Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum

被引:0
作者
Yi-bo Huang
Teng-fei Chen
Qiu-yu Zhang
Yuan Zhang
Shao-hui Yan
机构
[1] Northwest Normal University,College of Physics and Electronic Engineering
[2] Lanzhou University of Technology,School of Computer and Communication
来源
Multimedia Tools and Applications | 2022年 / 81卷
关键词
Encrypted speech authentication; Perceptual hashing; Improved 2D-Henon; HPS; Matching accuracy; Security;
D O I
暂无
中图分类号
学科分类号
摘要
The existing speech authentication algorithms use plaintext speech for hashing structure, and save the generated hashing sequence in the cloud, which is easy to cause hashing sequence leakage. At the same time, the robustness and matching accuracy of speech signal under complex noise are low, which will cause serious deviations in authentication. In order to solve the above problems, this paper proposes an encrypted speech perceptual hashing authentication algorithm based on improved two-dimensional Henon chaotic map (2D-Henon) encryption and harmonic product spectrum (HPS). Firstly, the algorithm sets the key for the improved 2D-Henon and transforms the original speech to encrypted speech. And then, feature extraction is performed on the encrypted speech signal to obtain the HPS feature matrix, and perform mapping and dimensionality reduction on the HPS matrix. Finally, the threshold is selected for binarization, and the perceptual hashing sequence is constructed. Experimental results show that the algorithm adopts encrypted speech perceptual hashing sequence, which improves the security of hashing sequence storage. The encrypted speech signal can reduce the amplitude of signal change, which has strong discrimination and robustness, and also has better matching accuracy against complex noise.
引用
收藏
页码:25829 / 25852
页数:23
相关论文
共 79 条
  • [1] Chen N(2010)Robust speech hash function ETRI J 32,2(2010-04-07) 32 345-347
  • [2] Wan W(2018)Low-resolution face recognition in the wild via selective knowledge distillation IEEE Trans Image Process PP 1-1
  • [3] Ge S(2017)A retrieval algorithm of encrypted speech based on syllable-level perceptual hashing Comput Sci Inf Syst 14 703-718
  • [4] Zhao S(2020)A long sequence speech perceptual hashing authentication algorithm based on constant q transform and tensor decomposition IEEE Access 8 34140-34152
  • [5] Li C(2019)Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment Clust Comput 19 315-323
  • [6] Li J(2016)Efficient authentication and access control of message dissemination over vehicular ad hoc network Neurocomputing 181 132-138
  • [7] He S(2019)Multimodal gait recognition with inertial sensor data and video using evolutionary algorithm IEEE Trans Fuzzy Syst 27 956-965
  • [8] Zhao H(2015)Audio perceptual hashing based on nmf and mdct coefficients Chin J Electron 24 579-588
  • [9] Huang Y(2015)Perceptual hashing based on correlation coefficient of mfcc for speech authentication Beijing Univ Posts Telecomm 38 89-93
  • [10] Hou H(2019)Security and privacy in the age of big data and machine learning Computer 52 65-70