Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme

被引:0
作者
Zhang Qiu-yu [1 ]
Ren Zhan-wei [1 ]
Huang Yi-bo [1 ]
Yu Shuang [1 ]
Hu Wen-jin [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2016年 / 10卷 / 01期
关键词
Multimedia security; Speech perceptual hashing; Fuzzy commitment scheme (FCS); Security;
D O I
10.14257/ijsia.2016.10.1.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Existing speech perceptual hashing authentication algorithms generally encrypt the perceptual hash value to protect the security of the algorithms. But under the principle of Kerckhoffs, the algorithm becomes transparent and fragile. And it can be seen that the secret key may be estimated when the number of times that reuses the secret key reache to a limit through the safety analysis of Shannon unicity distance. To solve these problems, we present a novel security authentication scheme of speech perceptual hashing based on the fuzzy commitment scheme (FCS). Firstly, in sender, the randomly selected BCH code word and the extracted perceptual hash value are sent to the Cmt() function to calculate and the final secure perceptual hash value (h(c), delta) can be obtained. Secondly, in receiver, the perceptual hash value is calculated again from the received speech information and then the calculated perceptual hash value with the received information. (commitment) are sent to the Decmt() function to calculate to get the h(c'). Finally, the h(c) and h(c') are matched. The experimental results show that the proposed scheme effectively avoids the probability that an attacker obtains the plaintext/ciphertext pairs without affecting the performance of original algorithm, and at the same time it ensures the security of perceptual hashing algorithm.
引用
收藏
页码:229 / 240
页数:12
相关论文
共 50 条
  • [1] Security Analysis of Speech Perceptual Hashing Authentication Algorithm
    Zhang Qiu-yu
    Ren Zhan-wei
    Xing Peng-fei
    Huang Yi-bo
    Yu Shuang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 103 - 118
  • [2] SECURITY EVALUATION OF A PERCEPTUAL IMAGE HASHING SCHEME BASED ON VIRTUAL WATERMARK DETECTION
    Zhou, Jiantao
    Au, Oscar C.
    2011 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2011,
  • [3] The Analysis of an NMF-based Perceptual Image Hashing Scheme
    Hossein, S. Amir
    Tabatabaei, A. E.
    Ruland, Christoph
    2013 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (IEEE ISSPIT 2013), 2013, : 108 - 112
  • [4] Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
    Yi-bo Huang
    Teng-fei Chen
    Qiu-yu Zhang
    Yuan Zhang
    Shao-hui Yan
    Multimedia Tools and Applications, 2022, 81 : 25829 - 25852
  • [5] Encrypted speech perceptual hashing authentication algorithm based on improved 2D-Henon encryption and harmonic product spectrum
    Huang, Yi-bo
    Chen, Teng-fei
    Zhang, Qiu-yu
    Zhang, Yuan
    Yan, Shao-hui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) : 25829 - 25852
  • [6] A secure and robust wavelet-based hashing scheme for image authentication
    Ahmed, Fawad
    Siyal, M. Y.
    ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 51 - +
  • [7] Improve the security of image robust hash using fuzzy commitment scheme
    Liu, Zhaoqing
    Li, Qiong
    Niu, Xiamu
    NEURAL COMPUTING & APPLICATIONS, 2013, 23 (01) : 67 - 72
  • [8] Improve the security of image robust hash using fuzzy commitment scheme
    Zhaoqing Liu
    Qiong Li
    Xiamu Niu
    Neural Computing and Applications, 2013, 23 : 67 - 72
  • [9] Perceptual hashing authentication algorithm for multi-format audio based on energy to zero ratio
    Zhang Q.
    Qiao S.
    Zhang T.
    Huang Y.
    1600, Huazhong University of Science and Technology (45): : 33 - 38
  • [10] A Solution to the Security Authentication Problem in Smart Houses Based on Speech
    Mahmood, Awais
    16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 606 - 611