Context-Aware Image Encryption via Adaptive Entropy-Oriented Segmentation
Received: 5 March 2026 | Revised: 29 March 2026, 15 April 2026, and 3 May 2026 | Accepted: 4 May 2026 | Online: 11 May 2026
Corresponding author: Saadia Drissi
Abstract
Recently, the demand for secure visual data transmission has increased significantly in applications such as cloud computing, telemedicine, and intelligent surveillance systems. This study presents an adaptive image encryption framework called Adaptive Entropy-Based Segmentation (AESeg), which, unlike conventional segmentation-based encryption approaches that rely on predefined geometric partitions, introduces an entropy-driven segmentation paradigm where the spatial distribution of information directly guides the allocation of cryptographic strength. In the proposed framework, high-entropy regions associated with rich textures and structural details are protected using strong cryptographic mechanisms, whereas low-entropy homogeneous regions are secured using lightweight encryption operations. By integrating entropy-based segmentation with the Dynamic Cipher Composition (DCC) architecture and adjacency-aware cryptographic allocation, AESeg enables context-aware encryption while reducing unnecessary computational overhead. Experimental results show that AESeg achieves entropy values close to 7.99, NPCR above 99.6%, and UACI above 33.4%, while reducing encryption time by 28–35% compared to conventional uniform encryption approaches. These results demonstrate that the proposed method achieves an effective balance between security robustness and computational efficiency.
Keywords:
AESeg, image encryption, local entropy, adaptive security, cryptographic algorithms, segmentationDownloads
References
W. Alexan, N. H. E. Shabasy, N. Ehab, and E. A. Maher, "A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations," Scientific Reports, vol. 15, no. 1, Aug. 2025, Art. no. 31246.
U. Zia et al., "Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains," International Journal of Information Security, vol. 21, no. 4, pp. 917–935, Aug. 2022.
H. Zhiqiang, A. Rauf, A. Nazir, F. Tchier, A. Aslam, and K. A. Tola, "Design and analysis of a secure image encryption algorithm using proposed non-linear RN chaotic system and ECC/HKDF key derivation with authentication support," Scientific Reports, vol. 15, no. 1, Nov. 2025, Art. no. 39951.
J. Gao, Y. Shen, S. Li, and J. Zhang, "An enhanced hybrid chaotic system and its application in image encryption," Journal of King Saud University Computer and Information Sciences, vol. 37, no. 9, Nov. 2025, Art. no. 295.
Y. Huang, Q. Zhang, and Y. Zhao, "Color image encryption algorithm based on hybrid chaos and layered strategies," Journal of Information Security and Applications, vol. 89, Mar. 2025, Art. no. 103921.
Y. Alghamdi and A. Munir, "Image Encryption Algorithms: A Survey of Design and Evaluation Metrics," Journal of Cybersecurity and Privacy, vol. 4, no. 1, pp. 126–152, Feb. 2024.
O. P. Singh, K. N. Singh, A. K. Singh, and A. K. Agrawal, "Deep learning-based image encryption techniques: Fundamentals, current trends, challenges and future directions," Neurocomputing, vol. 612, Jan. 2025, Art. no. 128714.
S. Rohhila and A. K. Singh, "Deep learning-based encryption for secure transmission digital images: A survey," Computers and Electrical Engineering, vol. 116, May 2024, Art. no. 109236.
S. Khan and H. Peng, "A secure and adaptive block-based image encryption: a novel high-speed approach," Nonlinear Dynamics, vol. 112, no. 18, pp. 16445–16473, Sept. 2024.
J. Ahmad, "Secure Image Encryption Using Dynamic Block Segmentation and Adaptive Pixel Modification with Chaotic Masking," in 2024 International Conference on Engineering and Emerging Technologies (ICEET), Dec. 2024, pp. 1–6.
T. Umar and M. Nadeem, "Chaos-based image encryption techniques: A comprehensive analysis and novel approach," AIP Conference Proceedings, vol. 3260, no. 1, July 2025, Art. no. 020017.
R. Zhou, "Attack an image cipher algorithm combined new DNA operation with chaotic map," The European Physical Journal Plus, vol. 140, no. 9, Sept. 2025, Art. no. 81.
Z. A. Mohammed, H. Q. Gheni, Z. J. Hussein, and A. K. M. Al-Qurabat, "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques," Engineering, Technology & Applied Science Research, vol. 14, no. 1, pp. 12694–12701, Feb. 2024.
M. Alnabhan, A. El-Qasass, M. Atoum, Q. A. Al-Haija, and A. Habboush, "A Lightweight Cryptographic Solution for Enhanced Image Security," Engineering, Technology & Applied Science Research, vol. 15, no. 5, pp. 27052–27059, Oct. 2025.
Q. Chen, H. Li, S. B. Ariffin, and N. A. B. Mustapa, "A Comprehensive Study on the Homomorphic Encryption for Secure Image Data Processing," Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 21783–21790, Apr. 2025.
R. Padma and V. Yendapalli, "Hybrid Asymmetric Cryptography and Modified Cosine Wavelet Transform-Based Steganography Using Convolutional Autoencoder for Secure Data Sharing," Engineering, Technology & Applied Science Research, vol. 16, no. 1, pp. 32753–32760, Feb. 2026.
Y. Alslman, E. Alnagi, A. Ahmad, Y. AbuHour, R. Younisse, and Q. A. Al-haija, "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard," Electronics, vol. 11, no. 23, Nov. 2022.
S. Drissi, F. Gmira, J. Belkadid, M. Chergui, and M. E. Kamili, "Image-Type Data Security via Dynamic Cipher Composition from Method Libraries," Technologies, vol. 13, no. 10, Oct. 2025.
"USC-SIPI Image Database." [Online]. Available: https://sipi.usc.edu/database.
Downloads
How to Cite
License
Copyright (c) 2026 Saadia Drissi, Faiq Gmira, Meriyem Chergui

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
