Biohashing encrypted speech retrieval based on chaotic measurement matrix

被引:0
|
作者
Huang Y. [1 ]
Wang Y. [1 ]
Zhang Q. [2 ]
Chen T. [1 ]
机构
[1] College of Physics and Electronic Engineering, Northwest Normal University, Lanzhou
[2] School of Computer and Communication, Lanzhou University of Technology, Lanzhou
来源
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) | 2020年 / 48卷 / 12期
关键词
Biohashing; Biometric template; Encrypted speech retrieval; Improved sha256 algorithm; Rossler chaotic measurement matrix;
D O I
10.13245/j.hust.201206
中图分类号
学科分类号
摘要
In order to solve the problem of plaintext data leakage in the existing speech retrieval system, and improve the performance of speech retrieval, the security and privacy of biometric template, a biohashing encrypted speech retrieval algorithm was proposed based on Rossler chaotic measurement matrix.First, the speech was classified by the client, and redistribute key with class as single mapping.A 358 bit Rossler chaotic measurement matrix was generated by the key, the matrix was used to transform the speech features, and the hash index of speech was generated by binarization.Then the speech file was encrypted using the improved sha256 algorithm.Finally, hash index and encrypted speech were sent to the cloud.The experimental results show that this algorithm not only can effectively prevent plaintext leakage, but also has good robustness, discrimination and retrieval performance.At the same time, biometric template has good diversity, revocability, security and privacy. © 2020, Editorial Board of Journal of Huazhong University of Science and Technology. All right reserved.
引用
收藏
页码:32 / 37
页数:5
相关论文
共 12 条
  • [1] SHEN Jian, CHANG Shaohua, SHEN Jun, Et al., A lightweight multi-layer authentication protocol for wireless body area networks, Future Generation Com- puter Systems, 78, 3, pp. 956-963, (2018)
  • [2] KARST SOREN M, DUEHOLM MORTEN S, MCILROY SIMON J, Et al., Retrieval of a million high-quality, full-length microbial 16S and 18S rRNA gene sequences without primer bias, Nature Bio- technology, 36, 2, pp. 190-199, (2018)
  • [3] YENIGALLA P, KUMAR A, TRIPATHI S, Et al., Speech emotion recognition using spectrogram & phoneme embedding, Interspeech 2018, pp. 3688-3692, (2018)
  • [4] SHEN Q, ZHAO Y., Perceptual hashing for color image based on color opponent component and quadtree structure, Signal Processing, 166, (2020)
  • [5] WALLNOFER J, PIRKER A, ZWERGER M, Et al., Multipartite state generation in quantum networks with optimal scaling, Scientific Reports, 9, 1, pp. 1-18, (2019)
  • [6] JIANG Q, CHEN Z, LI B, Et al., Security analysis and improvement of bio-hashing based three-factor aut- hentication scheme for telecare medical information systems, Journal of Ambient Intelligence and Hu- manized Computing, 9, 4, pp. 1061-1073, (2018)
  • [7] WANG H, ZHOU L, ZHANG W, Et al., Water- marking-based perceptual hashing search over encrypted speech, International Workshop on Digital Water- marking, pp. 423-434, (2013)
  • [8] ZHANG Q Y, GE Z X, QIAO S B., An efficient retrieval method of encrypted speech based on frequency band variance, Journal of Information Hiding and Mul- timedia Signal Processing, 9, 11, pp. 1452-1463, (2018)
  • [9] ZHAO H, HE S., A retrieval algorithm for encrypted speech based on perceptual hashing, Proc of 2016 12th International Conference on Natural Computation and 13th Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), pp. 1840-1845, (2016)
  • [10] HE S, ZHAO H., A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing, Computer Science & Information Systems, 14, 3, pp. 703-718, (2017)