A novel NMF-based authentication scheme for encrypted speech in cloud computing

被引:7
|
作者
Shi, Canghong [1 ]
Wang, Hongxia [2 ]
Hu, Yi [3 ]
Li, Xiaojie [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Informat Sci & Technol, Chengdu 610031, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu 610041, Peoples R China
[3] Northern Kentucky Univ, Highland Hts, KY USA
[4] Chengdu Univ Informat Technol, Coll Comp Sci, Chengdu 610225, Peoples R China
基金
中国国家自然科学基金;
关键词
Encrypted speech authentication; Speech encryption; Non-negative matrix factorization; Cloud computing; Tamper localization; Common signal processing;
D O I
10.1007/s11042-021-10896-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authentication of encrypted speeches is a technique that can judge the integrity of encrypted speech in cloud computing, even the encrypted speeches have been subjected to common signal processing operations. In this paper, a novel and effective authentication scheme for encrypted speech is proposed. At first, the host speech signal is first scrambled and encrypted by Advanced Encryption Standard (AES). Then, Integer Wavelet Transform (IWT) is performed to obtain the approximation coefficients and the detail coefficients. At last, Non-negative Matrix Factorization (NMF) is employed to generate perceptual hashing, which is embedded into the encrypted speech by differential expansion. In authentication section, the tampered region of encrypted speech is located by comparing the reconstructed perceptual hashing with the extracted perceptual hashing version. Extensive experiments are carried out, which demonstrate that the proposed scheme is not only sensitive to malicious tampering of encrypted speech files, but also robust to tolerate common signal processing operations. The comparison shows that our algorithm performs better than the existing methods on Bit Error Rate (BER) values.
引用
收藏
页码:25773 / 25798
页数:26
相关论文
共 50 条
  • [41] A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
    Hao, Z.
    Zhong, S.
    Yu, N.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) : 227 - 235
  • [42] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (02) : 1693 - 1713
  • [43] A reliable authentication scheme of personal health records in cloud computing
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chang, Chien-Yun
    Wu, Zhen-Yu
    WIRELESS NETWORKS, 2024, 30 (05) : 3759 - 3769
  • [44] ROTATIONAL RESET STRATEGY FOR ONLINE SEMI-SUPERVISED NMF-BASED SPEECH ENHANCEMENT FOR LONG RECORDINGS
    Zhou, Jun
    Chen, Shuo
    Duan, Zhiyao
    2015 IEEE WORKSHOP ON APPLICATIONS OF SIGNAL PROCESSING TO AUDIO AND ACOUSTICS (WASPAA), 2015,
  • [45] Identity-Based Authentication for Cloud Computing
    Li, Hongwei
    Dai, Yuanshun
    Tian, Ling
    Yang, Haomiao
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 157 - 166
  • [46] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Zhang, Qiu-yu
    Zhang, Deng-hai
    Xu, Fu-jiu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) : 24925 - 24948
  • [47] An encrypted speech authentication and tampering recovery method based on perceptual hashing
    Qiu-yu Zhang
    Deng-hai Zhang
    Fu-jiu Xu
    Multimedia Tools and Applications, 2021, 80 : 24925 - 24948
  • [48] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (01) : 497 - 522
  • [49] Enhancing security and efficiency in cloud computing authentication and key agreement scheme based on smart card
    Mariem Bouchaala
    Cherif Ghazel
    Leila Azouz Saidane
    The Journal of Supercomputing, 2022, 78 : 497 - 522
  • [50] A Secure Multi-Tier Authentication Scheme in Cloud Computing Environment
    Singh, Ashish
    Chatterjee, Kakali
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,