z-logo
open-access-imgOpen Access
Security of Sensitive Data in Face Recognition System Applications: A Novel Encryption Approach
Author(s) -
S. Hemalatha,
Aditya A. Kinjawadekar,
Pranamya G. Kulal,
G. Deepa,
Prashanth Barla,
Aakash B. Srinivasan,
Shamathmika
Publication year - 2025
Publication title -
ieee access
Language(s) - English
Resource type - Magazines
SCImago Journal Rank - 0.587
H-Index - 127
eISSN - 2169-3536
DOI - 10.1109/access.2025.3614266
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
Background and Aim: The design of secure systems that can protect sensitive data is becoming a major area of research due to the growing number of applications that use the Internet. In mobile banking applications which use face recognition as unlock feature, the face data is encrypted and protected in a dedicated chip within the device called Secure Enclave that enhances the security of the application. This cutting-edge development is now being used by individuals in their personal devices like smartphones and tablets for accessing their own bank accounts and to perform online transactions. Since encrypted face data is stored locally on devices rather than in the bank’s database, it remains susceptible to security breaches, potentially allowing unauthorized access. While face recognition systems provide benefits like enhanced security, surveillance, and personalized marketing, they also raise privacy, security, ethical, and legal concerns. To address these challenges, this study proposes an encryption method for applications employing face recognition as an authentication feature. Methodology: The proposed method encrypts facial encodings generated by the face recognition model by utilizing Internet Protocol (IP) addresses as a dynamic key generation source. This approach ensures unique encryption for each communication, significantly reducing vulnerability to attacks. One of the widely used face recognition models in mobile applications is Dlib’s face recognition model which provides accurate facial embeddings. Results and Conclusion: The method is evaluated using the ‘‘pins_dataset’’ containing 10,000 images of 100 unique identities and an accuracy of 90.1% is achieved. The same accuracy is observed when testing face recognition without encrypting the facial encodings, demonstrating efficacy of the encryption algorithm. Additionally, the encryption algorithm’s time complexity is evaluated as O (1), confirming its ability to perform encryption with constant time complexity, making it suitable for real-time applications.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom