An Image Encryption Algorithm by Using Secure Key Generation Techniques

Authors

  • Mrs.S. Riyazbanu (M.tech, Ph.d),Assistant professor, Dept. of CSE, Annamacharya University.,516115, Rajampet, India. Author
  • Y Bramha Tejeswara Achari UG Scholar, Dept. of CSE, Annamacharya Institute of Technology and Sciences, 516115, Rajampet, India Author
  • G Damodhar Reddy UG Scholar, Dept. of CSE, Annamacharya Institute of Technology and Sciences, 516115, Rajampet, India Author
  • P Basha UG Scholar, Dept. of CSE, Annamacharya Institute of Technology and Sciences, 516115, Rajampet, India Author
  • M Giri UG Scholar, Dept. of CSE, Annamacharya Institute of Technology and Sciences, 516115, Rajampet, India Author

DOI:

https://doi.org/10.47392/IRJAEM.2025.0202

Keywords:

Encryption, Cryptography, Elliptic curve Cryptography, Local Binary Pattern Histogram, Diffie-Hellman, Grayscale Conversion, Histogram Equalization, Image Security

Abstract

To enhance the security and authentication processes, this extension integrates Elliptic Curve Cryptography (ECC) for image encryption and Local Binary Pattern Histogram (LBPH) for live face authentication during registration and login. ECC, known for its high security with smaller key sizes, is incorporated to securely encrypt images, addressing the growing need for efficient and lightweight image encryption in resource-constrained environments. By employing ECC, the encryption algorithm ensures that visual data transmitted and stored remains confidential, with reduced computational overhead compared to traditional encryption methods like AES. Additionally, LBPH is employed for real-time face authentication, allowing users to authenticate themselves via facial recognition during both registration and login. This biometric system leverages LBPH’s robustness against variations in lighting and facial expressions, ensuring reliable face recognition in diverse environments. By the integrity of user access control, offering a combining ECC for image encryption and LBPH for face authentication, the extended system strengthens both the confidentiality of transmitted data and seamless and secure authentication process. The enhanced system was evaluated for speed, accuracy, and efficiency, showing significant improvements in real-time security applications.

Downloads

Download data is not yet available.

Downloads

Published

2025-04-18