Hyperdimensional Multimedia Perception and Frontier Security

Faculty of Applied Sciences, Macao Polytechnic University

Using 3D-LMM-Based Encryption to Secure Digital Images with 3D S-box and Fibonacci Q-Matrix


Journal article


Yunlong Liao, Yiting Lin, Zheng Xing, Qiutong Li, Guoheng Huang, Donglong Chen, Xiaochen Yuan
IEEE Internet of Things Journal, 2025, pp. 1-1

Link
Cite

Cite

APA   Click to copy
Liao, Y., Lin, Y., Xing, Z., Li, Q., Huang, G., Chen, D., & Yuan, X. (2025). Using 3D-LMM-Based Encryption to Secure Digital Images with 3D S-box and Fibonacci Q-Matrix. IEEE Internet of Things Journal, 1–1.


Chicago/Turabian   Click to copy
Liao, Yunlong, Yiting Lin, Zheng Xing, Qiutong Li, Guoheng Huang, Donglong Chen, and Xiaochen Yuan. “Using 3D-LMM-Based Encryption to Secure Digital Images with 3D S-Box and Fibonacci Q-Matrix.” IEEE Internet of Things Journal (2025): 1–1.


MLA   Click to copy
Liao, Yunlong, et al. “Using 3D-LMM-Based Encryption to Secure Digital Images with 3D S-Box and Fibonacci Q-Matrix.” IEEE Internet of Things Journal, 2025, pp. 1–1.


BibTeX   Click to copy

@article{liao2025a,
  title = {Using 3D-LMM-Based Encryption to Secure Digital Images with 3D S-box and Fibonacci Q-Matrix},
  year = {2025},
  journal = {IEEE Internet of Things Journal},
  pages = {1-1},
  author = {Liao, Yunlong and Lin, Yiting and Xing, Zheng and Li, Qiutong and Huang, Guoheng and Chen, Donglong and Yuan, Xiaochen}
}

Abstract: The rapid development of communication technology has significantly improved information transmission and increased capacity. In the context of the Internet of Things (IoT), where massive visual data transmission faces challenges of real-time processing and security threats. To address this problem, this paper proposes a novel encryption algorithm based on a 3D S-box combined with Fractal-Sort-Matrix and Fibonacci Q-Matrix (3DSFF). To address the shortcomings of traditional S-box encryption, this paper integrates the 3D S-box with the FSM, thus enhancing the uncertainty of permutation and transformation. Additionally, to overcome the limitation of using a single value inciting Fibonacci Q-Matrix (FQM) applications, this paper combines FQM with chaotic sequences to strengthen its resistance against exhaustive attacks. Through comprehensive experimental tests on the algorithm’s outcomes, it demonstrates notable improvements over previous algorithms, achieving an average information entropy of 7.9993 and a correlation coefficient close to 0.01 after encryption. These tests indicate that the scheme can withstand common attacks, making it a sufficiently secure solution for the confidentiality of private images. Moreover, these advances provide a secure and efficient visual data protection framework for IoT applications involving anti-theft surveillance, data acquisition, and communication transmission.