Skip to main content

Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System

  • Conference paper
  • First Online:
Emerging Trends in Intelligent Systems & Network Security (NISS 2022)

Abstract

This paper aims to protect the facial recognition system by securing the stored images and preventing unauthorized people from accessing them. Symmetric and asymmetric encryption techniques were proposed for the image encryption process. To ensure the use of the most efficient techniques, thus, compare the results between two popular encryption algorithms. AES was chosen to represent the symmetric cipher and the RSA for asymmetric ciphers. High-resolution face images are encoded by both algorithms, as well as the ability to be analyzed by quantitative parameters such as PSNR, histogram, entropy, and elapsed time. The results showed through the proposed criteria the preference of AES, as it provided distinguished results in image coding in terms of coding quality and accuracy, processing speed and execution, coding complexity, coding efficiency, and homogeneousness. To sum up, symmetric encryption techniques protect the face recognition system faster and better than asymmetric encryption techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mohammad, O.F., et al.: A survey and analysis of the image encryption methods 12, 13265–13280 (2017)

    Google Scholar 

  2. Jain, Y., et al.: Image encryption schemes: a complete survey. Int. J. Sig. Process. Pattern Recogn. 9(7), 157–192 (2016)

    Google Scholar 

  3. Zhang, Q., Ding, Q.: Digital image encryption based on advanced encryption standard (AES). In: 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), pp. 1218–1221. IEEE (2015)

    Google Scholar 

  4. Memon, F., et al.: Image quality assessment for performance evaluation of focus measure operators. J. Eng. Technol. 34, 379–386 (2015)

    Google Scholar 

  5. Ebrahim, M., Khan, S., Khalid, U.B.: Symmetric algorithm survey: a comparative analysis. Int. J. Comput. Appl. 61(20) (2014)

    Google Scholar 

  6. Abdullah, A.J.C., Security, N.: Advanced encryption standard (AES) algorithm to encrypt and decrypt data 16 (2017)

    Google Scholar 

  7. Chen, X.: Implementing AES encryption on programmable switches via scrambled lookup tables. In: Proceedings of the Workshop on Secure Programmable Network Infrastructure, pp. 8–14 (2020)

    Google Scholar 

  8. Banik, S., Bogdanov, A., Regazzoni, F.: Compact circuits for combined AES encryption/decryption. J. Crypt. Eng. 9, 69–83 (2019)

    Google Scholar 

  9. Albalas, F., et al.: Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. Int. Arab J. Inf. Technol. 1333, 151 (2018)

    Google Scholar 

  10. Fotohi, R., Firoozi Bari, S., Yusefi, M.: Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol. Int. J. Commun. Syst. 33, e4234 (2020)

    Google Scholar 

  11. Farrag, S., Alexan, W.: Secure 2D image steganography using Recamán’s sequence. In: 2019 International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1–6. IEEE (2019)

    Google Scholar 

  12. Sara, U., et al.: Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study. J. Comput. Commun. 7(3), 8–18 (2019)

    Google Scholar 

  13. Cho, G.Y., et al.: Evaluation of breast cancer using intravoxel incoherent motion (IVIM) histogram analysis: comparison with malignant status, histological subtype, and molecular prognostic factors. Eur. Radiol. 26(8), 2547–2558 (2016)

    Google Scholar 

  14. Lin, G.-M., et al.: Transforming retinal photographs to entropy images in deep learning to improve automated detection for diabetic retinopathy. J. Ophthalmol. 2018(2), 1–6 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Alhayani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alhayani, M., Al-Khiza’ay, M. (2023). Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System. In: Ben Ahmed, M., Abdelhakim, B.A., Ane, B.K., Rosiyadi, D. (eds) Emerging Trends in Intelligent Systems & Network Security. NISS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 147. Springer, Cham. https://doi.org/10.1007/978-3-031-15191-0_10

Download citation

Publish with us

Policies and ethics