Facial Image Encryption & Compression for Secure Image Transmission on Cloud Storage

Authors

  • Pranali Dahiwal Savitribai Phule Pune University, Pune, India
  • Anagha Kulkarni Cummins College of Engineering for Women, Pune, India

Keywords:

Image Segmentation, Image Encryption, AES, XOR, Authentication, Privacy, Security

Abstract

Image transmission and face image recognition have grown quite popular among cloud computing users in today's world via different mobile devices. However, because the data is personal, the privacy and security of such data are critical while using the cloud platform. Security features must be used while transmitting images through the cloud. picture encryption is a form of such secure picture communication technology. However, because picture transmission is commonly utilized for face image identification for authentication purposes, the transmission time is critical. In this study, we solve this issue by encrypting images using the Advanced Encryption Standards (AES) and the XOR technique. We propose utilizing the XOR encryption technique to encrypt segmented images. We conducted picture transmission experiments employing 3*1,3*2 and 3*3 images that were segmented with an encryption method and discovered that our suggested XOR-based image segmentation surpassed the existing AES approach in terms of time complexity.

Downloads

Download data is not yet available.

References

S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011, doi: 10.1016/J.JNCA.2010.07.006.

J. Katz and M. Yung, “Scalable protocols for authenticated group key exchange,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 2729, pp. 110–125, 2003, doi: 10.1007/978-3-540-45146-4_7/COVER.

Y.-J. Yang, J. Weng, and F. Bao, “On the Limits of Anonymous Password Authentication,” Sep. 2023.

R. Kaur, “Image Encryption Techniques:A Selected Review,” IOSR J. Comput. Eng., vol. 9, pp. 80–83, Jan. 2013, doi: 10.9790/0661-0968083.

Z. Oleiwi, W. Abdallah, W. Alisawi, A. Alfoudi, and L. Al-Farhani, Overview and Performance Analysis of Encryption Algorithms. 2020.

U. 4b2, “Digital information infrastructure and method for security designated data and with granular data stores,” Apr. 2009.

Z. Han, S. Huang, H. Li, and N. Ren, “Risk assessment of digital library information security: A case study,” Electron. Libr., vol. 34, pp. 471–487, Jun. 2016, doi: 10.1108/EL-09-2014-0158.

C. Zhou, Y. Guo, W. Huang, H. Jiang, B. Li, and J. Chen, “Information security defense method of electric power control system based on digital watermark,” no. Icmemtc, pp. 174–179, 2016, doi: 10.2991/icmemtc-16.2016.32.

E. Chisanga and E. K. Ngassam, “Towards a conceptual framework for information security digital divide,” 2017 IST-Africa Week Conf. IST-Africa 2017, Nov. 2017, doi: 10.23919/ISTAFRICA.2017.8102398.

S. F. Yousif, A. J. Abboud, and H. Y. Radhi, “Robust Image Encryption with Scanning Technology, the El-Gamal Algorithm and Chaos Theory,” IEEE Access, vol. 8, pp. 155184–155209, 2020, doi: 10.1109/ACCESS.2020.3019216.

A. Gamal, N. Korany, and S. El-Khamy, “New DNA Coded Fuzzy Based (DNAFZ) S-Boxes: Application to Robust Image Encryption Using Hyper Chaotic Maps,” IEEE Access, vol. 9, pp. 14284–14305, Jan. 2021, doi: 10.1109/ACCESS.2021.3052161.

J. Wang, J. Li, X. Di, J. Zhou, and Z. Man, “Image Encryption Algorithm Based on Bit-Level Permutation and Dynamic Overlap Diffusion,” IEEE Access, vol. PP, p. 1, Aug. 2020, doi: 10.1109/ACCESS.2020.3020187.

X. Wang and P. Liu, “A New Image Encryption Scheme Based on a Novel One-Dimensional Chaotic System,” IEEE Access, vol. 8, pp. 174463–174479, Jan. 2020, doi: 10.1109/ACCESS.2020.3024869.

I. Saleh and A. Alharbi, “Efficient Image Encryption Scheme Using Henon Map, Dynamic S-Boxes and Elliptic Curve Cryptography,” IEEE Access, vol. 8, pp. 194289–194302, Jan. 2020, doi: 10.1109/ACCESS.2020.3032403.

X. Wang and S. Chen, “Chaotic Image Encryption Algorithm Based on Dynamic Spiral Scrambling Transform and Deoxyribonucleic Acid Encoding Operation,” IEEE Access, vol. PP, p. 1, Sep. 2020, doi: 10.1109/ACCESS.2020.3020835.

A. Alkhedhairi, A. Sonbaty, A. Elsadany, and E. Hagras, “Hybrid Cryptosystem Based on Pseudo Chaos of Novel Fractional Order Map and Elliptic Curves,” IEEE Access, vol. PP, p. 1, Mar. 2020, doi: 10.1109/ACCESS.2020.2982567.

Q. Liu and L. Liu, “Color Image Encryption Algorithm Based on DNA Coding and Double Chaos System,” IEEE Access, vol. PP, p. 1, Apr. 2020, doi: 10.1109/ACCESS.2020.2991420.

F. Yang, J. Mou, Y. Cao, and R. Chu, “An Image Encryption Algorithm Based on BP Neural Network and Hyperchaotic System,” China Commun., vol. 17, no. 5, pp. 21–28, May 2020, doi: 10.23919/JCC.2020.05.003.

A. Hadj Brahim, A. Ali Pacha, and N. Hadj Said, “An image encryption scheme based on a modified AES algorithm by using a variable S-box,” J. Opt., pp. 1–16, May 2023, doi: 10.1007/S12596-023-01232-8/METRICS.

P. Shete and S. Kohle, “Image Encryption using AES Algorithm: Study and Evaluation,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 10, no. 9, pp. 1134–1137, Sep. 2022, doi: 10.22214/IJRASET.2022.46619. paavni gaur, AES Image Encryption. 2021. doi: 10.21203/rs.3.rs-1179585/v1.

J. Amador and R. Green, “Symmetric‐key block cipher for image and text cryptography,” Int. J. Imaging Syst. Technol., vol. 15, pp. 178–188, Jan. 2005, doi: 10.1002/ima.20050.

Downloads

Published

30.11.2023

How to Cite

Dahiwal, P., & Kulkarni, A. . (2023). Facial Image Encryption & Compression for Secure Image Transmission on Cloud Storage. International Journal of Intelligent Systems and Applications in Engineering, 12(6s), 615–621. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4000

Issue

Section

Research Article