Multi-chaos-based lightweight image encryption-compression for secure occupancy monitoring

Ghadi, Yazeed Yasin and Alsuhibany, Suliman A. and Ahmad, Jawad and Kumar, Harish and Boulila, Wadii and Alsaedi, Mohammed and Khan, Khyber and Bhatti, Shahzad A. (2022) Multi-chaos-based lightweight image encryption-compression for secure occupancy monitoring. Journal of Healthcare Engineering, 2022. 7745132. ISSN 2040-2295 (

[thumbnail of Ghadi-etal-JHE-2022-Multi-chaos-based-lightweight-image-encryption-compression]
Text. Filename: Ghadi_etal_JHE_2022_Multi_chaos_based_lightweight_image_encryption_compression.pdf
Final Published Version
License: Creative Commons Attribution 4.0 logo

Download (5MB)| Preview


With the advancement of camera and wireless technologies, surveillance camera-based occupancy has received ample attention from the research community. However, camera-based occupancy monitoring and wireless channels, especially Wi-Fi hotspot, pose serious privacy concerns and cybersecurity threats. Eavesdroppers can easily access confidential multimedia information and the privacy of individuals can be compromised. As a solution, novel encryption techniques for the multimedia data concealing have been proposed by the cryptographers. Due to the bandwidth limitations and computational complexity, traditional encryption methods are not applicable to multimedia data. In traditional encryption methods such as Advanced Encryption Standard (AES) and Data Encryption Standard (DES), once multimedia data are compressed during encryption, correct decryption is a challenging task. In order to utilize the available bandwidth in an efficient way, a novel secure video occupancy monitoring method in conjunction with encryption-compression has been developed and reported in this paper. The interesting properties of Chebyshev map, intertwining map, logistic map, and orthogonal matrix are exploited during block permutation, substitution, and diffusion processes, respectively. Real-time simulation and performance results of the proposed system show that the proposed scheme is highly sensitive to the initial seed parameters. In comparison to other traditional schemes, the proposed encryption system is secure, efficient, and robust for data encryption. Security parameters such as correlation coefficient, entropy, contrast, energy, and higher key space prove the robustness and efficiency of the proposed solution.