Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES

Main Article Content

Khadeeja Gebor Salim
Saif M. Kh. Al-alak
Majid Jabbar Jawad


Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.


Download data is not yet available.

Article Details

How to Cite
Salim KG, Al-alak SMK, Jawad MJ. Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES . Baghdad Sci.J [Internet]. [cited 2021Jan.25];18(2):0417. Available from:


Vadivukarasi K, Krithiga S. Home security system using IOT. IJPAM. 2018;119(15):1863-8.

Medagliani P, Leguay J, Duda A, Rousseau F, Duquennoy S, Raza S, et al. Internet of Things Applications - From Research and Innovation to Market Deployment, The River Publishers, 2014, 287-313, Series in Communications. ⟨hal-01073761⟩.

Samaila MG, Neto M, Fernandes DA, Freire MM, Inácio PR. Challenges of securing Internet of Things devices: A survey. Secur Priv. 2018;1(2):e20.

Lackner G. A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX. Int. J Netw. Secur. 2013;15(6):420-36.

Loksai Pothineni GSSK, V R Venuu Maadhav, A R S Yaswanth4, Dr.Manikandan K. Wi-Fi, WiMAX & WiGig: A Comparative Study. International Research Journal of Engineering and Technology (IRJET). Mar-2018 Volume: 05( Issue: 03): 2228

Lu D, Liu T. The application of IOT in medical system. In2011 IEEE International Symposium on IT in Medicine and Education 2011 Dec 9 ; 1: 272-275. IEEE.

Ciora RA, Simion CM. Industrial applications of image processing. Acta Universitatis Cibiniensis. 2014;64(1):17-21.

Lakshmi K, Gayathri S. Implementation of IoT with image processing in plant growth monitoring system. IJISR. 2017;6(2):80-3.

Arab A, Rostami MJ, Ghavami B. An image encryption method based on chaos system and AES algorithm. J. Supercomput. 2019;75(10):6663-82.

Bashir A, Hasan ASB, Almangush H. A new image encryption approach using the integration of a shifting technique and the AES algorithm. IJCA. 2012;975:8887.

Jha Y, Kaur K, Pradhan C, editors. Improving image encryption using two-dimensional logistic map and AES. 2016 International Conference on Communication and Signal Processing (ICCSP); 2016: IEEE.

Mohsen AH, Shaker SH. Images Encryption Using Symmetric Encryption Algorithm Based On Random Keys Generatoe. IJRt I E R, 2016;01;08;1-13.

Khizrai MSQ, Bodkhe S. Image encryption using different techniques for high security transmission over a network. IJ E R GS. 2014;2(4):299-306.

.Mohammed S, Alalak S, Lafta H. ECC and AES based hybrid security protocol for wireless sensor networks. J E A S. 2018;13:10356-63.

( .

Zhou N, Pan S, Cheng S, Zhou Z. Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol. 2016;82:121-33.

Shannon CE. Communication theory of secrecy systems. Bell Syst. tech. j. 1949;28(4):656-715.

Al-Husainy MAF. A novel image encryption algorithm based on the extracted map of overlapping paths from the secret key. RAIRO-THEOR INF APPL. 2016;50(3):241-9.

Omoruyi O, Okereke C, Okokpujie K, Noma-Osaghae E, Okoyeigbo O, John S. Evaluation of the quality of an image encrytion scheme. TELKOMNIKA. 2019;17:2968-74.

Jiao G, Peng X, Duan K. Image Encryption with The Cross Diffusion of Two Chaotic Maps. TIIS. 2019;13(2):1064-79.

Rostami MJ, Shahba A, Saryazdi S, Nezamabadi-pour H. A novel parallel image encryption with chaotic windows based on logistic map. Comput Elect Eng. 2017;62:384-400.