A novel NMF-based authentication scheme for encrypted speech in cloud computing

被引:7
|
作者
Shi, Canghong [1 ]
Wang, Hongxia [2 ]
Hu, Yi [3 ]
Li, Xiaojie [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610041, Peoples R China
[3] Northern Kentucky Univ, Highland Hts, KY USA
[4] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted speech authentication; Speech encryption; Non-negative matrix factorization; Cloud computing; Tamper localization; Common signal processing;
D O I
10.1007/s11042-021-10896-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of encrypted speeches is a technique that can judge the integrity of encrypted speech in cloud computing, even the encrypted speeches have been subjected to common signal processing operations. In this paper, a novel and effective authentication scheme for encrypted speech is proposed. At first, the host speech signal is first scrambled and encrypted by Advanced Encryption Standard (AES). Then, Integer Wavelet Transform (IWT) is performed to obtain the approximation coefficients and the detail coefficients. At last, Non-negative Matrix Factorization (NMF) is employed to generate perceptual hashing, which is embedded into the encrypted speech by differential expansion. In authentication section, the tampered region of encrypted speech is located by comparing the reconstructed perceptual hashing with the extracted perceptual hashing version. Extensive experiments are carried out, which demonstrate that the proposed scheme is not only sensitive to malicious tampering of encrypted speech files, but also robust to tolerate common signal processing operations. The comparison shows that our algorithm performs better than the existing methods on Bit Error Rate (BER) values.
引用
收藏
页码:25773 / 25798
页数:26
相关论文
共 50 条
  • [1] A novel NMF-based authentication scheme for encrypted speech in cloud computing
    Canghong Shi
    Hongxia Wang
    Yi Hu
    Xiaojie Li
    Multimedia Tools and Applications, 2021, 80 : 25773 - 25798
  • [2] NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing
    Li, Tao
    Ren, Yongzhen
    Ren, Yongjun
    Wang, Lina
    Wang, Lingyun
    Wang, Lei
    2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 476 - 481
  • [3] Encrypted speech authentication and recovery scheme based on fragile watermarking
    Qiu-yu Zhang
    Fu-jiu Xu
    Telecommunication Systems, 2023, 82 : 125 - 140
  • [4] Encrypted speech authentication and recovery scheme based on fragile watermarking
    Zhang, Qiu-yu
    Xu, Fu-jiu
    TELECOMMUNICATION SYSTEMS, 2023, 82 (01) : 125 - 140
  • [5] NMF-Based Speech Enhancement Using Bases Update
    Kwon, Kisoo
    Shin, Jong Won
    Kim, Nam Soo
    IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (04) : 450 - 454
  • [6] NMF-Based Speech Enhancement Using Multitaper Spectrum Estimation
    Attabi, Yazid
    Chung, Hanwook
    Champagne, Benoit
    Zhu, Wei-Ping
    2018 INTERNATIONAL CONFERENCE ON SIGNALS AND SYSTEMS (ICSIGSYS), 2018, : 36 - 41
  • [7] An Identity-Based Authentication Scheme in Cloud Computing
    Zhang, Zhi-Hua
    Jiang Xue-Feng
    Li, Jian-Jun
    Jiang, Wei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
  • [8] Multilevel Authentication Scheme for Cloud Computing
    Adam, Sara Alfatih
    Yousif, Adil
    Bashir, Mohammed Bakri
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (09): : 205 - 212
  • [9] A SOURCE/FILTER MODEL WITH ADAPTIVE CONSTRAINTS FOR NMF-BASED SPEECH SEPARATION
    Bouvier, Damien
    Obin, Nicolas
    Liuni, Marco
    Roebel, Axel
    2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 131 - 135
  • [10] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130