Abstract
This paper aims to protect the facial recognition system by securing the stored images and preventing unauthorized people from accessing them. Symmetric and asymmetric encryption techniques were proposed for the image encryption process. To ensure the use of the most efficient techniques, thus, compare the results between two popular encryption algorithms. AES was chosen to represent the symmetric cipher and the RSA for asymmetric ciphers. High-resolution face images are encoded by both algorithms, as well as the ability to be analyzed by quantitative parameters such as PSNR, histogram, entropy, and elapsed time. The results showed through the proposed criteria the preference of AES, as it provided distinguished results in image coding in terms of coding quality and accuracy, processing speed and execution, coding complexity, coding efficiency, and homogeneousness. To sum up, symmetric encryption techniques protect the face recognition system faster and better than asymmetric encryption techniques.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mohammad, O.F., et al.: A survey and analysis of the image encryption methods 12, 13265–13280 (2017)
Jain, Y., et al.: Image encryption schemes: a complete survey. Int. J. Sig. Process. Pattern Recogn. 9(7), 157–192 (2016)
Zhang, Q., Ding, Q.: Digital image encryption based on advanced encryption standard (AES). In: 2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC), pp. 1218–1221. IEEE (2015)
Memon, F., et al.: Image quality assessment for performance evaluation of focus measure operators. J. Eng. Technol. 34, 379–386 (2015)
Ebrahim, M., Khan, S., Khalid, U.B.: Symmetric algorithm survey: a comparative analysis. Int. J. Comput. Appl. 61(20) (2014)
Abdullah, A.J.C., Security, N.: Advanced encryption standard (AES) algorithm to encrypt and decrypt data 16 (2017)
Chen, X.: Implementing AES encryption on programmable switches via scrambled lookup tables. In: Proceedings of the Workshop on Secure Programmable Network Infrastructure, pp. 8–14 (2020)
Banik, S., Bogdanov, A., Regazzoni, F.: Compact circuits for combined AES encryption/decryption. J. Crypt. Eng. 9, 69–83 (2019)
Albalas, F., et al.: Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography. Int. Arab J. Inf. Technol. 1333, 151 (2018)
Fotohi, R., Firoozi Bari, S., Yusefi, M.: Securing wireless sensor networks against denial‐of‐sleep attacks using RSA cryptography algorithm and interlock protocol. Int. J. Commun. Syst. 33, e4234 (2020)
Farrag, S., Alexan, W.: Secure 2D image steganography using Recamán’s sequence. In: 2019 International Conference on Advanced Communication Technologies and Networking (CommNet), pp. 1–6. IEEE (2019)
Sara, U., et al.: Image quality assessment through FSIM, SSIM, MSE and PSNR—a comparative study. J. Comput. Commun. 7(3), 8–18 (2019)
Cho, G.Y., et al.: Evaluation of breast cancer using intravoxel incoherent motion (IVIM) histogram analysis: comparison with malignant status, histological subtype, and molecular prognostic factors. Eur. Radiol. 26(8), 2547–2558 (2016)
Lin, G.-M., et al.: Transforming retinal photographs to entropy images in deep learning to improve automated detection for diabetic retinopathy. J. Ophthalmol. 2018(2), 1–6 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alhayani, M., Al-Khiza’ay, M. (2023). Analyze Symmetric and Asymmetric Encryption Techniques by Securing Facial Recognition System. In: Ben Ahmed, M., Abdelhakim, B.A., Ane, B.K., Rosiyadi, D. (eds) Emerging Trends in Intelligent Systems & Network Security. NISS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol 147. Springer, Cham. https://doi.org/10.1007/978-3-031-15191-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-15191-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-15190-3
Online ISBN: 978-3-031-15191-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)