Real-Time Face Recognition System with Enhanced Security Using Cryptographic Hash-Based Encrypted Embedding Matching

  • Authors

  • Affiliations

  • Published

  • Section Article

  • DOI https://doi.org/10.56347/jics.v4i2.322

  • Issue
Views icon

239

Views

Downloads icon

94

Downloads

Altmetrics icon

Altmetrics

Abstract

This study presents the development and evaluation of a secure and efficient real-time face recognition system for school attendance, integrating cancelable biometrics with cryptographic hashing. A total of 115 face samples were collected from students and teachers under diverse lighting, pose, and expression conditions. Images were pre-processed using Contrast Limited Adaptive Histogram Equalization (CLAHE) and Gamma Correction, followed by feature extraction with ResNet-128D, key-based random projection, binarization into 128-bit templates, and SHA-256 hashing. Evaluation results demonstrated an accuracy of 86.09%, precision of 100%, recall of 86.09%, and F1-score of 92.52%, with an average latency of 281.71 ms, remaining well below the operational threshold of 500 ms. Offline pre-processing improved the F1-Score by 7.50% on large datasets and 7.28% on smaller datasets without sacrificing processing speed. From a security perspective, the system achieved zero false acceptances (FAR = 0%) and allowed template regeneration when compromised, reinforcing privacy preservation. These findings validate the feasibility of combining cancelable biometrics with cryptographic hashing to balance accuracy, speed, and security in practical attendance systems. The research underscores its broader applicability to access control and public security, while future work should emphasize adaptive pre-processing, diverse hardware validation, and hardware acceleration for robust real-time deployment.

References

  1. Abdullahi, S. M., Sun, S., Wang, B., Wei, N., & Wang, H. (2024). Biometric template attacks and recent protection mechanisms: A survey. Information Fusion, 103, 102144. https://doi.org/10.1016/j.inffus.2023.102144
  2. Ali, A., Migliorati, A., Bianchi, T., & Magli, E. (2024). Cancelable templates for secure face verification based on deep learning and random projections. EURASIP Journal on Information Security, 2024(1). https://doi.org/10.1186/s13635-023-00147-y
  3. Bai, J., et al. (2023). CryptoMask: Privacy-preserving face recognition.
  4. Banerjee, S., Jain, A., Hegde, C., & Memon, N. (2025). FaceCloak: Learning to protect face templates. IEEE Transactions on Information Forensics and Security.
  5. Bharat, Y., Kaushik, A. R., Ross, A., Boddeti, V., & Ratha, N. (2024). Enhancing privacy in face analytics using fully homomorphic encryption. IEEE Transactions on Information Forensics and Security.
  6. Chen, Y., et al. (2025). Efficient face information encryption and verification scheme based on full homomorphic encryption. Scientific Reports, 15(1), 95383. https://doi.org/10.1038/s41598-025-95383-2
  7. Choi, H., Kim, J., Song, C., Woo, S. S., & Kim, H. (2024, October). Blind-Match: Efficient homomorphic encryption-based 1 matching for privacy-preserving biometric identification. In Proceedings of the International Conference on Information and Knowledge Management (pp. 4423–4430). Association for Computing Machinery. https://doi.org/10.1145/3627673.3680017
  8. Choi, H., Kim, J., & Lee, S. (2020). Illumination normalization for robust face recognition: A comparative study. IEEE Access, 8, 104912–104923. https://doi.org/10.1109/ACCESS.2020.2999132
  9. Kaushik, A. R., Yalavarthi, B. C., Ross, A., Boddeti, V., & Ratha, N. (2025). Shielding latent face representations from privacy attacks. In Proceedings of the IEEE International Conference on Automatic Face and Gesture Recognition (FG 2025).
  10. Li, X., Sun, Y., & Zhao, Q. (2019). Real-time face recognition with pre-processing optimization: Balancing speed and accuracy. Journal of Visual Communication and Image Representation, 64, 102597. https://doi.org/10.1016/j.jvcir.2019.102597
  11. Mi, Y., et al. (2023). Privacy-preserving face recognition using random frequency components. Retrieved from https://github.com/Tencent/TFace
  12. Serengil, S., & Ozpinar, A. (2025). CipherFace: A fully homomorphic encryption-driven framework for secure cloud-based facial recognition. Retrieved from http://github.com/
  13. Serengil, S., & Ozpinar, A. (2025). Encrypted vector similarity computations using partially homomorphic encryption: Applications and performance analysis.
  14. Song, B., Zhao, D., Yan, J., Li, H., & Jiang, H. (2024). BioDeepHash: Mapping biometrics into a stable code. Pattern Recognition Letters, 177, 1–8. https://doi.org/10.1016/j.patrec.2023.12.009
  15. Xu, G., et al. (2025). Pura: An efficient privacy-preserving solution for face recognition. IEEE Transactions on Information Forensics and Security.
  16. Zhao, W., Chellappa, R., Phillips, P. J., & Rosenfeld, A. (2021). Face recognition: A literature survey. ACM Computing Surveys, 35(4), 399–458. https://doi.org/10.1145/954339.954342

Author Biographies

How to Cite

Zaidan, R. S., Kastum, & Mulyana, D. I. (2025). Real-Time Face Recognition System with Enhanced Security Using Cryptographic Hash-Based Encrypted Embedding Matching. Journal Innovations Computer Science, 4(2), 196-202. https://doi.org/10.56347/jics.v4i2.322

Article Details

  • Volume: 4
  • Issue: 2
  • Pages: 196-202
  • Published:
  • Section: Article
  • Copyright: 2025
  • ISSN: 2961-970X

License

Articles in this journal are published under the Creative Commons Attribution Licence (CC-BY 4.0). This means that users may share and adapt the articles published on this website in a reasonable manner, but they must give appropriate credit to the creator and indicate the changes they have made. Users must not apply additional restrictions, but must publish the work under the same license (CC-BY 4.0).

Similar Articles

Similar Articles

Discover other articles with topics similar to what you're currently reading. Find more references and expand your knowledge base.

Related Articles You May Be Interested In

More Similar Articles

Implementation of Edge Computing for Optimizing Sensor...

T. Irfan Fajri, Liasulistia Ningsih, Cut Susan Octiva, Muhammad Lukman Hakim, Nur Amalia Hasma

Vol. 4 No. 2 (2025): November
Design of a Web-Based Incoming Goods Information System...

Ragil Putra Febriansyah

Vol. 4 No. 2 (2025): November
Review of Comsoft Aeronautical Data Access System...

Dian Puspa Aryani, Rini Sadiatmi, Martha Saulina

Vol. 4 No. 2 (2025): November
Implementation of Automatic Chicken Coop Temperature...

Mukminin Mukminin, Rasiban

Vol. 4 No. 2 (2025): November
Most read articles by the same author(s)

Related Articles

Article

Support Vector Machine and Histogram of...

Journal Innovations Computer Science: Vol. 4 No. 2 (2025): November

Danendra Satriyohadi Notonegoro, Dadang Iskandar Mulyana

Article

Enhancing Real-Time Face Recognition Robustness...

Journal Innovations Computer Science: Vol. 4 No. 2 (2025): November

Muhammad Rival, Dadang Iskandar Mulyana