I. Introduction
With the rapid development of smart devices, the popularity and application of the Internet of Things has become increasingly widespread, which has greatly improved the convenience of People’s Daily lives [1], [2], [3]. In this process, digital images, as a key information medium, play a pivotal role in social media networks, transportation, medicine, and other fields [4], [5], [6]. However, with the rapid expansion of image data, resource-constrained IoT devices, such as sensor nodes, smart home devices, environmental monitoring devices, and smart wearables, are facing enormous data storage and processing pressure. As a result, these devices tend to outsource large amounts of image data to cloud servers for efficient acquisition and in-depth analysis to release pressure on local storage and computing resources [7], [8]. However, open cloud storage environments are susceptible to widespread network attacks, as a large number of images need to be uploaded to cloud servers, and images lacking secure processing face privacy leakage risks. At the same time, due to the large size of image files, the transmission delay and resource consumption will be significantly increased during transmission, which brings challenges to the efficiency and performance of IoT devices. As a result, numerous security-focused solutions have emerged to efficiently process the image data transmitted by IoT devices, for example, schemes based on traditional symmetric cryptography [9], [10], schemes based on public key homomorphic encryption (HE) algorithms [11], [12], and security schemes based on compressed sensing (CS) [8], [13]. Traditional encryption algorithms, such as ECC, RSA, and Paillier, are not well-suited for sensing devices with limited resources. In contrast, security schemes based on CS not only facilitate signal sampling but also achieve compression and encryption, making them widely applicable [14], [15].