A novel NMF-based authentication scheme for encrypted speech in cloud computing

被引:7
|
作者
Shi, Canghong [1 ]
Wang, Hongxia [2 ]
Hu, Yi [3 ]
Li, Xiaojie [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610041, Peoples R China
[3] Northern Kentucky Univ, Highland Hts, KY USA
[4] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted speech authentication; Speech encryption; Non-negative matrix factorization; Cloud computing; Tamper localization; Common signal processing;
D O I
10.1007/s11042-021-10896-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of encrypted speeches is a technique that can judge the integrity of encrypted speech in cloud computing, even the encrypted speeches have been subjected to common signal processing operations. In this paper, a novel and effective authentication scheme for encrypted speech is proposed. At first, the host speech signal is first scrambled and encrypted by Advanced Encryption Standard (AES). Then, Integer Wavelet Transform (IWT) is performed to obtain the approximation coefficients and the detail coefficients. At last, Non-negative Matrix Factorization (NMF) is employed to generate perceptual hashing, which is embedded into the encrypted speech by differential expansion. In authentication section, the tampered region of encrypted speech is located by comparing the reconstructed perceptual hashing with the extracted perceptual hashing version. Extensive experiments are carried out, which demonstrate that the proposed scheme is not only sensitive to malicious tampering of encrypted speech files, but also robust to tolerate common signal processing operations. The comparison shows that our algorithm performs better than the existing methods on Bit Error Rate (BER) values.
引用
收藏
页码:25773 / 25798
页数:26
相关论文
共 50 条
  • [21] OPTIMAL COST FUNCTION AND MAGNITUDE POWER FOR NMF-BASED SPEECH SEPARATION AND MUSIC INTERPOLATION
    King, Brian
    Fevotte, Cedric
    Smaragdis, Paris
    2012 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2012,
  • [22] Efficient Keyword Search Scheme in Encrypted Cloud Computing Environment
    Shu, Jiangang
    Sun, Xingming
    Zhou, Lu
    Wang, Jin
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (05): : 65 - 76
  • [23] Prediction of NMF-based Wiener Filter for Speech Enhancement Using Deep Neural Networks
    Bai, Zhigang
    Bao, Changchun
    Cui, Zihao
    2020 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (IEEE ICSPCC 2020), 2020,
  • [24] A NMF-Based Image Restoration Scheme With Applications to LED Integrated Substrate Defect Detection
    Chen, Ssu-Han
    Chiou, Ai-Huei
    Wang, Chien-Chih
    IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, 2018, 31 (04) : 486 - 494
  • [25] A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing
    Zhu, Xiaoyu
    Liu, Qin
    Wang, Guojun
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 845 - 851
  • [26] Review on Various Authentication Scheme Over Cloud Computing
    Kaur, Manjot
    Verma, Amit
    Kaur, Iqbaldeep
    Sharma, Dolly
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, : 62 - 65
  • [27] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [28] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [29] Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing
    Jiang, Qi
    Li, Bingyan
    Ma, Jianfeng
    Tian, Youliang
    Yang, Yuanyuan
    CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT I, 2016, 10039 : 311 - 321
  • [30] An Enhanced Lightweight IoT-based Authentication Scheme in Cloud Computing Circumstances
    Martinez-Pelaez, Rafael
    Toral-Cruz, Homero
    Parra-Michel, Jorge R.
    Garcia, Vicente
    Mena, Luis J.
    Felix, Vanessa G.
    Ochoa-Brust, Alberto
    SENSORS, 2019, 19 (09)