TY - JOUR
T1 - Security of Sensitive Data in Face Recognition System Applications
T2 - A Novel Encryption Approach
AU - Hemalatha, S.
AU - Kinjawadekar, Aditya A.
AU - Kulal, Pranamya G.
AU - Deepa, G.
AU - Barla, Prashanth
AU - Srinivasan, Aakash B.
AU - Shamathmika,
N1 - Publisher Copyright:
© 2025 The Authors.
PY - 2025
Y1 - 2025
N2 - Background and Aim: The design of secure systems that can protect sensitive data is becoming a major area of research due to the growing number of applications that use the Internet. In mobile banking applications which use face recognition as unlock feature, the face data is encrypted and protected in a dedicated chip within the device called Secure Enclave that enhances the security of the application. This cutting-edge development is now being used by individuals in their personal devices like smartphones and tablets for accessing their own bank accounts and to perform online transactions. Since encrypted face data is stored locally on devices rather than in the bank’s database, it remains susceptible to security breaches, potentially allowing unauthorized access. While face recognition systems provide benefits like enhanced security, surveillance, and personalized marketing, they also raise privacy, security, ethical, and legal concerns. To address these challenges, this study proposes an encryption method for applications employing face recognition as an authentication feature.Methodology: The proposed method encrypts facial encodings generated by the face recognition model by utilizing Internet Protocol (IP) addresses as a dynamic key generation source. This approach ensures unique encryption for each communication, significantly reducing vulnerability to attacks. One of the widely used face recognition models in mobile applications is Dlib’s face recognition model which provides accurate facial embeddings.Results and Conclusion: The method is evaluated using the ‘‘pins_dataset’’ containing 10,000 images of 100 unique identities and an accuracy of 90.1% is achieved. The same accuracy is observed when testing face recognition without encrypting the facial encodings, demonstrating efficacy of the encryption algorithm. Additionally, the encryption algorithm’s time complexity is evaluated as O(1), confirming its ability to perform encryption with constant time complexity, making it suitable for real-time applications.
AB - Background and Aim: The design of secure systems that can protect sensitive data is becoming a major area of research due to the growing number of applications that use the Internet. In mobile banking applications which use face recognition as unlock feature, the face data is encrypted and protected in a dedicated chip within the device called Secure Enclave that enhances the security of the application. This cutting-edge development is now being used by individuals in their personal devices like smartphones and tablets for accessing their own bank accounts and to perform online transactions. Since encrypted face data is stored locally on devices rather than in the bank’s database, it remains susceptible to security breaches, potentially allowing unauthorized access. While face recognition systems provide benefits like enhanced security, surveillance, and personalized marketing, they also raise privacy, security, ethical, and legal concerns. To address these challenges, this study proposes an encryption method for applications employing face recognition as an authentication feature.Methodology: The proposed method encrypts facial encodings generated by the face recognition model by utilizing Internet Protocol (IP) addresses as a dynamic key generation source. This approach ensures unique encryption for each communication, significantly reducing vulnerability to attacks. One of the widely used face recognition models in mobile applications is Dlib’s face recognition model which provides accurate facial embeddings.Results and Conclusion: The method is evaluated using the ‘‘pins_dataset’’ containing 10,000 images of 100 unique identities and an accuracy of 90.1% is achieved. The same accuracy is observed when testing face recognition without encrypting the facial encodings, demonstrating efficacy of the encryption algorithm. Additionally, the encryption algorithm’s time complexity is evaluated as O(1), confirming its ability to perform encryption with constant time complexity, making it suitable for real-time applications.
UR - https://www.scopus.com/pages/publications/105017641127
UR - https://www.scopus.com/pages/publications/105017641127#tab=citedBy
U2 - 10.1109/ACCESS.2025.3614266
DO - 10.1109/ACCESS.2025.3614266
M3 - Article
AN - SCOPUS:105017641127
SN - 2169-3536
VL - 13
SP - 169473
EP - 169489
JO - IEEE Access
JF - IEEE Access
ER -