhanced security. Nonlinear Dyn. 2024, 110, 1131–1150. [Google Scholar] [CrossRef]
  67. Mohamed, A.; Korany, N.; EL-khamy, S. New DNA Coded Fuzzy Based (DNAFZ) S-Boxes: Application to Robust Image Encryption Using Hyper Chaotic Maps. IEEE Access 2021, 9, 146634–146649. [Google Scholar]
  68. Qin, X.; Zhang, Y. Image encryption algorithm based on COA and hyperchaotic Lorenz system. Nonlinear Dyn. 2024, 110, 1973–1991. [Google Scholar]
  69. Singh, D.; Kumar, S. Image authentication and encryption algorithm based on RSA cryptosystem and chaotic maps. Expert Syst. Appl. 2025, 239, 121658. [Google Scholar] [CrossRef]
  70. Souici, I.; Mahamdioua, M.; Jacques, S.; Ouahabi, A. Advanced genetic image encryption algorithms for intelligent transport systems. Comput. Electr. Eng. 2025, 110, 108208. [Google Scholar] [CrossRef]
  71. Singh, D.; Kumar, S.; Verma, C.; Illés, Z.; Kumar, N. Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps. J. King Saud Univ.-Comput. Inf. Sci. 2024, 36, 139–148. [Google Scholar]
  72. Sharma, V.; Sharma, J. Harris Hawk optimization driven adaptive image encryption integrating Hilbert vibrational decomposition and chaos. Appl. Soft Comput. 2024, 150, 111628. [Google Scholar] [CrossRef]
  73. Raghuvanshi, K.; Kumar, S.; Kumar, S.; Kumar, S. Image encryption algorithm based on DNA encoding and CNN. Expert Syst. Appl. 2024, 239, 121612. [Google Scholar]
  74. Al-Muhammed, M. Medical image encryption algorithm based on Fresnel zone formula, differential neural networks, and pixel-guided perturbation techniques. Comput. Electr. Eng. 2024, 114, 108360. [Google Scholar]
  75. Pandey, K.; Sharma, D. Novel image encryption algorithm utilizing hybrid chaotic maps and Elliptic Curve Cryptography with genetic algorithm. J. Inf. Secur. Appl. 2025, 76, 103878. [Google Scholar]
Figure 1. N-level of DWT transform in the lower-complexity multi-layered security algorithm.
Figure 1. N-level of DWT transform in the lower-complexity multi-layered security algorithm.
Jsan 14 00036 g001
Figure 2. The various versions of chaos mapping based on a baker map. (a) The generalized map concept; (b) the 2D discretized baker chaos mapping.
Figure 2. The various versions of chaos mapping based on a baker map. (a) The generalized map concept; (b) the 2D discretized baker chaos mapping.
Jsan 14 00036 g002aJsan 14 00036 g002b
Figure 3. Block diagram of the proposed ECC-AES cryptographic tool for securing data in the WSNs [42].
Figure 3. Block diagram of the proposed ECC-AES cryptographic tool for securing data in the WSNs [42].
Jsan 14 00036 g003
Figure 4. The data encryption scheme for the proposed approach [44].
Figure 4. The data encryption scheme for the proposed approach [44].
Jsan 14 00036 g004
Figure 5. The presented approach of securing data transfer over WSNs [47].
Figure 5. The presented approach of securing data transfer over WSNs [47].
Jsan 14 00036 g005
Figure 6. The proposed approach for routing and securing data in the WSNs [48].
Figure 6. The proposed approach for routing and securing data in the WSNs [48].
Jsan 14 00036 g006
Figure 7. Block diagram of the encrypting colored images tool for WSN applications [50].
Figure 7. Block diagram of the encrypting colored images tool for WSN applications [50].
Jsan 14 00036 g007
Figure 8. Block diagram of the proposed medical data security approach based on securing medical sensor data [51].
Figure 8. Block diagram of the proposed medical data security approach based on securing medical sensor data [51].
Jsan 14 00036 g008
Figure 9. Block diagram of the proposed algorithm for securing the transferred data [53].
Figure 9. Block diagram of the proposed algorithm for securing the transferred data [53].
Jsan 14 00036 g009
Figure 10. The steps, contents, and process of image/plaintext within the proposed crypto-algorithm.
Figure 10. The steps, contents, and process of image/plaintext within the proposed crypto-algorithm.
Jsan 14 00036 g010
Figure 11. The first stages of the proposed N-round chaos/transform crypto-system.
Figure 11. The first stages of the proposed N-round chaos/transform crypto-system.
Jsan 14 00036 g011
Figure 12. The utilized images in the computer simulation experiments, including the grayscale and RBG images.
Figure 12. The utilized images in the computer simulation experiments, including the grayscale and RBG images.
Jsan 14 00036 g012
Figure 13. Results of applicability measurement of the Multi DWT/chaos N-round crypto-algorithm using grayscale images: Four-cascaded Skey (N = 4).
Figure 13. Results of applicability measurement of the Multi DWT/chaos N-round crypto-algorithm using grayscale images: Four-cascaded Skey (N = 4).
Jsan 14 00036 g013aJsan 14 00036 g013b
Figure 14. Deciphered image samples of the Multi DWT/N-round chaos crypto-system with respect to the various image attacks: {Four-cascaded Skey (N = 4) (α = 0.1)}.
Figure 14. Deciphered image samples of the Multi DWT/N-round chaos crypto-system with respect to the various image attacks: {Four-cascaded Skey (N = 4) (α = 0.1)}.
Jsan 14 00036 g014
Figure 15. Deciphered image samples of Multi DWT and N-round crypto-chaos algorithm with respect to the presence of various attacks: {Four-cascaded Skey (N = 4) (α = 0.01)}.
Figure 15. Deciphered image samples of Multi DWT and N-round crypto-chaos algorithm with respect to the presence of various attacks: {Four-cascaded Skey (N = 4) (α = 0.01)}.
Jsan 14 00036 g015
Figure 16. Deciphered image samples of Multi DWT and crypto-algorithm on grayscale images with different attacks: {Four-cascaded Skey (N = 4) (α = 0.001)}.
Figure 16. Deciphered image samples of Multi DWT and crypto-algorithm on grayscale images with different attacks: {Four-cascaded Skey (N = 4) (α = 0.001)}.
Jsan 14 00036 g016
Figure 17. Results of applicability measurement of the Multi DWT and chaos N-round crypto-algorithm using RGB images: Four-cascaded Skey (N = 4).
Figure 17. Results of applicability measurement of the Multi DWT and chaos N-round crypto-algorithm using RGB images: Four-cascaded Skey (N = 4).
Jsan 14 00036 g017aJsan 14 00036 g017b
Figure 18. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.1).
Figure 18. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.1).
Jsan 14 00036 g018
Figure 19. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.01).
Figure 19. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.01).
Jsan 14 00036 g019aJsan 14 00036 g019b
Figure 20. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.001).
Figure 20. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.001).
Jsan 14 00036 g020
Figure 21. Multi DWT-chaos N-round crypto-algorithm on RGB image samples in the presence of Poisson noise.
Figure 21. Multi DWT-chaos N-round crypto-algorithm on RGB image samples in the presence of Poisson noise.
Jsan 14 00036 g021
Figure 22. Encryption and decryption processing times of the proposed chaos-DWT crypto-algorithm using the grayscale and RBG images.
Figure 22. Encryption and decryption processing times of the proposed chaos-DWT crypto-algorithm using the grayscale and RBG images.
Jsan 14 00036 g022
Table 1. Parameters of the computer-based simulation experiments.
Table 1. Parameters of the computer-based simulation experiments.
Simulation Experiments Parameter Settings
ParametersDescription
Simulation toolMatlab Program R2017a
Simulation environmentO.S: windows 10
Intel(R) Core(TM)
i5-6200U CPU @ 2.30 GHz 2.40 GHz
RAM: 6.00 GB
Utilized image signalGrayscale image: standard and nonstandard
Color image: nonstandard
Image signal sizeGrayscale image: 1024*1024
Color image: 300*400*3
Security mechanismPermutations and substitution
DomainDomain time
Frequency domain
Merging time and frequency domains
Transforms toolsDWT
Number of secret keys (SK)12 Skeys
Evaluation metricsCr, SSIM, PSNR, and MSE, Tc
Presence noise attacksGaussian noise, salt and pepper, speckle, and Poisson noise
Table 2. Tabulated results of applicability measurement of the Multi DWT and chaos N-round crypto-algorithm using grayscale images: Four-cascaded Skey (N = 4).
Table 2. Tabulated results of applicability measurement of the Multi DWT and chaos N-round crypto-algorithm using grayscale images: Four-cascaded Skey (N = 4).
Image Quality MetricsMetrics Value
Camera manCr Plaintext and Cipher-text0.0030
Cr Plaintext and Decrypted text1
PSNR 99
MSE 0
SSIM1
GirlCr Plaintext and Cipher text0.0079
Cr Plaintext and Decrypted text1
PSNR 99
MSE0
SSIM1
Table 3. Deciphered image samples of the Multi DWT/N-round chaos crypto-system with respect to the various image attacks: {Four-cascaded Skey (N = 4) (α = 0.1)}.
Table 3. Deciphered image samples of the Multi DWT/N-round chaos crypto-system with respect to the various image attacks: {Four-cascaded Skey (N = 4) (α = 0.1)}.
Image Quality MetricsDifferent Attacks
Gaussian Noise α = 0.1Salt and Pepper Noise α = 0.1Speckle Noise α = 0.1
Camera manCr0.66710.79550.8015
PSNR39.595841.410139.6408
MSE115.086275.7864113.8985
SSIM0.45950.58300.5727
GirlCr0.48840.69570.7089
PSNR39.636141.791439.9103
MSE114.021969.4153107.0471
SSIM0.43130.63590.6442
Table 4. Deciphered image samples of Multi DWT and N-round crypto-chaos algorithm with respect to the presence of various attacks: {Four-cascaded Skey (N = 4) (α = 0.01)}.
Table 4. Deciphered image samples of Multi DWT and N-round crypto-chaos algorithm with respect to the presence of various attacks: {Four-cascaded Skey (N = 4) (α = 0.01)}.
Image Quality MetricsDifferent Attacks
Gaussian Noise α = 0.01Salt and Pepper Noise α = 0.01Speckle Noise α = 0.01
Camera manCr0.93970.97620.9674
PSNR40.825248.684141.6788
MSE86.711414.196971.2391
SSIM0.80020.90970.8731
GirlCr0.87480.95880.9549
PSNR40.826549.583042.2649
MSE86.685511.542462.2455
SSIM0.82290.94080.9319
Table 5. Deciphered image samples of Multi DWT and crypto-algorithm on grayscale images with different attacks: {Four-cascaded Skey (N = 4) (α = 0.001)}.
Table 5. Deciphered image samples of Multi DWT and crypto-algorithm on grayscale images with different attacks: {Four-cascaded Skey (N = 4) (α = 0.001)}.
Image Quality MetricsDifferent Attacks
Gaussian Noise α = 0.001Salt and Pepper Noise α = 0.001Speckle Noise α = 0.001
Camera manCr0.99290.99740.9964
PSNR45.378057.191947.9450
MSE30.39482.001716.8306
SSIM0.96910.98930.9834
GirlCr0.98490.99580.9951
PSNR45.449359.338950.0465
MSE29.89971.221010.3741
SSIM0.97660.99350.9923
Table 6. Tabulated results of applicability measurement of the Multi DWT and chaos N-round crypto-algorithm using RGB images: Four-cascaded Skey (N = 4).
Table 6. Tabulated results of applicability measurement of the Multi DWT and chaos N-round crypto-algorithm using RGB images: Four-cascaded Skey (N = 4).
Image Quality MetricsMetrics Value
SailboatCr Plaintext and Cipher-text0.1596
Cr Plaintext and Decrypted text1
PSNR 99
MSE 0
SSIM1
Cable carCr Plaintext and Cipher text0.0571
Cr Plaintext and Decrypted text1
PSNR 99
MSE0
SSIM1
Table 7. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.1).
Table 7. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.1).
Image Quality MetricsDifferent Attacks
Gaussian Noise α = 0.1Salt and Pepper Noise α = 0.1Speckle Noise α = 0.1
SailboatCr0.57370.75510.8295
PSNR35.161537.060235.7496
MSE109.685670.840095.7960
SSIM0.42490.59850.6750
Cable carCr0.72750.83900.8962
PSNR35.179136.625935.4335
MSE109.242578.2904103.0262
SSIM0.32620.45340.5530
Table 8. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.01).
Table 8. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.01).
Image Quality MetricsDifferent Attacks
Gaussian Noise α = 0.01Salt and Pepper Noise α = 0.01Speckle Noise α = 0.01
SailboatCr0.91210.96880.9756
PSNR36.319544.020738.6215
MSE84.014914.263949.4482
SSIM0.78450.90900.9172
Cable carCr0.95560.98060.9833
PSNR36.293042.207238.1504
MSE84.529021.656455.1144
SSIM0.67770.82450.8192
Table 9. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.001).
Table 9. Multi DWT and chaos N-round crypto-algorithm on RGB images with different attacks: Four-cascaded Skey (N = 4) (α = 0.001).
Image Quality MetricsDifferent Attacks
Gaussian Noise α = 0.001Salt and Pepper Noise α = 0.001Speckle Noise α = 0.001
SailboatCr0.98760.99460.9953
PSNR40.668549.452045.4799
MSE30.86404.084210.1932
SSIM0.95400.98140.9810
Cable carCr0.99200.99520.9953
PSNR40.002745.176642.7429
MSE35.977910.930519.1433
SSIM0.89170.93430.9263
Table 10. The proposed N-round chaos/transform crypto-system and the related works comparison with respect to Cr, SSIM, PSNR, MSE, and the methodology/utilized technique (no attacks considered).
Table 10. The proposed N-round chaos/transform crypto-system and the related works comparison with respect to Cr, SSIM, PSNR, MSE, and the methodology/utilized technique (no attacks considered).
RefCr Orig&EncCr Orig&DecSSIMPSNRMSEMethodology/Utilized Techniques
Nasr, M. [34]0.00440.37870.0475611.5565-Henon + Arnold
Wanqing, W. [37]0.0074____FRFT transform+2D Logistic map+2D-Baker map
Razaq, A. [61] 0.0047____S-box
Yasser, I. [62] 0.004____Novel chaotic maps
Gaffar, A. [63]__0.971931.72895.67892D-LCG, silver ratio, and Galois field
Dai, L. [64] __0.938333.3145_Improved GAN and Hyper Chaotic
Proposed Crypto-graphic Algorithm0.003011990N-round chaos/transform crypto-system
Table 11. Comparison of N-round chaos/transform crypto-system with the related works with respect to the presence of various attacks.
Table 11. Comparison of N-round chaos/transform crypto-system with the related works with respect to the presence of various attacks.
RefImage Quality MetricsDifferent Attacks
Gaussian Noise α = 0.1Gaussian Noise α = 0.01Gaussian Noise α = 0.001Salt and Pepper Noise α = 0.1Salt and Pepper Noise α = 0.01Salt and Pepper Noise α = 0.001Speckle Noise α = 0.1Speckle Noise α = 0.01Speckle Noise α = 0.001
Razaq, A. [61]PSNR____24.76____
Ustun, D. [65]PSNR___14.618024.602234.5396___
Kumar, S. [66]PSNR___18.3675_____
Mohamed, A. [67]PSNR___18.3045_____
Qin, X. [68]PSNR____25.8941____
Singh, D. [69]PSNR___19.0380_____
SSIM___0.6882_____
Souici, I. [70]PSNR___23.84_29.89___
Singh, D. [71]PSNR___12.713619.014530.0487___
Sharma, V. [72]PSNR19.1547__18.6230_____
Raghuvanshi, K. [73]PSNR___18.45_____
Al-Muhammed, M. [74]PSNR__24.253_22.177____
MSE__244.219_393.895____
Pandey, K. [75]PSNR___18.3613_____
Proposed crypto-algorithm
metrics
Cr0.66710.93970.99290.79550.97620.99740.80150.96740.9964
PSNR39.595840.825245.378041.410148.684157.191939.640841.678847.9450
MSE115.086286.711430.394875.786414.19692.0017113.898571.239116.8306
SSIM0.45950.80020.96910.58300.90970.98930.57270.87310.9834
Table 12. Comparison of N-round chaos/transform crypto-system with the related works with respect to the time complexity of encryption and decryption algorithms.
Table 12. Comparison of N-round chaos/transform crypto-system with the related works with respect to the time complexity of encryption and decryption algorithms.
Ref.Encryption TimeDecryption TimeMethodology/Utilized Techniques
Shabana, U. [42]2.51.71ECC + AES
Elamurugu, V. [44]0.8410.037Salt key
Ramadevi, P. [46]73_IKEC
Bhanu, P. [47]1211EKbNV-SDT-AC model
Satheesh, M. [48]3.82.3PSKAC
Nester, M. [51]44Hybrid encryption algorithm
Proposed crypto-graphic algorithm2.13791.5717N-round chaos/transform crypto-system
2.63181.6654
4.75461.5610
5.02861.5769
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Srour, T.; El-Bendary, M.A.M.; Eltokhy, M.; Abouelazm, A.E.; Youssef, A.A.F.; El-Rifaie, A.M. Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs. J. Sens. Actuator Netw. 2025, 14, 36. https://doi.org/10.3390/jsan14020036

AMA Style

Srour T, El-Bendary MAM, Eltokhy M, Abouelazm AE, Youssef AAF, El-Rifaie AM. Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs. Journal of Sensor and Actuator Networks. 2025; 14(2):36. https://doi.org/10.3390/jsan14020036

Chicago/Turabian Style

Srour, Tarek, Mohsen A. M. El-Bendary, Mostafa Eltokhy, Atef E. Abouelazm, Ahmed A. F. Youssef, and Ali M. El-Rifaie. 2025. "Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs" Journal of Sensor and Actuator Networks 14, no. 2: 36. https://doi.org/10.3390/jsan14020036

APA Style

Srour, T., El-Bendary, M. A. M., Eltokhy, M., Abouelazm, A. E., Youssef, A. A. F., & El-Rifaie, A. M. (2025). Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs. Journal of Sensor and Actuator Networks, 14(2), 36. https://doi.org/10.3390/jsan14020036

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop