Facial Image Encryption & Compression for Secure Image Transmission on Cloud Storage
Keywords:
Image Segmentation, Image Encryption, AES, XOR, Authentication, Privacy, SecurityAbstract
Image transmission and face image recognition have grown quite popular among cloud computing users in today's world via different mobile devices. However, because the data is personal, the privacy and security of such data are critical while using the cloud platform. Security features must be used while transmitting images through the cloud. picture encryption is a form of such secure picture communication technology. However, because picture transmission is commonly utilized for face image identification for authentication purposes, the transmission time is critical. In this study, we solve this issue by encrypting images using the Advanced Encryption Standards (AES) and the XOR technique. We propose utilizing the XOR encryption technique to encrypt segmented images. We conducted picture transmission experiments employing 3*1,3*2 and 3*3 images that were segmented with an encryption method and discovered that our suggested XOR-based image segmentation surpassed the existing AES approach in terms of time complexity.
Downloads
References
S. Subashini and V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” J. Netw. Comput. Appl., vol. 34, no. 1, pp. 1–11, Jan. 2011, doi: 10.1016/J.JNCA.2010.07.006.
J. Katz and M. Yung, “Scalable protocols for authenticated group key exchange,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 2729, pp. 110–125, 2003, doi: 10.1007/978-3-540-45146-4_7/COVER.
Y.-J. Yang, J. Weng, and F. Bao, “On the Limits of Anonymous Password Authentication,” Sep. 2023.
R. Kaur, “Image Encryption Techniques:A Selected Review,” IOSR J. Comput. Eng., vol. 9, pp. 80–83, Jan. 2013, doi: 10.9790/0661-0968083.
Z. Oleiwi, W. Abdallah, W. Alisawi, A. Alfoudi, and L. Al-Farhani, Overview and Performance Analysis of Encryption Algorithms. 2020.
U. 4b2, “Digital information infrastructure and method for security designated data and with granular data stores,” Apr. 2009.
Z. Han, S. Huang, H. Li, and N. Ren, “Risk assessment of digital library information security: A case study,” Electron. Libr., vol. 34, pp. 471–487, Jun. 2016, doi: 10.1108/EL-09-2014-0158.
C. Zhou, Y. Guo, W. Huang, H. Jiang, B. Li, and J. Chen, “Information security defense method of electric power control system based on digital watermark,” no. Icmemtc, pp. 174–179, 2016, doi: 10.2991/icmemtc-16.2016.32.
E. Chisanga and E. K. Ngassam, “Towards a conceptual framework for information security digital divide,” 2017 IST-Africa Week Conf. IST-Africa 2017, Nov. 2017, doi: 10.23919/ISTAFRICA.2017.8102398.
S. F. Yousif, A. J. Abboud, and H. Y. Radhi, “Robust Image Encryption with Scanning Technology, the El-Gamal Algorithm and Chaos Theory,” IEEE Access, vol. 8, pp. 155184–155209, 2020, doi: 10.1109/ACCESS.2020.3019216.
A. Gamal, N. Korany, and S. El-Khamy, “New DNA Coded Fuzzy Based (DNAFZ) S-Boxes: Application to Robust Image Encryption Using Hyper Chaotic Maps,” IEEE Access, vol. 9, pp. 14284–14305, Jan. 2021, doi: 10.1109/ACCESS.2021.3052161.
J. Wang, J. Li, X. Di, J. Zhou, and Z. Man, “Image Encryption Algorithm Based on Bit-Level Permutation and Dynamic Overlap Diffusion,” IEEE Access, vol. PP, p. 1, Aug. 2020, doi: 10.1109/ACCESS.2020.3020187.
X. Wang and P. Liu, “A New Image Encryption Scheme Based on a Novel One-Dimensional Chaotic System,” IEEE Access, vol. 8, pp. 174463–174479, Jan. 2020, doi: 10.1109/ACCESS.2020.3024869.
I. Saleh and A. Alharbi, “Efficient Image Encryption Scheme Using Henon Map, Dynamic S-Boxes and Elliptic Curve Cryptography,” IEEE Access, vol. 8, pp. 194289–194302, Jan. 2020, doi: 10.1109/ACCESS.2020.3032403.
X. Wang and S. Chen, “Chaotic Image Encryption Algorithm Based on Dynamic Spiral Scrambling Transform and Deoxyribonucleic Acid Encoding Operation,” IEEE Access, vol. PP, p. 1, Sep. 2020, doi: 10.1109/ACCESS.2020.3020835.
A. Alkhedhairi, A. Sonbaty, A. Elsadany, and E. Hagras, “Hybrid Cryptosystem Based on Pseudo Chaos of Novel Fractional Order Map and Elliptic Curves,” IEEE Access, vol. PP, p. 1, Mar. 2020, doi: 10.1109/ACCESS.2020.2982567.
Q. Liu and L. Liu, “Color Image Encryption Algorithm Based on DNA Coding and Double Chaos System,” IEEE Access, vol. PP, p. 1, Apr. 2020, doi: 10.1109/ACCESS.2020.2991420.
F. Yang, J. Mou, Y. Cao, and R. Chu, “An Image Encryption Algorithm Based on BP Neural Network and Hyperchaotic System,” China Commun., vol. 17, no. 5, pp. 21–28, May 2020, doi: 10.23919/JCC.2020.05.003.
A. Hadj Brahim, A. Ali Pacha, and N. Hadj Said, “An image encryption scheme based on a modified AES algorithm by using a variable S-box,” J. Opt., pp. 1–16, May 2023, doi: 10.1007/S12596-023-01232-8/METRICS.
P. Shete and S. Kohle, “Image Encryption using AES Algorithm: Study and Evaluation,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 10, no. 9, pp. 1134–1137, Sep. 2022, doi: 10.22214/IJRASET.2022.46619. paavni gaur, AES Image Encryption. 2021. doi: 10.21203/rs.3.rs-1179585/v1.
J. Amador and R. Green, “Symmetric‐key block cipher for image and text cryptography,” Int. J. Imaging Syst. Technol., vol. 15, pp. 178–188, Jan. 2005, doi: 10.1002/ima.20050.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.