Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Speech BioHashing security authentication algorithm based on CNN hyperchaotic map

Published: 01 November 2022 Publication History
  • Get Citation Alerts
  • Abstract

    The current speech content authentication process directly constructs the extracted biometrics into a binary hashing sequence and stores them in the cloud for hashing matching, so the authentication process is vulnerable to similarity attacks, which may lead to the disclosure of biometrics and hash sequences. In order to solve the above problem, this paper proposes an algorithm that is speech BioHashing security authentication algorithm based on CNN hyperchaotic map. Firstly, the user terminal conducts on linear prediction coefficients (LPC) analysis for the pre-processed speech signal, then extracts the improved Mel frequency cepstral coefficients (MFCC) features to obtains the new feature parameter, and calculates the Euclidean distance of the parameter as the biometric vector. Then, the biometrics and the orthogonal set matrix which is constructed by the improved random Fourier measurement matrix are inner product to form biosafety templates, and the templates are further quantified into BioHashing sequences. Finally, the BioHashing sequences are encrypted by CNN hyperchaotic map encryption algorithm and upload them to the cloud server. The experimental results show that the biosafety template not only provides the safe template for the biometric, but also the encryption algorithm of CNN hyperchaotic map guarantees the safety of the BioHashing sequence. At the same time, the algorithm has better robustness and discrimination, and tamper detection and location can better detect and locate mute attacks and substitution attacks.

    References

    [1]
    Ajish S and Anil KKS Security and performance enhancement of fingerprint biometric template using symmetric hashing Comput Secur 2020 90 101714
    [2]
    Bedad F, Réda A (2018) Multi-biometric template protection: an overview. In: International Conference in Artificial Intelligence in Renewable Energetic Systems. Springer, pp 70–79
    [3]
    Chang D, Garg S, Hasan M, and Sweta M Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption IEEE Trans Inf Forensic Secur 2020 15 3152-3167
    [4]
    Chen Y, Wo Y, Xie R, Wu C, and Guoqiang H Deep secure quantization: On secure biometric hashing against similarity-based attacks Signal Process 2019 154 314-323
    [5]
    Deng M, Meng T, Cao J, Wang S, Zhang J, and Huijie F Heart sound classification based on improved mfcc features and convolutional recurrent neural networks Neural Netw 2020 130 22-32
    [6]
    Dong X, Jin Z, Beng J A T (2019) A genetic algorithm enabled similarity-based attack on cancellable biometrics. In: 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, pp 1–8
    [7]
    Feng YC, Lim M-H, and Yuen Pong C Masquerade attack on transform-based binary-template protection based on perceptron learning Pattern Recogn 2014 47 9 3019-3033
    [8]
    Hua Z, Zhang Y, and Yicong Z Two-dimensional modular chaotification system for improving chaos complexity IEEE Trans Signal Process 2020 68 1937-1949
    [9]
    Hua Z, Zhu Z, Chen Y, Yuanman L (2021) Color image encryption using orthogonal latin squares and a new 2d chaotic system. Nonlinear Dyn:1–18
    [10]
    Jiang Y, Wu C, Deng K, and Yan W An audio fingerprinting extraction algorithm based on lifting wavelet packet and improved optimal-basis selection Multimed Tools Appl 2019 78 21 30011-30025
    [11]
    Joseph T, Kalaiselvan SA, Aswathy SU, Radhakrishnan R, Shamna AR (2020) A multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment. J Ambient Intell Human Comput:1–9
    [12]
    Kadyan V, Mandeep K (2020) Sgmm-based modeling classifier for punjabi automatic speech recognition system. In: Smart Computing Paradigms: New Progresses and Challenges. Springer, pp 149–155
    [13]
    Kaur H and Pritee K Random distance method for generating unimodal and multimodal cancelable biometric features IEEE Trans Inf Forensic Secur 2018 14 3 709-719
    [14]
    Kaur H, Pritee K Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing. Futur Gener Comput Syst 102:30–41
    [15]
    Kim H-G, Cho H-S, and Young KJ Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment Clust Comput 2016 19 1 315-323
    [16]
    Krobba A, Debyeche M, Sid-Ahmed S (2020) Mixture linear prediction gammatone cepstral features for robust speaker verification under transmission channel noise. Multimed Tools Appl:1–15
    [17]
    Kumar N and Manisha R Rp-lpp: a random permutation based locality preserving projection for cancelable biometric recognition Multimed Tools Appl 2020 79 3 2363-2381
    [18]
    Kumar S R, Bharathi B (2020) A novel approach towards generalization of countermeasure for spoofing attack on asv systems. Circ Syst Signal Process:1–18
    [19]
    Li J, Wang H, and Yi J Audio perceptual hashing based on nmf and mdct coefficients Chin J Electron 2015 24 3 579-588
    [20]
    Liu N, Gao J, Zhang B, Wang Q, and Xiudi J Self-adaptive generalized s-transform and its application in seismic time–frequency analysis IEEE Trans Geosci Remote Sens 2019 57 10 7849-7859
    [21]
    Morampudi M K, Prasad MVNK, Raju USN (2020) Privacy-preserving iris authentication using fully homomorphic encryption. Multimed Tools Appl:1–23
    [22]
    Nguyen T A T, Dang T K, Thanh N D (2019) A new biometric template protection using random orthonormal projection and fuzzy commitment. In: International Conference on Ubiquitous Information Management and Communication. Springer, pp 723–733
    [23]
    Olanrewaju L, Oyebiyi O, Misra S, Maskeliunas R, Robertas D (2020) Secure ear biometrics using circular kernel principal component analysis, chebyshev transform hashing and bose–chaudhuri–hocquenghem error-correcting codes. SIViP:1–9
    [24]
    Oo Z, Wang L, Phapatanaburi K, Iwahashi M, Nakagawa S, and Jianwu D Phase and reverberation aware dnn for distant-talking speech enhancement Multimed Tools Appl 2018 77 14 18865-18880
    [25]
    Oo Z, Wang L, Phapatanaburi K, Liu M, Nakagawa S, Iwahashi M, and Jianwu D Replay attack detection with auditory filter-based relative phase features EURASIP J Audio Speech Music Process 2019 2019 1 8
    [26]
    Parkavi R, Babu KRC, Neelambika T, Shilpa P (2018) Cancelable biometrics using geometric transformations and bio hashing. In: Computational Vision and Bio Inspired Computing. Springer, pp 652–662
    [27]
    Pawade D, Sakhapara A, Andrade M, Badgujar A, Divya A (2019) Implementation of fingerprint-based authentication system using blockchain. In: Soft Computing and Signal Processing. Springer, pp 233–242
    [28]
    Ponnaian D and Kavitha C Crypt analysis of an image compression–encryption algorithm and a modified scheme using compressive sensing Optik 2017 147 263-276
    [29]
    Qiu J, Li H, and Chuan Z Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication Comput Secur 2019 82 1-14
    [30]
    Qiuyu Z, Tao Z, Dongfang W, and Ge Z Strong robust speech authentication algorithm based on quasi-harmonic model J Huazhong Univ Sci Technol (Nat Sci Edn) 2018 28 3 11
    [31]
    Sandhya M, Prasad MVNK (2017) Biometric template protection: A systematic literature review of approaches and modalities. In: Biometric Security and Privacy. Springer, pp 323–370
    [32]
    Sheela SJ, Suresh KV, Tandur D, and Sanjay A Cellular neural network-based medical image encryption SN Comput Sci 2020 1 6 1-11
    [33]
    Sonnleitner R and Gerhard W Robust quad-based audio fingerprinting IEEE/ACM Trans Audio Speech Lang Process 2015 24 3 409-421
    [34]
    Trivedi AK, Thounaojam DM, and Shyamosree P Non-invertible cancellable fingerprint template for fingerprint biometric Comput Secur 2020 90 101690
    [35]
    Yadav IC and Gayadhar P Pitch and noise normalized acoustic feature for children’s asr Digital Signal Process 2020 109 102922
    [36]
    Yang J, Das RK, and Haizhou L Significance of subband features for synthetic speech detection IEEE Trans Inf Forensic Secur 2019 15 2160-2170
    [37]
    Zhang Q-y, Ge Z-x, Hu Y-j, Bai J, and Yi-bo H An encrypted speech retrieval algorithm based on chirp-z transform and perceptual hashing second feature extraction Multimed Tools Appl 2020 79 9 6337-6361
    [38]
    Zhang Q-y, Hu W-j, Huang Y-b, and Si-bin Q An efficient perceptual hashing based on improved spectral entropy for speech authentication Multimed Tools Appl 2018 77 2 1555-1581
    [39]
    Zhang Q-y, Qiao S-b, Huang Y-b, and Tao Z A high-performance speech perceptual hashing authentication algorithm based on discrete wavelet transform and measurement matrix Multimed Tools Appl 2018 77 16 21653-21669
    [40]
    Zhang Q-Y, Xing P-F, Huang Y-B, Dong R-H, and Zhong-Ping Y An efficient speech perceptual hashing authentication algorithm based on wavelet packet decomposition J Inf Hiding Multimed Signal Process 2015 6 2 311-322
    [41]
    Zhang Q, Zhang D, and Liang Z An encrypted speech authentication method based on uniform subband spectrum variance and perceptual hashing Turkish J Electr Eng Comput Sci 2020 28 5 2467-2482
    [42]
    Zhao S and Bob Z Joint constrained least-square regression with deep convolutional feature for palmprint recognition IEEE Trans Syst Man Cybern: Syst 2020 15 2160-2170

    Index Terms

    1. Speech BioHashing security authentication algorithm based on CNN hyperchaotic map
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Multimedia Tools and Applications
      Multimedia Tools and Applications  Volume 81, Issue 26
      Nov 2022
      1364 pages

      Publisher

      Kluwer Academic Publishers

      United States

      Publication History

      Published: 01 November 2022
      Accepted: 27 March 2022
      Revision received: 10 December 2021
      Received: 22 April 2021

      Author Tags

      1. Speech content authentication
      2. CNN hyperchaotic map
      3. Biosafety template
      4. BioHashing
      5. Tamper detection and location

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 11 Aug 2024

      Other Metrics

      Citations

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media