An Image Encryption Algorithm by Using Secure Key Generation Techniques
Keywords:
Encryption, Cryptography, ECC, Local Binary Pattern Histogram, Lightweight AlgorithmAbstract
This extension seeks to fortify the processes of security and authentication by integrating the Elliptic Curve Cryptography (ECC), for image encryption, with Local Binary Pattern Histogram (LBPH) for the authentication of live faces during registration and log-in. ECC is one of the measures that afford a greater degree of security with small key sizes, and it is thus brought in to encrypt images safely, responding to the compelling need for an efficient and lightweight image encryption technique, especially in resource-constrained environments. An image encryption algorithm is set up using ECC in such a way that visual data that is being transmitted and stored remain confidential, as opposed to the others, especially AES, which could work on heavier computational load. In addition, real-time face authentication will be done through the use of LBPH, meaning that users are allowed to authenticate themselves through facial recognition at the time of registration and log-in. This system depends on variants of LBPH, which are robust against lighting and facial expression variations, for face recognition consistent in varied environments. Thus, by merging ECC for image encryption with the LBPH method of face authentication, the extended version will further ensure confidentiality of the transmitted data and smooth and secure method of user authentication, further strengthening access control integrity. The enhanced system was analyzed for speed, accuracy, and efficiency and demonstrated significant improvements for real-time security applications.
Downloads
References
M. Khan and T. Shah, "A Literature Review on Image Encryption Techniques," Journal of Information Security, vol. 9, no. 1, pp. 1–10, Jan. 2018. doi:10.4236/jis.2018.91001.
K. Wang, W. Pei, L. Zou, A. Song, and Y. Zhang, "A Novel Chaotic Image Encryption Algorithm Based on Permutation–Diffusion Architecture," Signal Processing: Image Communication, vol. 28, no. 6, pp. 669–680, Jul. 2013. doi:10.1016/j.image.2013.02.006.
M. Elhoseny, K. Shankar, and A. Mohamed, "Secure Medical Data Transmission Model Using ECC and Hash Function in Cloud-Based IoT," IEEE Access, vol. 6, pp. 20596–20608, Mar. 2018. doi:10.1109/ACCESS.2018.2806894.
T. Ahonen, A. Hadid, and M. Pietikäinen, "Face Description With Local Binary Patterns: Application to Face Recognition," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 2037–2041, Dec. 2006. doi:10.1109/TPAMI.2006.244.
M. Sanderson and B. C. Lovell, "Multi-Region Probabilistic Histograms for Robust and Scalable Identity Inference," in Proc. Int. Conf. Biometrics, Springer, 2009, pp. 199–208. doi:10.1007/978-3-642-01793-3_21.
Menaka and M. N. S. Devi, "Performance Analysis of LBPH and Eigenface for Face Recognition," Procedia Computer Science, vol. 143, pp. 60–67, Jan. 2018. doi:10.1016/j.procs.2018.10.366.
Patel, K. Prajapati, and S. Rana, "Image Encryption and Decryption Using ECC," International Journal of Computer Applications, vol. 130, no. 16, pp. 7–10, Nov. 2015. doi:10.5120/ijca2015907149.
Pradhan, P. K. Sahu, and D. Tripathy, "A Combined Approach of ECC and Face Recognition for Secure Biometric Authentication," Journal of King Saud University – Computer and Information Sciences, May 2022. doi:10.1016/j.jksuci.2022.05.014.
M. Basha, A. Noor, and M. Hossain, "A Secure Image Transmission Method Using Hybrid Cryptography," International Journal of Computer Applications, vol. 118, no. 7, pp. 32–37, May 2015. doi:10.5120/20845-3383.
S. A. Parveen and A. K. Reddy, "An ECC-Based Secure Image Encryption Method for Healthcare Applications," Computer Methods and Programs in Biomedicine, vol. 194, p. 105525, May 2020. doi:10.1016/j.cmpb.2020.105525.
H. M. Abd-Elrouf, "Blockchain-Enabled Image Encryption Using Deep Learning for Secure Access in Cloud," Multimedia Tools and Applications, vol. 81, pp. 10563–10586, 2022. doi:10.1007/s11042-022-11846-7.
L. Yan et al., "Attribute Based Searchable Encryption: A Survey," Electronics, vol. 13, no. 9, p. 1621, Apr. 2024. doi:10.3390/ELECTRONICS13091621.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.