A Comprehensive Study on the Homomorphic Encryption for Secure Image Data Processing
Received: 22 December 2024 | Revised: 28 January 2025 | Accepted: 31 January 2025 | Online: 3 April 2025
Corresponding author: Suriyani Binti Ariffin
Abstract
In the contemporary digital landscape, the integrity and confidentiality of data have become paramount concerns. This study presents a comprehensive framework for secure image data processing using homomorphic encryption. The proposed approach involves image preprocessing, logistic regression model training, feature extraction, and polynomial approximation to accommodate the constraints of homomorphic encryption algorithms. Sensitive data, encrypted via homomorphic algorithms, is embedded within images to ensure its concealment during computational operations. Subsequent encryption of the image using the asymmetric Rivest-Shamir-Adleman (RSA) algorithm further secures the encapsulated sensitive data. Through experimental data and analysis, the performance and speed of homomorphic encryption are compared against traditional methods, validating its efficacy in encrypted image data processing.
Keywords:
homomorphic encryption, logistic regression, information securityDownloads
References
K. Rajeshkumar, C. Ananth, and N. Mohananthini, "Blockchain-Assisted Homomorphic Encryption Approach for Skin Lesion Diagnosis using Optimal Deep Learning Model," Engineering, Technology & Applied Science Research, vol. 13, no. 3, pp. 10978–10983, Jun. 2023.
S. Jumonji, K. Sakai, M.-T. Sun, and W.-S. Ku, "Privacy-Preserving Collaborative Filtering Using Fully Homomorphic Encryption," IEEE Transactions on Knowledge and Data Engineering, vol. 35, no. 3, pp. 2961–2974, Mar. 2023.
J. L. Raisaro et al., "Protecting Privacy and Security of Genomic Data in i2b2 with Homomorphic Encryption and Differential Privacy," IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 15, no. 5, pp. 1413–1426, Sep. 2018.
M. Kim, Y. Song, S. Wang, Y. Xia, and X. Jiang, "Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation," JMIR Medical Informatics, vol. 6, no. 2, Apr. 2018, Art. no e8805.
P.-E. Clet, O. Stan, and M. Zuber, "BFV, CKKS, TFHE: Which One is the Best for a Secure Neural Network Evaluation in the Cloud?," in 19th International Conference on Applied Cryptography and Network Security, Kamakura, Japan, 2021, pp. 279–300.
H. Shekhawat, S. Sharma, and R. Koli, "Privacy-Preserving Techniques for Big Data Analysis in Cloud," in 2019 Second International Conference on Advanced Computational and Communication Paradigms, Gangtok, India, 2019, pp. 1–6.
Downloads
How to Cite
License
Copyright (c) 2025 Qiang Chen, Huixian Li, Suriyani Binti Ariffin, Nor Atiqah Bte Mustapa

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.