A novel NMF-based authentication scheme for encrypted speech in cloud computing

被引:7
|
作者
Shi, Canghong [1 ]
Wang, Hongxia [2 ]
Hu, Yi [3 ]
Li, Xiaojie [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610041, Peoples R China
[3] Northern Kentucky Univ, Highland Hts, KY USA
[4] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted speech authentication; Speech encryption; Non-negative matrix factorization; Cloud computing; Tamper localization; Common signal processing;
D O I
10.1007/s11042-021-10896-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of encrypted speeches is a technique that can judge the integrity of encrypted speech in cloud computing, even the encrypted speeches have been subjected to common signal processing operations. In this paper, a novel and effective authentication scheme for encrypted speech is proposed. At first, the host speech signal is first scrambled and encrypted by Advanced Encryption Standard (AES). Then, Integer Wavelet Transform (IWT) is performed to obtain the approximation coefficients and the detail coefficients. At last, Non-negative Matrix Factorization (NMF) is employed to generate perceptual hashing, which is embedded into the encrypted speech by differential expansion. In authentication section, the tampered region of encrypted speech is located by comparing the reconstructed perceptual hashing with the extracted perceptual hashing version. Extensive experiments are carried out, which demonstrate that the proposed scheme is not only sensitive to malicious tampering of encrypted speech files, but also robust to tolerate common signal processing operations. The comparison shows that our algorithm performs better than the existing methods on Bit Error Rate (BER) values.
引用
收藏
页码:25773 / 25798
页数:26
相关论文
共 50 条
  • [31] Privacy Protection Smartcard Authentication Scheme in Cloud Computing
    FAN Kai
    DENG Hai
    LI Hui
    YANG Yintang
    Chinese Journal of Electronics, 2018, 27 (01) : 41 - 45
  • [32] A COMPARATIVE STUDY ON SPARSITY PENALTIES FOR NMF-BASED SPEECH SEPARATION: BEYOND LP-NORMS
    Joder, Cyril
    Weninger, Felix
    Virette, David
    Schuller, Bjoern
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 858 - 862
  • [33] Privacy Protection Smartcard. Authentication Scheme in Cloud Computing
    Fan Kai
    Deng Hai
    Li Hui
    Yang Yintang
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (01) : 41 - 45
  • [34] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [35] A Scalable and Efficient User Authentication Scheme for Cloud Computing Environments
    Moghaddam, Faraz Fatemi
    Moghaddam, Shiva Gerayeli
    Rouzbeh, Sohrab
    Araghi, Sagheb Kohpayeh
    Alibeigi, Nima Morad
    Varnosfaderani, Shirin Dabbaghi
    2014 IEEE REGION 10 SYMPOSIUM, 2014, : 508 - 513
  • [36] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [37] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
  • [38] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    SYMMETRY-BASEL, 2020, 12 (01):
  • [39] Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing
    YANG Yanyan
    HU Mingsheng
    KONG Shan
    GONG Bei
    LIU Xinxin
    Wuhan University Journal of Natural Sciences, 2019, 24 (02) : 134 - 140
  • [40] A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles
    Wang, Xiaoliang
    She, Xinhui
    Bai, Liang
    Qing, Yang
    Jiang, Frank
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 67 (03): : 3349 - 3361